Lasqueira

Beschreibung

sdsdsds
Julio Cesar
Quiz von Julio Cesar, aktualisiert more than 1 year ago
Julio Cesar
Erstellt von Julio Cesar vor etwa 4 Jahre
12
0

Zusammenfassung der Ressource

Frage 1

Frage
In which stage of the business continuity planning lifecycle does an organization identify critical business processes and assign recovery priorities?
Antworten
  • Analyzing
  • Establishing objectives
  • Designing and developing
  • Implementing

Frage 2

Frage
What is an example of an active attack on an IT infrastructure?
Antworten
  • Attempt to modify information for malicious purposes
  • Attempt to copy the data from the storage system
  • Attempt to gain unauthorized access into the system
  • Attempt to gain access to the data in transit

Frage 3

Frage
A Fibre Channel switch has eight ports and all ports must be operational 24x7. However, a failure of Port 5 occurs on a particular week as follows: - Monday = 11 AM to 12 PM - Thursday = 7 AM to 11 AM - Saturday = 11 AM to 1 PM What is the availability of Port 5 in that week?
Antworten
  • 93%
  • 94.1%
  • 95.8%
  • 97%

Frage 4

Frage
What is a benefit of implementing a virtual machine (VM) storage migration?
Antworten
  • Balances storage utilization by redistributing VMs across different storage systems
  • Enables VMs to keep functioning even if the source data is lost due to a failure
  • Improves the security of applications running inside VMs on the migrated storage system
  • Reduces the overall storage system capacity requirements for organizations

Frage 5

Frage
How do VSANs ensure security in an IT infrastructure?
Antworten
  • By providing isolation over a shared infrastructure
  • By authenticating a new switch that joins a fabric
  • By limiting the number of switches in a fabric
  • By prohibiting an unused switch port from being used

Frage 6

Frage
An application generates 8400 small random I/Os at peak workloads with a read/write ratio of 2:1. What is the disk load at peak activity for a RAID 5 configuration?
Antworten
  • 4800
  • 11200
  • 16800
  • 22400

Frage 7

Frage
An organization plans to deploy a deduplication solution by retaining their legacy backup application. They are concerned about the application servers' performance and a long backup window during backups. Which deduplication solution(s) should be recommended to the organization?
Antworten
  • Post-process
  • Source-based global deduplication
  • Variable-length segment and source-based
  • Fixed-length block and source-based

Frage 8

Frage
In a virtualized environment, which method enables a virtual machine to be rolled back in case of a logical corruption to the virtual machine?
Antworten
  • Virtual volume replication
  • VM snapshot
  • Storage array volume replication
  • VM clone

Frage 9

Frage
What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?
Antworten
  • A dedicated VLAN must be configured for each VSAN
  • VLANs configured for VSANs must carry regular LAN traffic
  • Default VLAN must map to all VSANs defined in the FCoE switch
  • A minimum of four VLANs must be created to isolate VSAN traffic

Frage 10

Frage
What is a characteristic of target-based inline deduplication?
Antworten
  • Deduplication processing occurs on the client before backup data is sent to the backup device
  • Backup data is stored on the backup device and then deduplication is performed
  • Changes must be made in the backup software to implement deduplication
  • Deduplication processing occurs at the backup device before it is stored on the backup device

Frage 11

Frage
Which Internet of Things (IoT) component is responsible for the automation of operations by applying a force based on the dynamics of data?
Antworten
  • Actuator
  • Switch
  • Sensor
  • Gateway

Frage 12

Frage
What is a benefit of backing up data to a disk library?
Antworten
  • Provides improved backup and recovery performance
  • Provides built-in portability to meet offsite requirements
  • Supports the shoe shining effect for improved backup performance
  • Pre-configured and dedicated appliance is only used for backups

Frage 13

Frage
What is an accurate statement about the function of an archiving server?
Antworten
  • Enables the ability to configure policies for archiving data
  • Installs agentson the archiving storage device
  • Scans the data that can bearchived on application servers
  • Creates stub files on an archiving storage device

Frage 14

Frage
What determines how far back the recovery points can go in a continuous data protection (CDP) solution?
Antworten
  • Amount of space that is configured for the journal
  • Size of the CDP appliance used for replication
  • Size of the source and replica volumes
  • Type of write splitter used for replication

Frage 15

Frage
Which capability does big data analytics provide?
Antworten
  • Enabling data-driven decisions from large volumes of data
  • Storing large volumes of data without affecting availability
  • Reducing the data storage capacity requirement
  • Performing analytics using traditional tools

Frage 16

Frage
Which type of LUN provides full control for precise data placement and allows an administrator to create LUNs on different RAID sets if there is workload contention?
Antworten
  • Traditional
  • Thin
  • Journal
  • Bitmap

Frage 17

Frage
Why is it important for organizations to store, protect, and manage their data?
Antworten
  • Reduce the amount of data to be replicated, migrated, and backed up.
  • Rapidly develop and deploy modern applications for business improvement
  • Develop new business opportunities by leveraging existing data
  • Reduce the complexity in managing the data center environment.

