Rigoberto Franco
Test por , creado hace más de 1 año

Una buena practica para la certificación 1

274
1
0
Rigoberto Franco
Creado por Rigoberto Franco hace alrededor de 10 años
Cerrar

Tests 1

Pregunta 1 de 109

1

Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while?

Selecciona una de las siguientes respuestas posibles:

  • LRU

  • HWM

  • LWM

  • MRU

Explicación

Pregunta 2 de 109

1

Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while?

Selecciona una de las siguientes respuestas posibles:

  • LRU

  • HWM

  • LWM

  • MRU

Explicación

Pregunta 3 de 109

1

What does the area ID of the FC address identify?

Selecciona una de las siguientes respuestas posibles:

  • Group of ports within a switch

  • An individual port within a fabric

  • Location of the name server within the fabric

  • Unique number provided to each switch in the fabric

Explicación

Pregunta 4 de 109

1

An organization performs copy on first access (CoFA) replication to create a local replica of application data. To perform a successful restore, what should be considered?

Selecciona una de las siguientes respuestas posibles:

  • Source devices must be healthy

  • Save location size must be larger than the size of all source devices

  • Save location size must be equal to the size of all source devices

  • All changes to the source and replica must be discarded before the restore starts

Explicación

Pregunta 5 de 109

1

Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?

Selecciona una de las siguientes respuestas posibles:

  • Converged network adapter

  • TCP Offload Engine NIC

  • FCIP bridging adapter

  • iSCSI host bus adapter

Explicación

Pregunta 6 de 109

1

What is a function of unified management software in cloud computing?

Selecciona una de las siguientes respuestas posibles:

  • Defining cloud service attributes

  • Consolidating infrastructure resources scattered across one or more data centers

  • Metering based on usage of resources by the consumer

  • Providing an interface to consumers to request cloud services

Explicación

Pregunta 7 de 109

1

Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?

Selecciona una de las siguientes respuestas posibles:

  • Converged network adapter

  • TCP Offload Engine NIC

  • FCIP bridging adapter

  • iSCSI host bus adapter

Explicación

Pregunta 8 de 109

1

Which iSCSI name requires an organization to own a registered domain name?

Selecciona una de las siguientes respuestas posibles:

  • IQN

  • EUI

  • WWNN

  • WWPN

Explicación

Pregunta 9 de 109

1

Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved as it was received?

Selecciona una de las siguientes respuestas posibles:

  • Integrity

  • Availability

  • Security

  • Performance

Explicación

Pregunta 10 de 109

1

What describes a landing zone in a disk drive?

Selecciona una de las siguientes respuestas posibles:

  • Area on which the read/write head rests

  • Area where the read/write head lands to access data

  • Area where the data is buffered before writing to platters

  • Area where sector-specific information is stored on the disk

Explicación

Pregunta 11 de 109

1

What is a characteristic of unified storage?

Selecciona una de las siguientes respuestas posibles:

  • Supports multiple protocols for data access and managed through a single management interface

  • Supports a common protocol for data access and managed through a unified management interface

  • Provides compute, storage, and network virtualization products in one solution

  • Stores all data in the form of objects and managed through a unified management interface

Explicación

Pregunta 12 de 109

1

What defines the time taken to position the read/write head across the platter with a radial movement in a disk drive?

Selecciona una de las siguientes respuestas posibles:

  • eek time

  • Rotational latency

  • Data transfer time

  • Service time

Explicación

Pregunta 13 de 109

1

What is a benefit of cloud computing over traditional computing?

Selecciona una de las siguientes respuestas posibles:

  • Reduces the time to provision and deploy new applications

  • Eliminates consumer’s IT operational expenditure

  • Enables the use of proprietary APIs to access IT resources

  • Lowers migration cost and prevents vendor lock-in

Explicación

Pregunta 14 de 109

1

Which statement describes a denial of service attack?

Selecciona una de las siguientes respuestas posibles:

  • Prevents authorized users from accessing the resources and services

  • Prohibits attempts to repair the resources and services after an attack

  • Attempts to provide false information by impersonating someone’s identity

  • Prevents unauthorized users to access the resources and services

Explicación

Pregunta 15 de 109

1

What is a key benefit of virtualization?

Selecciona una de las siguientes respuestas posibles:

  • Improved resource utilization

  • Improved performance

  • Enhanced interoperability

  • Unlimited resource scaling

Explicación

Pregunta 16 de 109

1

What is an accurate statement about the Data Center Bridging Exchange protocol?

