New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education C90.06 Exam - Topic 1 Question 1 Discussion

Actual exam question for Arcitura Education's C90.06 exam
Question #: 1
Topic #: 1
[All C90.06 Questions]

Virtual Server A and Virtual Server B are hosted by Hypervisor A, which resides on Physical Server A. Virtual Server A hosts Cloud Service A. Virtual Server C. Virtual Server D, Virtual Server E and Virtual Server F are hosted by Hypervisor B on Physical Server B. Physical Server C, which hosts Hypervisor C, is currently not being used.

Cloud Service Consumer A accesses Cloud Service A (1), which accesses files stored in a folder on Virtual Server A (2). Cloud Consumer B uses Proprietary User Portal A to administer legacy software (not shown) installed on Virtual Server D (3). Proprietary User Portal B and Proprietary User Portal C are also available for accessing additional legacy systems located on Virtual Server F; however, they are not often used.

The cloud shown in the figure is a private cloud. Department A and Department B share IT resources within the private cloud and are part of the same organization. Cloud Service Consumer A belongs to Department A and Cloud Consumer B belongs to Department B.

During routine access of Cloud Service A by Cloud Service Consumer A, the Department A cloud resource administrator is notified that a hardware fault is occurring within Physical Server A that will soon cause it to fail. The cloud resource administrator scrambles to arrange for Cloud Service A to be relocated but is unable to do so before Physical Server A does fail. It takes several more hours of downtime until, with the cooperation of the cloud provider, the Cloud Service A implementation is successfully moved to Physical Server C and made live again. Managers at Department A demand that a system be put in place to avoid this scenario in the future.

Cloud Service A was initially developed specifically for Department A's Cloud Service Consumer A. However, recently Department B has indicated that it will be developing its own cloud service consumer that will also need to regularly access Cloud Service A. After this new cloud service consumer is deployed, both Department A and Department B experience occasional runtime errors when their cloud service consumers attempt to access Cloud Service A at the same time.

Cloud Service A accesses a legacy system on Virtual Server A that requires regular updates and patches to stay current. Each time the legacy system is updated, Cloud Service A needs to undergo an update as well, during which it needs to be temporarily unavailable. Department A managers ask the cloud provider to extend the cloud architecture so that a duplicate, secondary implementation of Cloud Service A can be made available while the primary implementation undergoes a maintenance update.

Which of the following statements provide a solution that can adequately resolve all of Departments A and B's issues?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Lynelle
4 months ago
Wait, why would they need a duplicate service for updates? Seems excessive.
upvoted 0 times
...
Matt
4 months ago
Totally agree with B, it covers both failover and scaling!
upvoted 0 times
...
Rikki
4 months ago
Not sure if live VM migration is always reliable, though.
upvoted 0 times
...
Laticia
4 months ago
I think option B sounds solid for handling server failures.
upvoted 0 times
...
Denise
5 months ago
A private cloud setup is pretty common for departments sharing resources.
upvoted 0 times
...
Kasandra
5 months ago
Hmm, I think the key here is to parallelize the three subsequent transformation entries. Option B seems like the way to go, but I'll double-check the details.
upvoted 0 times
...
Lonna
5 months ago
I feel like withdrawal designs are not ideal in this case because you don't really want to remove an intervention if the child is relying on it. Maybe multiple baseline is safer?
upvoted 0 times
...
Marguerita
5 months ago
Okay, let me break this down step-by-step. The user logs in, the trusted site stores a session ID in a cookie, then the user is tricked to a malicious site that uses that cookie. That sounds exactly like a CSRF attack to me. I'm going to go with option C for this one.
upvoted 0 times
...
Willard
5 months ago
I think I remember that employers can access company emails... so that option A might make sense, but I'm not entirely sure.
upvoted 0 times
...
Mendy
5 months ago
Hmm, I'm not totally sure about this one. I'll have to think it through carefully. Maybe I should eliminate the options that don't seem to fit first.
upvoted 0 times
...
Rocco
5 months ago
This seems like a straightforward question about agile development principles. I'm pretty confident I can identify the correct answer.
upvoted 0 times
...

Save Cancel