Frage 18

Frage
Which EMC product is a VNX array-based local replication software that creates a full volume mirror of the source?
Antworten
  • SnapView Snapshot
  • SnapView Clone
  • TimeFinder/Snap
  • TimeFinder/Clone

Frage 19

Frage
What is an advantage of performing cumulative backups compared to incremental backups for the same data?
Antworten
  • Facilitates faster restores
  • Facilitates faster backups
  • Reduces the storage space required for backups
  • Eliminates the need for full backups

Frage 20

Frage
When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration?
Antworten
  • 3
  • 4
  • 8
  • 12

Frage 21

Frage
A company's Finance department needs 200 GB of storage for their business applications. A LUN is created with 200 GB and RAID 1 is configured to support the applications. If the cost of storage per GB is $2, what is the chargeback cost to the department for application storage?
Antworten
  • 200
  • 400
  • 800
  • 1500

Frage 22

Frage
Which solid state drive component performs write coalescing?
Antworten
  • Controller
  • I/O interface
  • Non-volatile memory
  • Cache

Frage 23

Frage
In the event of a disk failure, which RAID level enables quick data reconstruction?
Antworten
  • RAID 3
  • RAID 5
  • RAID 6
  • RAID 10

Frage 24

Frage
In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object?
Antworten
  • From the metadata of an object.
  • By using the logical address of the memory space
  • From the binary representation of an object.
  • By using the physical address of the storage device.

Frage 25

Frage
What is a benefit of a "recovery-in-place" backup approach in a virtualized data center?
Antworten
  • Provides instant recovery of a failed virtual machine
  • Reduces the recovery point objective
  • Eliminates redundant data during virtual machine backups
  • Eliminates the backup window

Frage 26

Frage
Which cloud service does VMware vCloud Air provide?
Antworten
  • Infrastructure as a Service
  • Platform as a Service
  • Database as a Service
  • Software as a Service

Frage 27

Frage
What is an accurate statement about Software as a Service?
Antworten
  • Consumer has limited control over user-specific application configuration settings
  • Consumer has control over the operating systems and deployed applications
  • Consumer has control over the configuration settings of the application-hosting environment
  • Consumer has limited control over select networking components, such as host firewalls

Frage 28

Frage
What is an accurate statement about incremental forever backups?
Antworten
  • Requires only one initial full back up
  • Requires periodic full back ups
  • Backup is not created directly from the production data
  • Copies the data that has changed since the last full back up

Frage 29

Frage
Which technology is used in the media and entertainment industry to enable content-based search activity and to create video subtitles using natural language processing?
Antworten
  • Machine learning
  • Social networking
  • Cloud computing
  • Internet of Things

Frage 30

Frage
What accurately describes the scale-out storage architecture?
Antworten
  • Scales the capacity only within a single storage system
  • Provides a fixed capacity ceiling that limits scalability beyond a storage system.
  • Provides the capability to maximize its capacity by adding nodes to the cluster.
  • Restricts scalability to the limits of the storage controllers.

Frage 31

Frage
What is an accurate statement about a virtual tape library?
Antworten
  • Legacy backup software can be used without additional modules or changes
  • Portability of physical tapes tooffsite locations is supported
  • Only sequential data access for both backup and recovery is supported
  • Regular maintenance tasks associated with a physical tape drive are required

Frage 32

Frage
What is a component of an FCoE switch?
Antworten
  • Ethernet Bridge
  • Virtual N_Port
  • Converged Network Adapter
  • FCIP Forwarder

Frage 33

Frage
Which part of the Fibre Channel (FC) frame does the label "X" represent in the exhibit? https://cdn.goconqr.com/uploads/media/image/31472577/desktop_a2aab2d7-3a0d-484c-b248-f945e266be47.png
Antworten
  • Frame Header
  • CRC
  • SOF
  • Data Field

Frage 34

Frage
What is an accurate statement about Platform as a Service?
Antworten
  • Consumer has control over the deployed applications
  • Consumer has control over the operating system and database management system
  • Consumer has control over the programming languages and tools
  • Consumer has control over the operating system and storage

Frage 35

Frage
A start-up company with a limited budget is planning to adopt a hybrid cloud solution for their operations. The company has business-critical applications that serve customers and have strict service levels. In addition, the company has less critical applications such as backup and archive. Which hybrid cloud strategy should be recommended to the company?
Antworten
  • Deploy the business-critical applications on an externally-hosted private cloud. Deploy the less critical applications on a public cloud.
  • Deploy the business-critical applications on an on-premise private cloud. Deploy the less critical applications on an externally-hosted private cloud.
  • Deploy the business-critical applications on an on-premise private cloud. Deploy the less critical applications on a public cloud.
  • Deploy the business-critical applications on an externally-hosted private cloud. Deploy the less critical applications on an on-premise private cloud.

Frage 36

Frage
What is an accurate statement about Governance?
Antworten
  • Restrict access to certain users
  • Ensure removal of security risks
  • Authorize policy-making decisions
  • Demonstrate adherence to polices

Frage 37

Frage
Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events?
Antworten
  • Anomaly-based
  • Signature-based
  • Profile-based
  • Device-based

Frage 38

Frage
Which data center characteristic ensures that adequate resources are provided to efficiently store and process data?
Antworten
  • Capacity
  • Availability
  • Scalability
  • Performance

Frage 39

Frage
An application uses ten, 15 GB devices. A pointer-based full volume replica of the application is required. The replica will be kept for 24 hours and the data changes by 10% every 24 hours. How much storage should be allocated for the replication?
Antworten
  • 15 GB
  • 30 GB
  • 150 GB
  • 300 GB

Frage 40

Frage
What is an advantage of implementing file-level virtualization in a data center environment?
Antworten
  • Provides non-disruptive file mobility across NAS devices
  • Allows users the ability to only use a physical path to access files
  • Provides the capability to access files from any device
  • Provides dynamic distribution of files across NAS clients.

