IBM Certified Advanced Application Developer – Cloud Platform V1
Select 2
1.
When setting up a container image for use with IBM Cloud Container Registry, what are two base images that can be customised.
- VDI disk images
- VMDK disk images
- Docker Hub images
- Cloud Foundry buildpack images
- IBM Public Repository images
2.
A developer is working on a multi-speed IT project where new functionality is required in system-of-record .what technique allow systems-of-engagement testing of the new functionality before it is implemented in systems-of-re-cord?
- Systems-of-record service can be virtualizeci to reflect the new feature.
- A/B testing on the system-of-engagement can be used to validate the new feature
- Systems-of-engagement can implement temporary code in its application to simulate the needed feature.
- The systems-of-engagement team can incorporate test driven development as a part of their development process.
3.
What is an advantage of frequent small releases versus infrequent large releases?
- With each release more is changed
- Less time is spent testing and verifying each release
- Aligning with a cadenced release schedule is not required
- Releases can be combined and inserted into big-bang releases
4.
What are the different lifecycle states of a destination component in Secure Gateway service for IBM Cloud?
- Active or Dormant
- Open or Blocked
- Enabled or Disabled
- Available or Not Available
5.
What is a property of components created as the result of splitting an application into microservices A . Component functionality based on product capabilities
- Easy to understand code with centralized data management
- Ability to independently replace and upgrade each component
- Duplicate functionality of the original application within each component
6.
What needs to be deployed and configured to do a dynamic scan of an on premises web application on a private network using IBM cloud application Security on Cloud?
- API Gateway
- AppScan Presence
- AppScan Enterprise
- IBM Cloud Service Proxy
7.
Which component of API Connect enables a community of developer to discover and consume API
- API Catalog
- API Discovery
- Developer Portal
- Datapower Gateway
8.
What does the concept of infrastructure as code refers to?
- Capturing environment connections via network diagrams
- Using design to provision application environments
- Using virtualization as means to get better hardware utilization
- Capturing the steps and configuration of an environment so they can be executed through automation.
9.
Which step can a developer take to improve the implementation 01 asynchronous service integration in a microservices application architecture ?
- Enable message payload headers to decrease data latency
- Disable message queuing to improve application scalability
- Maximize component coupling to improve application availability.
- Minimize process communication to increase application responsiveness
10.
The diagram below shows an integration using the IBM Cloud Secure Gateway. What is the purpose of the Secure Gateway Client (SG Client) ?
- It defines the Secure Gateway’s client API.
- It creates an API layer to access a database securely.
- It establishes a data transport link to the Secure Gateway service.
- It is a secure firewall protecting destination behind the gateway.
11.
The image below illustrates a cloud based microservice notifying an on-premi web services of specific events by invoking the web services via API Connect.The on-premises web service will then perform any required actions synchronously and return a value to the caller to indicate the success or failure of those actions.
What is an advantage of using a synchronous API call in this scenario?
- The microservice code will continue to run without errors if the on premise we service is down
- The network link between the API Connect service and the on premise web service does not have to be up to all the times.
- The error logic in the microservice code will be simpler than the equivalent code if an asynchronous notification mechanism was used instead
- End-to-end auditing of a specific event notification message is simpler when compared to using an asynchronous notification mechanism
12.
Who performs the installation of updates and fixes to the IBM Cloud runtime and services for a IBM Cloud Private Deployment ?
- IBM
- Customer
- Third party
- IBM and the customer share the responsibility
13.
Where must a developer specify the use of Secure Gateway when using APt Connect to define a REST API to connect to an enterprise service behind a firewall blocking inbound access from the Internet?
- In the invoke policy for an API
- In the enterprise service catalog
- In the security definition for the API
- In the plan for APIs that need to be secured
14.
What role must a user have in order to bind or unbind a service to an application ?
- Space Manager
- Space Developer
- Organization Manager
- Organization Auditor
15.
Compared to Monolithic applications, how is application downtime is minimized with microservices architecture ?
- Highly coupled components enable multiple updates at once.
- Self contained components enable replacement when processes failed.
- Maintanence windows are minimized with centralized code governance.
- Single code base allows for common scheduled downtime with an application.
16.
Which is an example of governance best practice in Microservices development ?
- Minimize the services used per application.
