P.S. Refined C5050-380 training materials are available on Google Drive, GET MORE: https://drive.google.com/open?id=1jUusL-ActOd0kvISXVp_ZBM0ezj7YDNi
Q1. What is the Aspera protocol used to accelerate bulk data movement?
A. Fast Data Transfer (FDT)
B. File Transfer Protocol (FTP)
C. Fast and Secure Protocol (FASP)
D. Secure File Transfer Protocol (SFTP)
Answer: C
Q2. What are three features of IBM Cloud Block Storage?
A. SAN, iSCSI, and SSD
B. Swift, Cinder, and Kerberos
C. Snapshots, replication, and concurrent access
D. High I/O application, protocol level, and predictable IOPS
Answer: D
Q3. Which is one of the five guiding principles in IBM's Cloud point of view?
A. Watson solutions
B. DevOps productivity
C. OpenStacK solutions
D. Insight, innovation, and analytics
Answer: B
Q4. What is the advantage of ubiquitous access?
A. It has seamless integration with LDAP
B. It may decrease internal operating costs
C. It leverages standard APIs for integration
D. It allows organizations to decrease delivery channels
Answer: C
Q5. Which statement defines the term "showback"?
A. A method of tracking public cloud utilization rates of an organization's business units or end users for informational purposes only.
B. A method of tracking cloud consumer utilization rates of an organization's business units or end users for informational purposes only.
C. A method of tracking private cloud utilization rates of an organization's business units or end users for cost of service determination and metered billing.
D. A method of tracking cloud consumer utilization rates of an organization's business units or end users for cost of service determination and metered billing.
Answer: A
Q6. As defined by the IBM Cloud Service Management architecture, which best practice is used for maintaining knowledge about infrastructural components and their relationships?
A. Change Management
B. Component Management
C. Operations Management
D. Configuration Management
Answer: D
Q7. To evaluate the current client environment to move to cloud, the architect requires a clear understanding of what existing capabilities?
A. Daily operational procedures and IT staffing
B. Certifications in virtualization and management
C. Current amount of virtualization and shared services implementation
D. Current amount of network stabilization and shared security policies
Answer: A
Q8. What is an IBM Cloud hardware firewall typically used for?
A. Protect a single bare metal machine.
B. Protect all the machines in a single VLAN
C. Protect all the machines in multiple VLANs.
D. Protect any machine that has its outbound traffic routed to it.
Answer: D
Q9. When should object storage be used over block or file storage in the cloud?
A. To store video files
B. To provide storage via NFS
C. To dedicate the number of IOPS
D. To store large relational databases
Answer: A
Q10. How can an organization using cloud services better protect themselves in cases of a security breach?
A. Place personal information behind a firewall.
B. Encrypt all data which contains personal information.
C. Store personal information on IBM Cloud Bare Metal Servers.
D. Use object storage rather than file storage for personal information.
Answer: B
100% Abreast of the times IBM C5050-380 Questions & Answers shared by Thedumpscentre, Get HERE: http://www.thedumpscentre.com/C5050-380-dumps/ (New Q&As)