Frage 41

Frage
In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link. Which security mechanism should the administrator use?
Antworten
  • Port type locking
  • Port binding
  • Persistent port disable
  • Fabric binding

Frage 42

Frage
In continuous data protection (CDP) remote replication, where are the two split write I/Os of an incoming write I/O directed?
Antworten
  • One I/O goes to the local CDP appliance and the other I/O goes to the production volume
  • One I/O goes to the compute system and the other I/O goes to the production volume
  • One I/O goes to the remote CDP appliance and the other I/O goes to the replica
  • One I/O goes to the journal volume and the other I/O goes to the replica

Frage 43

Frage
What accurately describes a shared pool in virtual provisioning?
Antworten
  • Should contain only homogeneous disk drive types
  • Supports a single RAID protection level.
  • Consists of only a virtual storage volume.
  • Should contain only physical drives with different sizes

Frage 44

Frage
An organization has several virtual machines (VMs) deployed in their data center. The VM files are stored on a block-based storage system. The applications on the VMs are impacted during VM backup because the backup agents on the VMs are consuming a large amount of resources. Which alternate backup solution is recommended to address this issue?
Antworten
  • Image-based back
  • Three-way NDMP backup
  • Two-way NDMP backup
  • Target-based deduplication backup

Frage 45

Frage
What enables an administrator to create device groups in an IP-SAN for restricting device communications to a group?
Antworten
  • iSNS discovery domain
  • NIC teaming
  • Demilitarized zone
  • Security identifier

Frage 46

Frage
Which technology combines NAND flash memory into a hard disk drive and is a single, integrated device incorporating both types of storage?
Antworten
  • Solid-state drive
  • Dual drive
  • Fibre Channel drive
  • Solid-state hybrid drive

Frage 47

Frage
An application generates 8400 small random I/Os at peak workloads with a read/write ratio of 2:1. What is the disk load at peak activity for a RAID 1/0 configuration?
Antworten
  • 5600
  • 11200
  • 16800
  • 22400

Frage 48

Frage
Which type of digital data consists of textual data with inconsistent formats but can be formatted with the use of software tools?
Antworten
  • Quasi-structured data
  • Semi-structured data
  • Metadata
  • Unstructured data

Frage 49

Frage
What is an accurate statement about a software RAID implementation?
Antworten
  • Uses CPU cycles of a compute system to perform RAID calculations
  • Supports the upgrade of RAID software on incompatible O/S
  • Uses a specialized hardware controller to perform RAID calculations
  • Supports all RAID levels

Frage 50

Frage
What is an advantage of the changed block tracking backup technique?
Antworten
  • Reduces the backup window
  • Enables restoration to any point-in-time
  • Eliminates the need for data deduplication
  • Increases backup device performance

Frage 51

Frage
When implementing a full mesh topology in a Fibre Channel (FC) SAN environment, what is the effect when there is an increase in the number of switches?
Antworten
  • Reduces the available node ports for ISL connectivity.
  • Increases the load on the ISLs due to traffic aggregation.
  • Increases the hop count for compute to storage traffic
  • Reduces the available switch ports for node connectivity.

Frage 52

Frage
What is an accurate statement about OAuth security control?
Antworten
  • Allows a client to access protected resources from a resource server on behalf of a resource owner
  • Provides strong authentication for client-server applications by using secret-key cryptography
  • Enables initiators and targets to authenticate each other by using a shared secret code
  • Enables an organization to use authentication services from an identity provider

Frage 53

Frage
If a company has experienced a passive attack on its IT infrastructure, how is the company's security impacted?
Antworten
  • Access to services is denied
  • Availability of data is affected.
  • Information privacy is compromised.
  • Data is altered by an unauthorized user.

Frage 54

Frage
An organization plans to deploy a new backup device in their data center. The organization wants the new backup device to support their legacy backup software without requiring any changes to the software. In addition, the organization wants the backup device to provide random data access for better performance. Which backup device should be recommended?
Antworten
  • Virtual tape library
  • Tape-based backup appliance
  • Tape library
  • Optical juke box

Frage 55

Frage
What is an accurate statement about stretched VLANs?
Antworten
  • Reduces network bandwidth requirements during VM migration across sites.
  • Requires a change in the VMs' IP addresses to match the addressing scheme at the other sites.
  • Enables automatic modification of VLAN addresses during VM migration across sites.
  • Supports migration of VMs across sites without the need to change their network configurations.

Frage 56

Frage
Which cloud deployment model allows provisioning of a cloud infrastructure only for use by a single organization having multiple consumers?
Antworten
  • Public cloud
  • Multi-cloud
  • Hybrid cloud
  • Private cloud

Frage 57

Frage
What is the goal of a business continuity solution?
Antworten
  • Reduce the amount of investment in protecting an organization's business-related data
  • Avoid a disaster in a data protection environment to control the loss of data.
  • Ensure information availability that is required to conduct vital business operations.
  • Eliminate security threats in a data protection environment for continuous access to data.

Frage 58

Frage
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?
Antworten
  • Data link
  • Presentation
  • Session
  • Application

Frage 59

Frage
What is an example of an availability management task in storage infrastructure management?
Antworten
  • Designing a new replication solution for data redundancy
  • Performing trend analysis of storage space consumption
  • Tracking configuration changes to storage components
  • Specifying storage space quotas for users

Frage 60

Frage
Which type of storage system is built specifically for storing fixed content?
Antworten
  • Content addressed storage
  • Block-based storage
  • File-based storage
  • Unified storage

Frage 61

Frage
What is an example of a Performance Management task?
Antworten
  • Selecting an appropriate RAID type for a storage pool.
  • Removing unused resources from a service and reassigning them to another.
  • Scanning applications and databases to identify vulnerabilities.
  • Planning and architecting data backup and replication solutions.

