Matilda Morrison
Quiz von , erstellt am more than 1 year ago

Quiz am ism120-172, erstellt von Matilda Morrison am 11/07/2017.

258
5
0
Matilda Morrison
Erstellt von Matilda Morrison vor etwa 7 Jahre
Schließen

ism120-172

Frage 1 von 40

1

What is a benefit of using content addressed storage (CAS) as an archival solution?

Wähle eine der folgenden:

  • Provides the ability to perform production operations on the CAS

  • Supports location independence using different content IDs for an object

  • Ensures content authenticity and integrity

  • Enables modification of archived data

Erklärung

Frage 2 von 40

1

What is determined based on the recovery point objective in an asynchronous remote replication?

Wähle eine der folgenden:

  • Size of the replica

  • Size of the buffer

  • Response time

  • Location of the source

Erklärung

Frage 3 von 40

1

What is an accurate statement about full volume replication?

Wähle eine der folgenden:

  • Target device is at least as large as the source device

  • Target device is accessible only after the replication sessionstarts

  • Target and source devices should be on different storage arrays

  • Target device requires only a fraction of the space used by the source device

Erklärung

Frage 4 von 40

1

What is an accurate statement about a virtual machine (VM) snapshot?

Wähle eine der folgenden:

  • Provides the capability to delete the parent VM once the snapshot is created

  • Captures the state and data of a running VM at a specific point-in-time

  • Runs as an independent copy from the parent VM

  • Provides the capability to restore VM data to any point-in-time

Erklärung

Frage 5 von 40

1

What is a benefit of deploying a multi-site storage system-based remote replication solution?

Wähle eine der folgenden:

  • Requires low networkbandwidth to perform synchronous replication

  • Provides the capability to recover data to any point-in-time

  • Enables a consistent near-zero RPO in the event of source and remote site failures

  • Ensures disaster recovery protection remains available in the event of source or remote site
    failures

Erklärung

Frage 6 von 40

1

Which EMC product provides a remote replication solution for EMC VMAX3 storage systems?

Wähle eine der folgenden:

  • ProtectPoint

  • MirrorView

  • SnapSure

  • SRDF

Erklärung

Frage 7 von 40

1

What determines how far back the recovery points can go in a continuous data protection (CDP)
solution?

Wähle eine der folgenden:

  • Size of the CDP appliance used for replication

  • Type of write splitter used for replication

  • Amount of space that is configured for the journal

  • Size of the source and replica volumes

Erklärung

Frage 8 von 40

1

What is a benefit of implementing a virtual machine (VM) storage migration?

Wähle eine der folgenden:

  • Improves the security of applications running inside VMs on the migrated storage system

  • Balances storage utilization by redistributingVMs across different storage systems

  • Enables VMs to keep functioning even if the source data is lost due to a failure

  • Reduces the overall storage systemcapacity requirements for organizations

Erklärung

Frage 9 von 40

1

What is an accurate statement about hypervisor-based continuous data protection (CDP)?

Wähle eine der folgenden:

  • Journal and replica use the same storage volume

  • Journal is stored in a virtual machine

  • Write splitter is embedded in the hypervisor

  • Virtual appliance runs on a storage system

Erklärung

Frage 10 von 40

1

What is an example of an active attack on an IT infrastructure?

Wähle eine der folgenden:

  • Attempt to gain access to the data in transit

  • Attempt to gain unauthorized access into the system

  • Attempt tocopy the data from the storage system

  • Attempt to modify information for malicious purposes

Erklärung

Frage 11 von 40

1

What is compromised by a passive attack on an IT infrastructure?

Wähle eine der folgenden:

  • Integrity

  • Confidentiality

  • Availability

  • Repudiation

Erklärung

Frage 12 von 40

1

What is an accurate statement about a denial-of-service attack?

Wähle eine der folgenden:

  • Intentional misuse of privileges to compromisedata security

  • Prevents legitimate users from accessing resources or services

  • Captures a user’s credentials and then sends to the attacker

  • Gaining unauthorized access to a user’s accounts and data

Erklärung

Frage 13 von 40

1

Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false website?

Wähle eine der folgenden:

  • Repudiation

  • Man-in-the-middle

  • Denial-of-service

  • Phishing

Erklärung

Frage 14 von 40

1

What accurately describes an attack vector in an IT infrastructure?