- Create separate operations teams per service.
- Require common code languages per application.
- Establish a team to own the development lifecycle per service.
17.
Which two IBM cloud services are document oriented databases ?
- Compose for etcd
- Compose for Redis
- Cloudant for NoSQL DB
- DB2 Warehouse for Cloud
- Compose for Elastic Search.
18.
A developer is building a hybrid cloud environment that requires deployments across development , Test and production that span on premises and multiple clouds. What single IBM solution can the developer use to satisfy the requirements ?
- IBM Urbancode Deploy.
- IBM Cloud Auto-Scaling.
- IBM Cloud Continuous Delivery.
- IBM Cloud Monitoring and Analytics.
19.
From an application operations perspective , what benefit does monolithic architecture provide ?
- Decreased Complexity.
- Increased Service Distribution.
- Increased resource granularity.
- Decreased resource consistency.
20.
A developer is given the requirement to fetch a key/value application configuration data from a fault tolerant redundant data store.Which IBM cloud service would minimize the coding required to meet these requirements ?
- Compose for etcd
- Cloudant for NoSQL DB
- Compose for Rethink DB
- Big Insight for Apache Hadoop
21.
What is a common security concern with Docket containers?
- They do not support encryption.
- The root account is always needed to work with containers.
- The OS kernel is shared among all containers and the host
- Security policies cannot be individually applied to containers running on same host.
22.
By Default, log data is stored for how many days in IBM Bluemix Cloud Foundry application
- 7
- 28
- 60
- 90
23.
A developer needs to deploy an application that combines multiple isolated process running on the same host and also require root access to the host for occasional platform tuning tasks.
Which IBM Cloud compute option is the correct choice?
- Functions
- Containers
- Virtual Servers
- Cloud Foundry
24.
What kind of architecture concerns connections that span on – premises and cloud environments, regardless if the cloud is local, dedicated or public ?
- Microservices architecture.
- Multispeed IT architecture.
- Hybrid integration architecture.
- Enterprise Integration architecture.
25.
What is the result of the Command cf cups mylogs -l syslog tls://HOST : PORT
- Binds logging service to my-logs CF application
- B. Creates my-logs application that accepts logs from the specific host
- Sends the logs of my-logs CF application to specific logging endpoint.
- Creates a user provided service my-logs to send logs to the specific logging endpoint.
26.
What is a business benefit of the IBM Cloud Garage Method ?
- Cloud deployment model.
- Significant saving in capital expenditure.
- Reduced dependency on outsourced development.
- Ability to deliver innovative ideas to your customer faster.
27.
In this diagram of Cloud based API Management service provider, What is the purpose of API Management component ?
- Authorize access to the APIs
- Cache results returned by APIs
- Encrypt the data exposed by the APIs
- Define the data exposed by the APIs
28.
What is the security advantage of using microservices applications, compared to monolithic application for data access ?
- Fine-grained control for data that has different authorization needs
- Dynamic encryption control through distributed data partitions for each component
- Centralized data governance enables easier administration of data security policies
- Polyglot technologies enable hardware data security modules to be used with components
29.
The user IDs of Cloud service administrators have extended capabilities and need special control. What is the governance capability that helps customers meet compliance requirements and prevent data breaches through account ?
- Single, Sign -On-Service
- Security Access Management
- Federated Identity Management
- Privileged Identity Management
30
The image below illustrates an on-premises application notifying a cloud based application of specific events by sending asynchronous messages via a message broker. A cloud based message broker client application receives the messages and perform any required action.
What are two advantages of using asynchronous messaging in this scenario?
Select 2
- Changes to the format of the event notification messages will have no effect on the cloud message broker client application.
- The network link between the message broker and the cloud based application does not have to be up at all times.
- End-to-end auditing of a specific event notification message is simpler when compared to using synchronous notification.
- Confirmation that a message has been received by the message broker ensures that the message broker ensure that the message will eventually be processed successfully by the cloud application.
- The error logic in the on-premises application code that sends a single event notification will be simpler than the equivalent code if a synchronous notification mechanism was used instead.
31
Security requirements for a cloud service are similar to those in traditional IT environment. Why may the risks be different ?