Frage 62

Frage
Which method is used to establish a VPN connection between a primary and remote data center to perform secure remote replication?
Antworten
  • Site-to-site VPN connection
  • Remote access VPN connection
  • Intra-site VPN connection
  • Long distance VPN connection

Frage 63

Frage
What is a characteristic of an FC-AL implementation?
Antworten
  • Reserves one address for connecting an FC-SW port
  • Supports connectivity up to 15 million nodes
  • Devices can be added and removed dynamically without any impact
  • Requires at least one connectivity device

Frage 64

Frage
An organization performs a full back up every Sunday and incremental back ups on the remaining days at 9:00 AM. However, at 10 PM on Friday, a data corruption occurs that requires a data restoration from the backup copies. How many backup copies are required to perform this restoration?
Antworten
  • 2
  • 4
  • 5
  • 6

Frage 65

Frage
An organization plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 9800 IOPS with a typical I/O size of 4 KB. The capacity of each available disk drive is 250 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS. What is the minimum number of disk drives needed to meet the application's capacity and performance requirements given a RAID 0 configuration?
Antworten
  • 8
  • 70
  • 110
  • 140

Frage 66

Frage
A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings. Which backup granularity type is recommended to meet the backup window for those nights?
Antworten
  • Incremental
  • Cumulative
  • Full
  • Differential

Frage 67

Frage
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?
Antworten
  • Dell InTrust
  • Dell Change Auditor
  • VMware AppDefense
  • VMware AirWatch

Frage 68

Frage
What is a function of the NDMP server in an NDMP-based backup approach?
Antworten
  • Reads the data from the storage device and sends the data to the backup device
  • Reads the data from the backup server and sends the data to the backup device
  • Instructs the NAS head to startthe backup operation
  • Instructs the backup agent on the client to send the data to the backup device

Frage 69

Frage
Which file system uses a MapReduce framework to run applications and a NameNode for managing the file system?
Antworten
  • New Technology File System (NTFS)
  • Hadoop Distributed File System (HDFS)
  • Network File System (NFS)
  • Common Internet File System (CIFS)

Frage 70

Frage
What contains the information about backup configuration and backup metadata?
Antworten
  • Backup catalog
  • Proxy server
  • Tracking database
  • Backup image

Frage 71

Frage
In an FCoE switch, which function is provided by the Fibre Channel Forwarder (FCF)?
Antworten
  • Communication bridge between CEE and IP networks
  • Communication bridge between FC and FCIP networks
  • Communication bridge between CEE and FCIP networks
  • Communication bridge between CEE and FC networks

Frage 72

Frage
What is a benefit when a node is added to a scale-out NAS cluster?
Antworten
  • Increased cluster performance
  • Reduced capital expenditure
  • Simplified cluster management
  • Decreased data duplication

Frage 73

Frage
An administrator has defined a backup policy. Full backups will be performed at 8 PM every Monday and incremental backups performed at 8 PM the remaining days. How many backup copies are required to restore the files if they were accidentally deleted on Friday morning?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 74

Frage
What refers to an IT infrastructure's ability to function based on business expectations during its specified time of operations?
Antworten
  • Information availability
  • Disaster recovery
  • Compliance adherence
  • Business agility

Frage 75

Frage
Which functionality does a Control layer provide in a software-defined networking architecture?
Antworten
  • Defining the network behavior through various policies.
  • Making decisions on how the packets should be forwarded.
  • Establishing communications between the Infrastructure and Interface layers.
  • Forwarding data packets based on the requirements from the Application layer.

Frage 76

Frage
What is an accurate statement about a virtual machine (VM) snapshot?
Antworten
  • Captures the state and data of a running VM at a specific point-in-time
  • Provides the capability to delete the parent VM once the snapshot is created
  • Runs as an independent copy from the parent VM
  • Provides the capability to restore VM data to any point-in-time

Frage 77

Frage
An Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port4 occurs as follows: - Monday = 8 PM to 9 PM - Wednesday 7 PM to 9 PM - Thursday = 6 AM to 9 AM - Saturday = 4 PM to 7 PM What is the MTTR of Port 4?
Antworten
  • 2 hours
  • 3 hours
  • 28 hours
  • 38 hours

Frage 78

Frage
What is a benefit of using content addressed storage (CAS) as an archival solution?
Antworten
  • Ensures content authenticity and integrity
  • Supports location independence using different content IDs for an object
  • Provides the ability to perform production operations on the CAS
  • Enables modification of archived data

Frage 79

Frage
A customer wants 24x7 availability for a business application that uses a file system. Which operation ensures a consistent replica of the file system?
Antworten
  • Unmount the file system prior to the creation of the replica
  • Stop the application prior to the creation of the replica
  • Flush the file system buffers after creation of the replica
  • Flush the file system buffers before creation of the replica

Frage 80

Frage
Which EMC product provides a remote replication solution for EMC VMAX3 storage systems?
Antworten
  • SRDF
  • SnapSure
  • MirrorView
  • ProtectPoint

Frage 81

Frage
What is determined by the recovery point objective in a business continuity solution?
Antworten
  • Frequency of the backup
  • Type of backup devices
  • Type of disaster recovery site
  • Distance between the primary and disaster recovery sites

Frage 82

Frage
Why is it important for organizations to maintain a copy of data at a remote site?
Antworten
  • Ensure disaster recovery
  • Provide operational recovery
  • Ensure data archiving to meet regulatory requirements
  • Provide flexibility to use stub files for production operations

Frage 83

Frage
What is a function of the metadata service in an object-based storage device (OSD)?
Antworten
  • Generates the file system namespace from the file contents.
  • Manages both physical and logical disks on which the user data is stored
  • Manages the storage space for all remote clients.
  • Maintains the object IDs and file system namespace mappings.