Wähle eine der folgenden:

  • Amount of effort required to exploit vulnerabilities in the infrastructure

  • Various entry points that can be used to launch an attack

  • Series of steps that must be followed in order to complete an attack

  • Process of identifying the system components under attack

Erklärung

Frage 15 von 40

1

What is a benefit of deploying a Defense in Depth strategy?

Wähle eine der folgenden:

  • Provides additional time for organizations to detect and respond to an attack

  • Eliminates the attack vector from the IT infrastructure

  • Enables organizations to deploy a unified security solution

  • Eliminates the attack surface from the IT infrastructure

Erklärung

Frage 16 von 40

1

In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot
function as an E_Port and cannot be used to create an interswitch link. Which security mechanism
should the administrator use?

Wähle eine der folgenden:

  • Port binding

  • Port type locking

  • Persistent port disable

  • Fabric binding

Erklärung

Frage 17 von 40

1

In an FC SAN environment, which security mechanism prevents a switch port from being enabled
even after a switch reboot?

Wähle eine der folgenden:

  • Port binding

  • Port locking

  • Port type locking

  • Fabric binding

Erklärung

Frage 18 von 40

1

What enables an administrator to create device groups in an IP-SAN for restricting device
communications to a group?

Wähle eine der folgenden:

  • Security identifier

  • Demilitarized zone

  • NIC teaming

  • iSNSdiscovery domain

Erklärung

Frage 19 von 40

1

How do VSANs ensure security in an IT infrastructure?

Wähle eine der folgenden:

  • By authenticating a new switch thatjoins a fabric

  • By limiting the number of switches in a fabric

  • By providing isolation over a shared infrastructure

  • By prohibiting an unused switch port from being used

Erklärung

Frage 20 von 40

1

What is an accurate statement about OAuth security control?

Wähle eine der folgenden:

  • Enables initiators and targets to authenticate each other by using a shared secret code

  • Enables an organization to use authentication services from an identity provider

  • Allows a client to access protectedresources from a resource server on behalf of a resource owner

  • Provides strong authentication for client-server applications by using secret-key cryptography

Erklärung

Frage 21 von 40

1

What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP)
control?

Wähle eine der folgenden:

  • Enables initiators and targets to authenticateeach other by using a shared secret code

  • Provides strong authentication for client-server applications by using secret-key cryptography

  • Allows a client to access protected resources from a resource server on behalf of a resource
    owner

  • Enables anorganization to use authentication services from an identity provider

Erklärung

Frage 22 von 40

1

What is an accurate statement about OpenID control?

Wähle eine der folgenden:

  • Allows a client to access protected resources from a resource server on behalf of aresource owner

  • Enables initiators and targets to authenticate each other by using a shared secret code

  • Provides strong authentication for client-server applications by using secret-key cryptography

  • Enables an organization to use authentication services from an identity provider

Erklärung

Frage 23 von 40

1

Which technique is used in Kerberos to authenticate a client-server application across an insecure
network?

Wähle eine der folgenden:

  • One-way hash function

  • Shared secret

  • Secret-key cryptography

  • OpenID control

Erklärung

Frage 24 von 40

1

Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions
by scanning and analyzing events to detect if they are statistically different from normal events?

Wähle eine der folgenden:

  • Profile-based

  • Anomaly-based

  • Signature-based

  • Device-based

Erklärung

Frage 25 von 40

1

Which method is used to establish a VPN connection between a primary and remote data center
to perform secure remote replication?

Wähle eine der folgenden:

  • Remote access VPN connection

  • Intra-site VPN connection

  • Long distance VPN connection

  • Site-to-site VPN connection

Erklärung

Frage 26 von 40

1

What is an activity in the risk assessment step of risk management?

Wähle eine der folgenden:

  • Plan and deploy security controls

  • Continuously observethe existing risks

  • Determine the likelihood of a risk

  • Identify the sources of threats that increase the risks

Erklärung

Frage 27 von 40

1

What is the purpose of monitoring capacity in a storage infrastructure?

