0% found this document useful (0 votes)
40 views4 pages

Exam C1000-083 Foundations of IBM Cloud V2 Sample Test

The document is a sample test for the IBM Cloud Foundations C1000-083 exam, covering various topics related to IBM Cloud services and features. It includes multiple-choice questions about compliance standards, virtual servers, Kubernetes, Cloud Foundry, File Storage, Block Storage, authentication services, Streaming Analytics, encryption key management, and Cloud Pak for Applications. Each question is followed by the correct answer key.

Uploaded by

Mahendran Balu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views4 pages

Exam C1000-083 Foundations of IBM Cloud V2 Sample Test

The document is a sample test for the IBM Cloud Foundations C1000-083 exam, covering various topics related to IBM Cloud services and features. It includes multiple-choice questions about compliance standards, virtual servers, Kubernetes, Cloud Foundry, File Storage, Block Storage, authentication services, Streaming Analytics, encryption key management, and Cloud Pak for Applications. Each question is followed by the correct answer key.

Uploaded by

Mahendran Balu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Exam C1000-083

Foundations of IBM Cloud V2


Sample Test

1. What is the importance of compliance standards and regulations in IBM


Cloud?
A. Government security and operational requirements
B. Monitors security compliance of network operations
C. Provides an auditing report of data privacy violations
D. Protect customer data and applications across networks and
infrastructure

2. Which virtual servers in the IBM Cloud are offered at a reduced cost and
best suited for flexible workloads?
A. Public
B. Reserved
C. Dedicated
D. Transient

3. In the IBM Kubernetes Service, how can the number of worker nodes be
increased when a resource requests needs additional worker nodes?
A. The ansible recipe
B. The pod helm chart
C. The cluster autoscaler
D. The cluster terraform provider

4. Which statement is true regarding IBM Cloud Foundry Enterprise


Environment?
A. The service runs on Kubernetes containers
B. The worker node is multi-tenant to the customer
C. The instance has three hardware options to be deployed
D. The instance requires a minimum of four Cloud Foundry cells

5. Which statement is true regarding IBM File Storage?


A. IBM File Storage buckets can be directly accessed via an API.
B. Cloud Object Storage and IBM File Storage are different names for
the same service.
C. A user can only provision IBM File Storage at the same time as
provisioning a server.
D. IBM File Storage can be attached to and accessed by multiple
servers at the same time.

6. Block Storage on IBM Cloud is accessed via which type of interface?


A. File Transfer Protocol (FTP)
B. Network Attached Storage (NAS)
C. General Parallel File System (GPFS)
D. Internet Small Computer Systems Interface (iSCSI)

7. An organization has been using a home-grown authentication library in


their cloud native application. Maintaining the library is costly and they
would like to offer users the ability to authenticate using Facebook or
Google logins. What IBM Cloud service could they use as a replacement
for their authentication library?
A. App ID
B. Key Protect
C. Mobile Foundation
D. Identity and Access Management

8. What type of analysis does Streaming Analytics perform on data in


motion as part of IBM Cloud applications?
A. Real-time analysis
B. Predictive analysis
C. Prescriptive analysis
D. Asynchronous analysis

9. When using IBM Cloud Hyper Protect Crypto Services, what happens
when an encryption key is deleted?
A. Data can only be decrypted if the user has a special token
B. The key can be recovered so that data becomes usable again
C. Protected data is no longer useable regardless of the application that
stores it
D. The service decrypts protected data, automatically generates a new
key and uses the new key to re-encrypt the data

10. Which statement accurately describes the Cloud Pak for Applications?
A. It helps to accelerate the build of cloud-native apps by leveraging
built-in developer tools and processes, including support for microservices
and serverless computing. Customers can quickly build apps on any cloud,
while existing IBM middleware clients gain the most straightforward path to
modernization.
B. It helps to unify and simplify the collection, organization and analysis
of information. Enterprises can turn data into insights through an integrated
cloud-native architecture. It is extensible, easily customized to unique client
information and AI landscapes through an integrated catalog of IBM, open
source and third-party microservices add-ons.
C. It helps support the speed, flexibility, security and scale required for
all of your digital integration transformation initiatives, and comes pre-
integrated with a set of capabilities including API lifecycle, application and
data integration, messaging and events, high speed transfer and security.
D. It helps deploy on your choice of clouds, with low-code tools for
business users and real-time performance visibility for business managers.
Customers can migrate their runtimes without application changes or data
migration, and automate at scale without vendor lock-in.
KEY:
1. D
2. D
3. C
4. A
5. D
6. D
7. A
8. A
9. C
10. A

You might also like