Frage 84

Frage
In an FC SAN environment, which security mechanism prevents a switch port from being enabled even after a switch reboot?
Antworten
  • Port locking
  • Port type locking
  • Port binding
  • Fabric binding

Frage 85

Frage
An organization plans to deploy a new application in their environment. The new application requires 3 TB of storage space. During peak workloads, the application is expected to generate 2450 IOPS with a typical I/O size of 2 KB. The capacity of each available disk drive is 500 GB. The maximum number of IOPS a drive can perform at with 70 percent utilization is 90 IOPS. What is the minimum number of disk drives needed to meet the application's capacity and performance requirements given a RAID 0 configuration?
Antworten
  • 6
  • 16
  • 25
  • 28

Frage 86

Frage
A consumer is interested in a service that provides multiple operating systems and programming frameworks for application development and deployment. Which recommended cloud service model will meet these requirements?
Antworten
  • Storage as a Service
  • Platform as a Service
  • Infrastructure as a Service
  • Software as a Service

Frage 87

Frage
What accurately describes hypervisor-based continuous data protection?
Antworten
  • Virtual appliance is running on a hypervisor.
  • Journal is stored in a virtual machine.
  • Virtual appliance runs on a storage system.
  • Replica volumes are created in the hypervisor.

Frage 88

Frage
Which LUN expansion technique provides both capacity expansion and performance improvement?
Antworten
  • Striped metaLUN
  • Partitioned metaLUN
  • Virtual metaLUN
  • Concatenated metaLUN

Frage 89

Frage
In a compute-based storage area network (SAN), what is a function of the metadata manager?
Antworten
  • Holds cluster-wide mapping information and load balancing in a compute-based SAN.
  • Performs the I/O operations on the local storage of a compute system as requested by a client
  • Provides an interface to the software-defined storage controller.
  • Controls all data read and write operations in a compute-based SAN.

Frage 90

Frage
What accurately describes virtual SAN (VSAN) trunking?
Antworten
  • Reduces the utilization of ISLs by removing all the ISLs configured between the FC switches.
  • Increases the number of E_ports used for the ISLs to transfer multiple VSAN traffic
  • Increases the complexity of managing the FC SAN with an increase in the number of ISLs.
  • Reduces the number of ISLs between switches that are configured with multiple VSANs.

Frage 91

Frage
What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?
Antworten
  • FCoE switches provide MAC addresses to VN_Ports during node login
  • FC switches provide MAC addresses to VE_Ports dynamically during discovery
  • Compute systems provide MAC addresses to the VF_Ports on FCoE switches
  • Both VF_Ports and VE_Ports obtain MAC addresses from FC switches

Frage 92

Frage
What is compromised by a passive attack on an IT infrastructure?
Antworten
  • Confidentiality
  • Integrity
  • Availability
  • Repudiation

Frage 93

Frage
What is a key advantage of cloning a virtual machine (VM)?
Antworten
  • Ability to run new VMs simultaneously with the same IP address
  • Reduces the time required to create multiple copies of a VM.
  • Improves the performance of an existing VM and new VMs.
  • Eliminates the need to create multiple snapshots for a VM

Frage 94

Frage
What is an accurate statement about a hardware RAID implementation?
Antworten
  • Uses a specialized hardware controller installed on a storage array
  • Uses CPU cycles of a compute system to perform RAID calculations
  • Requires a RAID controller and operating system to be compatible
  • Offers a low-cost solution for providing disk protection

Frage 95

Frage
Which product delivers virtualized or hosted desktops and applications through a single platform?
Antworten
  • VMware Horizon
  • Dell EMC VxRail Appliance
  • VMware NSX
  • Dell PowerEdge servers

Frage 96

Frage
Which Dell EMC product enables continuous protection for any PIT recovery and offers multi-site support?
Antworten
  • RecoverPoint
  • Avamar
  • SourceOne
  • SRDF

Frage 97

Frage
Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false website?
Antworten
  • Phishing
  • Man-in-the-middle
  • Denial-of-service
  • Repudiation

Frage 98

Frage
What accurately describes an iSCSI HBA?
Antworten
  • Performs both iSCSI and TCP/IP processing
  • Requires CPU cycles for TCP/IP processing
  • Requires a software adapter with built-in functionality
  • Enables transmission of data through iSCSI tunneling

Frage 99

Frage
In a copy on first access (CoFA) technique, when is data copied from the source to the target?
Antworten
  • All writes are issued to a location on the source
  • All writes are issued to a location on the target
  • A read or write is issued for the first time to a location on the target
  • A read is issued for the first time from a location on the source

Frage 100

Frage
An application generates 4200 small random I/Os at peak workloads with a read/write ratio of 2:1. What is the disk load at peak activity for a RAID 6 configuration?
Antworten
  • 2800
  • 5600
  • 8400
  • 11200

Frage 101

Frage
Which action takes place during the login phase in an FCoE SAN?
Antworten
  • VN_Ports obtain FC addresses
  • Nodes locate the Fibre Channel Forwarder
  • Initialization protocol starts transporting FC data
  • VN_Port to N_Port pairing is established

Frage 102

Frage
Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?
Antworten
  • iSCSI HBA
  • NIC with software-based iSCSI initiator
  • TCP offload eng
  • Converged Network Adapter