Wähle eine der folgenden:

  • Evaluating utilization of components and identifying bottlenecks

  • Tracking the amount of storage infrastructure resources used and available

  • Tracking configuration changes to the storage infrastructure elements

  • Identifying component failures that may lead to service unavailability

Erklärung

Frage 28 von 40

1

Which EMC product enables management for Vblock systems?

Wähle eine der folgenden:

  • Unified Infrastructure Manager

  • MirrorView

  • Service Assurance Suite

  • ViPR SRM

Erklärung

Frage 29 von 40

1

What is an example of an availability management task in storage infrastructure management

Wähle eine der folgenden:

  • Performing trend analysis of storage space consumption

  • Tracking configuration changes to storage components

  • Designing a new replication solution for data redundancy

  • Specifying storage space quotas for users

Erklärung

Frage 30 von 40

1

Which EMC product provides automated monitoring and reporting of a software-defined storage
infrastructure?

Wähle eine der folgenden:

  • FAST VP

  • Avamar

  • SnapSure

  • ViPR SRM

Erklärung

Frage 31 von 40

1

What is an accurate statement about infrastructure discovery?

Wähle eine der folgenden:

  • Standardizes on-going infrastructure management activities and assesses potential risks of the
    activities

  • Createsan inventory of infrastructure components and provides information about the components

  • Classifies, organizes, and analyzes all infrastructuremanagement best practices stored in data
    lakes

  • Detects potential security attacks on a storage infrastructure and deploys specialized tools to
    eliminate the attacks

Erklärung

Frage 32 von 40

1

Which data center characteristic ensures that data is stored and retrieved exactly as it was
received?

Wähle eine der folgenden:

  • Data integrity

  • Security

  • Scalability

  • Manageability

Erklärung

Frage 33 von 40

1

What is a characteristic of a scale-out NAS?

Wähle eine der folgenden:

  • File system grows dynamically as nodes are added in the cluster

  • Upto four file systems can be created across the cluster

  • Distinct file systems are created on each node in the cluster

  • Different file systems can be mixed on each node in a single cluster

Erklärung

Frage 34 von 40

1

A customer has a requirement to perform a backup each night. However, the customer has a
limited amount of time for backups to run on week nights, Monday through Friday evenings.

Wähle eine der folgenden:

  • Incremental

  • Cumulative

  • Full

  • Differential

Erklärung

Frage 35 von 40

1

What is a benefit when a node is added to a scale-out NAS cluster?

Wähle eine der folgenden:

  • Increased cluster performance

  • Reduced capital expenditure

  • Simplified cluster management

  • Decreased data duplication

Erklärung

Frage 36 von 40

1

Why should a replica be consistent with its source?

Wähle eine der folgenden:

  • Ensure the usability of the replica

  • Reduce the need to create multiple replicas

  • Ensure the security of the replica

  • Reduce the size of the replica

Erklärung

Frage 37 von 40

1

What is an example of a security management task in a storage infrastructure?

Wähle eine der folgenden:

  • Configuring LUN masking to restrict hosts from accessing a specific LUN

  • Enforcing storage space quotas to restrict users from overprovisioning resources

  • Restricting the number of simultaneous client access to application servers

  • Enabling sending messages to a support center in the event of resource failure

Erklärung

Frage 38 von 40

1

In an object-based storage system, which elements are associated with an object?

Wähle eine der folgenden:

  • Metadata, object ID, attributes, and file path

  • Metadata, LUN ID, data, and object ID

  • Object ID, attributes, LUN ID, and file path

  • Metadata, object ID, data, and attributes

Erklärung

Frage 39 von 40

1

In continuous data protection (CDP) remote replication, where are the two split write I/Os of an
incoming write I/O directed?

Wähle eine der folgenden:

  • One I/O goes to the remote CDP appliance and the other I/O goes to the replica

  • One I/O goes to the local CDP appliance and the other I/O goes to the production volume

  • One I/O goes to the compute system and the other I/O goes to the production volume

  • One I/O goes to the journal volume and the other I/O goes to the replica

Erklärung

Frage 40 von 40

1

What describes an advantage of the changed block tracking backup technique?

Wähle eine der folgenden:

  • Enable restoration to any point-in-time

  • Increase backup device performance

  • Reduce the backup window

  • Eliminatethe need for data deduplication

Erklärung