- Senstive data at rest in the cloud cannot he encrypted
- It is not possible to provision firewalls in a cloud environment
- Virtual Private Network (VPN) is used to connect to the cloud seivice
- Technical design and operational control of the cloud service are in the hands of the cloud service provider.
32
Which integration architecture uses a centralized broker and adapters to connect application
- Web API architecture
B . Hub and spoke architecture
- Point-to-point architecture
- Service-oriented architecture
33
What is the IBM Cloud deployment model that allows protection of the most workload behind an enterprise on-premises firewall ?
- IBM Cloud Hybrid
- IBM Cloud Private
- IBM Cloud Dedicated
- IBM Cloud On-Premises
34
What is the result of isolating mission critical virtual machine (VM) workloads on different hypervisors from less critical VM workloads ?
- VMs of different trust levels are located on different physical servers.
- Mission critical workloads cannot be patched independently of less critical VMs
- Logging for mission critical workloads can be easily consolidated with less critical workloads.
- Hypervisor performance policies are shared between mission critical and less critical workloads.
35
A developer needs to migrate an on premise application that uses an on premise DB2 database to the cloud. The migrated application would access the same on premise database via a VPN and run on comparable hardware.
Which two factors should concern the developer the most when assessing the negative performance impact of running the application cloud versus on premise?
Select 2
- The complexity of DB2 User Define Functions invoked by the application
- The frequency of interactions between the application’s DB2 client and the DB2 server
- The number of subselects in the SQL passed to the server by the application’s DB2 client
- The amount of data passed to the server and returned to the application via the DB2 client
- The number of tables accessed by SQL queries passed to the server by the application’s DB2 client
36
Which tool in API Connect is an alternate to API Designer User Interface ( UI) for creating and publishing APIs ?
- YAML
- Developer Portal
- API Connect Command Line Interface (CLI)
- Eclipse API Integrated Development Environment (IDE)
37
The Image below illustrates an on premise application accessing a cloud based database by connecting directly to it via a secure tunnel.
The application is performing slowly because each user operation requires multiple sequential database queries and the network latency of the secure tunnel is high. Which of the following will result in the most improvement in performance?
- Use a database query optimizer in the database server.
- Cache each database query result in the database server.
- Create an on-premises microservice with a single API call for each user operation to front end all the database queries in that user operation
- Create a REST API in the same cloud with a single API call for each user operation to front end all the database queries in that user operation
38
How can a developer provide multi-factor authentication for their application using the IBM Single Sign On service?
- Configure the service with multiple identity providers
- Configure the service to use an enterprise LDAP identity provider.
- Configure the service with a social identity provider such as Google or Facebook
- Configure the service using SAML to an appropriate third-party identity provider.
39
Which statement is true regarding a IBM Cloud Continuous Delivery toolchain template?
- It does not include testing tools
- It can only be used by administrators to instantiate a toolchain
- It captures connectivity and integrations for all tools in the toolchain
- It must be stored in the same source code repository as the application code
40
Which security principle governs access to components within a microservices architecture ?
- Least privilege
- Defense in depth
- Principal propagation
- Service authentication
41
What is a blue/green deployment process?
- A process by which a user can choose which of two application versions to use.
- A process by which an application is scaled vertically to handle dynamic workloads.
- A process by which an application is scaled horizontally to handle dynamic workloads.
- A process by which a new version of an application is deployed to an environment with no disruption to the user.
42
Select 2
What are the two categories of vulnerabilities that are detected by IBM vulnerability Advisor ?
- Images with a weak passwords.
- Vulnerable packages in the container.
- Data container images that are not encrypted
- Images running database services on non-standard ports
- Images with sensitive data present in the container images.
43
When using IBM Urban Code Deploy (UCD) to deploy applications to lBM Cloud, an application environment in UCD is mapped by default to what IBM Cloud Foundry entity?
- Space
- Region
- Container
- Application runtime
44
What level of functionality influences the decision on how microservices organized ?
- Process level
- Platform level
- Coding language level
- Business capability level
45
What must be done before an application developer can consume an APl managed by IBM APl Connect?
- Obtain an API license
- Design and test the application
- Subscribe the application to a Plan
- Define the application’s LoopBack model
46
A developer wants to look for administrative commands to a cloud foundry application changing state from started to stopped. What component should they filter on in the logs ?
- API
- RTR
- STG
- APP