Frage 103

Frage
A system has three components and all three components need to be operational for 24 hours; Monday through Friday. During a particular week, failure of component 3 occurred as follows: -Tuesday = 8 AM to 1 PM -Thursday = 5 PM to 10 PM -Friday = 5 AM to 10 AM What is the mean time between failures on component 3 for that week?
Antworten
  • 5 hours
  • 35 hours
  • 40 hours
  • 51 hours

Frage 104

Frage
An organization performs a full back up every Sunday and cumulative back ups on the remaining days. On Thursday, a data corruption occurs that requires a data restoration from the backup copies. How many backup copies are required to perform this restoration?
Antworten
  • 1
  • 2
  • 3
  • 4

Frage 105

Frage
What is signified by the "variability" characteristic of big data?
Antworten
  • Meaning of the data changes constantly
  • Data is generated in different formats by numerous sources
  • Data change rate affects its timely analysis
  • Varying data quality affects its reliability and accuracy

Frage 106

Frage
Which technique is used in Kerberos to authenticate a client-server application across an insecure network?
Antworten
  • Secret-key cryptography
  • One-way hash function
  • Shared secret
  • OpenID control

Frage 107

Frage
When using a bridged iSCSI connection, which components facilitate communication between gateways?
Antworten
  • Compute system with iSCSI ports and the storage system with Ethernet ports.
  • Compute system with iSCSI ports and the storage system with only FC ports
  • Compute system with FC HBA ports and the storage system with only FC ports.
  • Compute system with FCoE ports and the storage system with iSCSI ports.

Frage 108

Frage
Which EMC product provides automated monitoring and reporting of a software-defined storage infrastructure?
Antworten
  • ViPR SRM
  • SnapSure
  • Avamar
  • FAST VP

Frage 109

Frage
What is a benefit of link aggregation?
Antworten
  • Optimizes fabric performance by distributing network traffic across ISLs.
  • Improves ISL utilization by increasing the network traffic on a specific ISL
  • Yields a higher throughput by combining two parallel ISLs into a single physical ISL.
  • Saves bandwidth by restricting traffic to a specific potentially congested ISL

Frage 110

Frage
Winch Dell EMC product creates a server and IP-based SAN from direct-attached server storage to deliver flexible and scalable performance and capacity on demand?
Antworten
  • PowerMax
  • VxFlex OS
  • ViPR Controller
  • XtremIO

Frage 111

Frage
What accurately describes a software-defined architecture?
Antworten
  • Supports only central management of private cloud resources using a pre-defined policy.
  • Provides a unified management platform for centralized monitoring and administration.
  • Uses only converged and hyperconverged infrastructures to offer services to companies
  • Provides decentralized, manual, and policy-driven IT resource management.

Frage 112

Frage
Which cloud computing characteristic enables multi-tenancy and abstracts the location of provided resources?
Antworten
  • Resource pooling
  • Measured service
  • Rapid elasticity
  • Broad network access

Frage 113

Frage
What is an activity in the risk assessment step of risk management?
Antworten
  • Determine the likelihood of a risk
  • Plan and deploy security controls
  • Continuously observe the existing
  • Identify the sources of threats that increase the risks

Frage 114

Frage
What is an advantage of deploying a purpose-built, disk-based backup appliance in a datacenter environment?
Antworten
  • Eliminate the need for performing source-based deduplication.
  • Convert the capital expenditure to an operational expenditure.
  • Lower the recovery time objective of an organization
  • Retain the fixed content for longer periods in the data center.

Frage 115

Frage
Which component is required for a "recovery-in-place" backup approach?
Antworten
  • Disk-based backup target
  • Agent-based backupclient
  • NDMP server
  • Data deduplication server

Frage 116

Frage
What is signified by the "variety" characteristic of big data?
Antworten
  • Data is generated in different formats by numerous sources
  • Meaning of the data changes constantly
  • Varying data quality affects its reliability and accuracy
  • Data change rate affects its timely analysis

Frage 117

Frage
Which data center management process involves collating and presenting the utilization of resources?
Antworten
  • Reporting
  • Provisioning
  • Planning
  • Maintenance

Frage 118

Frage
What is an accurate statement about full volume replication?
Antworten
  • Target device is at least as large as the source device
  • Target device requires only a fraction of the space used by the source device
  • Target device is accessible only after the replication session starts
  • Target and source devices should be on different storage arrays

Frage 119

Frage
What is a characteristic of a scale-out NAS?
Antworten
  • File system grows dynamically as nodes are added in the cluster
  • Up to four file systems can be created across the cluster
  • Distinct file systems are created on each node in the cluster
  • Different file systems can be mixed on each node in a single cluster

Frage 120

Frage
What is an example of a security management task in a storage infrastructure?
Antworten
  • Configuring LUN masking to restrict hosts from accessing a specific LUN
  • Enforcing storage space quotas to restrict users from overprovisioning resources
  • Restricting the number of simultaneous client access to application servers
  • Enabling sending messages to a support center in the event of resource failure

Frage 121

Frage
What accurately describes an attack vector in an IT infrastructure?
Antworten
  • Series of steps that must be followed in order to complete an attack
  • Various entry points that can be used to launch an attack
  • Amount of effort required to exploit vulnerabilities in the infrastructure
  • Process of identifying the system components under attack

Frage 122

Frage
Why are organizations moving towards a modern data center implementation?
Antworten
  • Develop modern applications in the public cloud without having the right skill set in-house.
  • Ability to be agile, operate in real time, and develop intelligent products.
  • Deploy only unified and converged IT resources to reduce the management complexity.
  • Reduce the cost of managing data center components by using a self-service catalog.

