What should a cloud architect recommend to the university during the cloud design phase?
A university is building a private cloud. They plan to offer services to students, faculty, and staff.
Each group has access to different levels of sensitive data with different performance
characteristics. In addition, the university must comply with FERPA and HIPAA regulations for a
small number of services.
What should a cloud architect recommend to the university during the cloud design phase?
Why would they choose to deploy VMware vCenter Configuration Manager?
An enterprise company has a large, virtualized data center. They are currently auditing their
servers to ensure they are in compliance with regulatory requirements.
Why would they choose to deploy VMware vCenter Configuration Manager?
you need to create a service offering?
In addition to the service template, what other information do you need to create a service
offering?
How did the enterprise protect its data?
An enterprise decided to place some sensitive data – intellectual property – in the public cloud and
implemented security mechanisms to protect this data.
Recently the public cloud provider’s systems had a security breach. The enterprise was not
concerned because they felt their data had been completely protected. All of the services housing
the data are protected by an IPS application and no alerts were generated by the system.
How did the enterprise protect its data?
Who should make the decision to determine the best solution?
The sales organization within a large enterprise has determined the need to immediately
implement a mobile sales tool for its field staff. There are two SaaS solutions available that meet
their requirements.
The CIO wants to develop the solution in-house and claims that IT can develop the application at
only slightly more cost than the SaaS solutions, and it would be more secure. Estimated time to
deliver the application from internal IT is 10 weeks.
Who should make the decision to determine the best solution?
What must be done to achieve this?
A hosting company operates from two data centers and typically hosts very large customers. The
delivery and support of their IT infrastructure is not service driven. Customers suffer significant
lead times to establish new operational environments, or to change existing infrastructure
requirements.
A new, highly secure application development environment has been requested by one of the
hosting company’s customers. The customer has a tight time frame and needs to be able to create
a test environment on-demand, within hours. The hosting company has decided to transition to
ITaaS to meet the needs of this (and future) clients.
What must be done to achieve this?
How can the department improve trust within their service offering?
A government department has converted their internal software development environment into a
cloud services offering. The department is actively marketing the capability to other agencies. The
other agencies are interested, but identity compliance is a serious concern.
How can the department improve trust within their service offering?
What should be addressed when migrating to ITaaS and implementing a service catalog for the retail and electro
A hosting company has experienced a sudden increase in customer interest and wishes to
implement ITaaS. They are now hosting online shopping applications for several retail computer
and electronics companies.
Developers in the customer companies have the ability to publish applications and changes to
their stores. Shoppers access these stores using a variety of mobile applications and web
browsers.
What should be addressed when migrating to ITaaS and implementing a service catalog for the
retail and electronic companies?
Which capability best meets their in-flight encryption requirement?
In an effort to grow market share, a financial company has decided to expand their portfolio of
web-based services to residential and mobile users. To improve adoption of these services, the
software development team was given the requirement to encrypt data in flight without requiring a
software footprint on the client.
Which capability best meets their in-flight encryption requirement?
Which cloud single sign-on solution would best fit the needs of this SaaS application?
You are working with an independent software vendor to deploy a new SaaS-based application
into an organization’s private cloud. The application supports REST and SAML binding for
authentication. Which cloud single sign-on solution would best fit the needs of this SaaS
application?