Frage 123

Frage
What is an accurate statement about variable prefetching?
Antworten
  • Many blocks that have recently been written to storage by the compute system are retrieved and placed in cache.
  • Many non-contiguous blocks that are not currently required can be retrieved from cache in advance
  • Storage system prefetches data in multiples of the original I/O request size from the compute system.
  • Storage system prefetches many non-contiguous blocks of data, with varied sizes, from cache.

Frage 124

Frage
A backup administrator has defined a backup policy. The policy requires full backups to be performed at 10 PM every Sunday and incremental backups performed at 10 PM the remaining days. If files were accidentally deleted Wednesday morning, how many backup copies are required to restore the files?
Antworten
  • 2
  • 3
  • 4
  • 5

Frage 125

Frage
Which Dell EMC product is a hyper-scale storage infrastructure that provides universal accessibility with support for object and HDFS?
Antworten
  • ViPR Controller
  • PowerMax
  • Isilon
  • Elastic Cloud Storage

Frage 126

Frage
What is a benefit of deploying a multi-site storage system-based remote replication solution?
Antworten
  • Ensures disaster recovery protection remains available in the event of source or remote site failures
  • Provides the capability to recover data to any point-in-time
  • Requires low network bandwidth to perform synchronous replication
  • Enables a consistent near-zero RPO in the event of source and remote site failures

Frage 127

Frage
In an FCoE environment, which functionality provides a framework for the allocation of bandwidth to different network traffic classes?
Antworten
  • Enhanced transmission selection
  • Priority-based flow control
  • Congestion notification
  • Data center bridging exchange protocol

Frage 128

Frage
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?
Antworten
  • Role-based
  • Profile-based
  • Signature-based
  • Anomaly-based

Frage 129

Frage
What is determined based on the recovery point objective in an asynchronous remote replication?
Antworten
  • Size of the buffer
  • Size of the replica
  • Response time
  • Location of the source

Frage 130

Frage
A system has three components and all three components need to be operational for 24 hours; Monday through Friday. During a particular week, failure of component 1 occurred as follows: -Tuesday = 8 AM to 11 AM -Thursday = 8 PM to 10 PM -Friday = 5 AM to 9 AM What is the mean time between failures on component 1 for that week?
Antworten
  • 3 hours
  • 37 hours
  • 40 hours
  • 53 hours

Frage 131

Frage
What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?
Antworten
  • Enables initiators and targets to authenticate each other by using a shared secret code
  • Provides strong authentication for client-server applications by using secret-key cryptography
  • Allows a client to access protected resources from a resource server on behalf of a resource owner
  • Enables an organization to use authentication services from an identity provider

Frage 132

Frage
What is an accurate statement about three-way NDMP backup in a NAS environment?
Antworten
  • Backup data is sent directly from NAS to the backup device
  • Backup data is sent to the backup device through the application servers
  • A dedicated backup device is required for each NAS
  • All NAS systems should have the same operating environment

Frage 133

Frage
A company is planning to perform a cloud-based backup. They want to send their data over a public network to a cloud backup device. Which security control mechanism helps to protect the data from an attacker?
Antworten
  • Multi-factor authentication
  • Demilitarized zone
  • Data shredding
  • Encryption

Frage 134

Frage
What is an accurate statement about Infrastructure as a Service?
Antworten
  • Consumer has control over the operating systems and the deployed applications
  • Consumer only has control over user-specific application configuration settings
  • Consumer has control over network devices, compute systems, and storage systems
  • . Consumer only has control over the configuration settings of the application-hosting environment

Frage 135

Frage
What is the purpose of monitoring capacity in a storage infrastructure?
Antworten
  • Tracking the amount of storage infrastructure resources used and available
  • Evaluating utilization of components and identifying bottlenecks
  • Tracking configuration changes to the storage infrastructure elements
  • Identifying component failures that may lead to service unavailability

Frage 136

Frage
What is an accurate statement about a denial-of-service attack?
Antworten
  • Prevents legitimate users fromaccessing resources or services
  • Intentional misuse of privileges to compromise data security
  • Gaining unauthorized access to a user's accounts and data
  • Captures a user's credentials and then sends to the attacker

Frage 137

Frage
Which data archiving component scans primary storage to find the files that meet the archiving policy?
Antworten
  • Archive storage
  • Archive database server
  • Archive agent
  • Archive stub file

Frage 138

Frage
What accurately describes an Incident in a storage infrastructure?
Antworten
  • Unknown root cause of one or more disruptions to service.
  • Any event that may lead to the disruption of a service.
  • Support request to help access an IT resource
  • Any event that may create a change in correcting a known error.

Frage 139

Frage
What accurately describes the seek time of a disk drive?
Antworten
  • Time taken to position the read/write head over the correct track
  • Time taken by the platter to position the data under the read/write head
  • Time taken to read a block of data from the platter
  • Time taken by the controller to service an I/O from the application

Frage 140

Frage
A company plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is expected to generate 4500 IOPS with a typical I/O size of 4 KB. The capacity of each available disk drive is 250 GB. In addition, the maximum number of IOPS a drive can perform at with a 70% utilization is 90 IOPS. What is the minimum number of disk drives needed to meet the application's capacity and performance requirements for a RAID 0 configuration?
Antworten
  • 8
  • 40
  • 50
  • 70

Frage 141

Frage
What is an accurate statement about three-way NDMP backup in a NAS environment?
Antworten
  • Backup device can be shared among multiple NAS heads
  • Each NAS head should have a dedicated backup device
  • Backup data traverses at least three NAS heads before reaching the backup device
  • Backup is performed only when three or more NAS heads are present

Frage 142

Frage
Which type of digital data has no defined format but has a self-describing structure that enables its analysis?
Antworten
  • Semi-structured data
  • Structured data
  • Metadata
  • Quasi-structured data

Frage 143

Frage
Which data center characteristic ensures that data is stored and retrieved exactly as it was received?
Antworten
  • Data integrity
  • Security
  • Scalability
  • Manageability

Frage 144

Frage
Which EMC product enables management for Vblock systems?
Antworten
  • Unified Infrastructure Manager
  • MirrorView
  • Service Assurance Suite
  • ViPR SRM

Frage 145

Frage
Which technology decouples the OS, applications, and user state from a physical compute system?
Antworten
  • Application virtualization
  • Storage virtualization
  • Thin client virtualization
  • Desktop virtualization

Frage 146

Frage
What provides the ability to automatically relocate extents across physical storage drives over the entire pool when new drives are added to the pool?
Antworten
  • Storage pool rebalancing
  • Extent relocation
  • Storage pool tiering
  • Automated extent tiering

Frage 147

Frage
What is a key advantage of implementing FCIP?
Antworten
  • Provides a disaster recovery solution by replicating data across data centers.
  • Enables migration of VMs across data centers by using existing FC networks.
  • Ensures lossless transmission of FC traffic across data centers over Ethernet.
  • Provides a dedicated network for transmission of storage traffic within a data center.

Frage 148

Frage
Why should a replica be consistent with its source?
Antworten
  • Ensure the usability of the replica
  • Reduce the need to create multiple replicas
  • Ensure the security of the replica
  • Reduce the size of the replica

Frage 149

Frage
What is a benefit of deploying a Defense in Depth strategy?
Antworten
  • Provides additional time for organizations to detect and respond to an attack
  • Eliminates the attack vector from the IT infrastructure
  • Eliminates the attack surface from the IT infrastructure
  • Enables organizations to deploy a unified security solution

Frage 150

Frage
What is an accurate statement about OpenID control?
Antworten
  • Enables an organization to use authentication services from an identity provider
  • Enables initiators and targets to authenticate each other by using a shared secret code
  • Provides strong authentication for client-server applications by using secret-key cryptography
  • Allows a client to access protected resources from a resource server on behalf of a resource owner

Frage 151

Frage
What does an area ID represent in Fibre Channel (FC) addressing?
Antworten
  • Group of switch ports
  • Switch within a group
  • Port within a group
  • Group of switches

Frage 152

Frage
An organization plans to deploy a new application in their environment. The new application requires 4 TB of storage space. During peak workloads, the application is expected to generate 4900 IOPS with a typical I/O size of 8 KB. The capacity of each available disk drive is 500 GB. The maximum number of IOPS a drive can perform at with a 70 percent utilization is 110 IOPS. What is the minimum number of disk drives needed to meet the application's capacity and performance requirements given a RAID 0 configuration?
Antworten
  • 8
  • 20
  • 30
  • 45

Frage 153

Frage
What is an accurate statement about a hybrid cloud?
Antworten
  • Supports data and application portability for load balancing between clouds
  • Allows organizations with common concerns to share the cost of deploying the cloud
  • Enables the entire cloud infrastructure to be controlled by the consumer's IT staff
  • Allows an organization to outsource the implementation of a private cloud to a cloud provider

Frage 154

Frage
What is a benefit of source-based deduplication over target-based deduplication?
Antworten
  • Backup processing is offloaded from the backup client
  • Less backup data is stored on the backup server
  • Backup data can be retained longer
  • Only unique data is sent over the network to be backed up

Frage 155

Frage
What is an accurate statement about hypervisor-based continuous data protection (CDP)?
Antworten
  • Write splitter is embedded in the hypervisor
  • Journal is stored in a virtual machine
  • Journal and replica use the same storage volume
  • Virtual appliance runs on a storage system

Frage 156

Frage
Which benefit does the measured service characteristic provide to a cloud service provider?
Antworten
  • Enables control and optimization of resource use
  • Enables cloud services to communicate with each other
  • Enables availability of specific resources depending on policy
  • Enables the reduction and/or elimination of upfront IT expenditure

Frage 157

Frage
What is a function of a Fibre Channel Forwarder in an FCoE SAN?
Antworten
  • Applies zoning configurations and provides fabric services
  • Transfers FCoE traffic over an FC SAN
  • Encapsulates IP packets into FC frames
  • Provides both NIC and FC HBA functionality

Frage 158

Frage
What is a key objective to performing continuous replication?
Antworten
  • Avoid performing data archiving.
  • Reduce the RPO to near-zero.
  • Reduce the deduplication ratio
  • Avoid performing data backups.

Frage 159

Frage
What is an accurate statement about infrastructure discovery?
Antworten
  • Creates an inventory of infrastructure components and provides information about the components
  • Standardizes on-going infrastructure management activities andassesses potential risks of the activities
  • Classifies, organizes, and analyzes all infrastructure management bestpractices stored in data lakes
  • Detects potential security attacks on a storage infrastructure and deploys specialized tools to eliminate the attacks
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Esperanto Basiswortschatz
JohannesK
Antike - Rom: Von der Republik zum Kaiserreich
Markus Grass
AOW - Psych
Aydan Altuner
Tipps, um dein Lernen zu verbessern
Laura Overhoff
org. Kunststoffe
Fabian B.
Vetie - Tierzucht & Genetik - T IV
Fioras Hu
GESKO JOUR Karteikarten
Sascha Walter
Forstpolitik Krott
Ulf Grätz
Vetie - Pharma 2017
Fioras Hu
Vetie - Fleisch- und Geflügelfleischhygiene 2017
Birte Schulz