Selecciona una de las siguientes respuestas posibles:

  • Enables Converged Enhanced Ethernet (CEE) devices to convey and configure their features with other CEE devices

  • Creates virtual FCoE links over an existing Ethernet network to transport FC frames over virtual links independently

  • Enables an FCoE switch to send signals to other FCoE switches that need to stop or slow down their transmissions

  • Enables an FCoE switch to transport both TCP/IP and FC frames over a single virtual FCoE link

Explicación

Pregunta 17 de 109

1

What is a key security consideration when a NAS device enables sharing of the same data among UNIX and Microsoft Windows users?

Selecciona una de las siguientes respuestas posibles:

  • NAS device must map UNIX permissions to Windows and vice versa

  • NAS defines and maintains ownership to the objects

  • NIS server must separately maintain SIDs for UNIX and Windows environments

  • Object permissions are not defined in advance and assigned dynamically

Explicación

Pregunta 18 de 109

1

Which cloud computing characteristic enables consumers to grow and shrink the demand for resources dynamically?

Selecciona una de las siguientes respuestas posibles:

  • Rapid elasticity

  • Resource pooling

  • Measured service

  • On-demand self-service

Explicación

Pregunta 19 de 109

1

Which operation is performed while creating a VM snapshot?

Selecciona una de las siguientes respuestas posibles:

  • Create a delta file to record changes to the virtual disk since the session is activated

  • Capture the configuration data of a VM to create an identical copy of the VM

  • Create a journal volume to update changes to the snapshot

  • Create a “Gold” copy of the snapshot before copying changes to the virtual disk

Explicación

Pregunta 20 de 109

1

Which cloud computing capability enables monitoring and reporting resource usage?

Selecciona una de las siguientes respuestas posibles:

  • Metering

  • Pooling

  • Self-service requesting

  • Publishing

Explicación

Pregunta 21 de 109

1

In the context of protecting the FC SAN infrastructure, what is an example of infrastructure integrity?

Selecciona una de las siguientes respuestas posibles:

  • Preventing node login to the fabric without proper authorization

  • Implementing iSNS discovery domains

  • Implementing an FSPF algorithm to create a virtual SAN

  • Not permitting physical segmentation of nodes

Explicación

Pregunta 22 de 109

1

What is true about parity-based RAID?

Selecciona una de las siguientes respuestas posibles:

  • Parity is updated each time a write is performed

  • Parity is read each time a read is performed

  • Parity is updated only when writes fill a stripe

  • Parity is updated each time when both reads and writes are performed

Explicación

Pregunta 23 de 109

1

What is an accurate statement about a gateway NAS solution?

Selecciona una de las siguientes respuestas posibles:

  • NAS head and storage are managed independently

  • Consolidates file-level and block-level access on a single storage platform

  • Provides integrated management for both NAS head and storage

  • Creates a single file system that runs on all NAS heads

Explicación

Pregunta 24 de 109

1

What is prevented using RAID technology?

Selecciona una de las siguientes respuestas posibles:

  • Data loss

  • Host Bus Adapter failures

  • Security breach

  • Switch failure

Explicación

Pregunta 25 de 109

1

Which process minimizes the exposure to a loss of uncommitted cached data when there is a power failure?

Selecciona una de las siguientes respuestas posibles:

  • Cache vaulting

  • Cache mirroring

  • Low watermarking

  • Prefetching

Explicación

Pregunta 26 de 109

1

What are the three elements of the risk triad from an information security perspective?

Selecciona una de las siguientes respuestas posibles:

  • Assets, threats, and vulnerabilities

  • Actions, threats, and vulnerabilities

  • Assets, threats, and countermeasures

  • Assets, countermeasures, and vulnerabilities

Explicación

Pregunta 27 de 109

1

Which cloud computing characteristic enables consumers to request resources using a service catalog through a web-based user interface?

Selecciona una de las siguientes respuestas posibles:

  • On-demand self-service

  • Broad network access

  • Metered services

  • Catalog management

Explicación

Pregunta 28 de 109

1

What is a purpose for distributing Switch Registered State Change Notifications (SW-RSCNs) in a fabric?

Selecciona una de las siguientes respuestas posibles:

  • Updates the name server on all switches in the fabric

  • Stops or slows down transmissions from other switches in the fabric

  • Distributes configuration values and congestion notifications across the fabric

  • Exchanges requests for change notifications among distributed management servers

Explicación

Pregunta 29 de 109

1

In the Fibre Channel protocol, what are functions of the FC-1 layer?

Selecciona una de las siguientes respuestas posibles:

  • Encoding and decoding

  • Routing and flow control

  • Interface mapping and flow control

  • Transmission of raw bits and encoding

Explicación

Pregunta 30 de 109

1

What is a security implementation in NAS environments?

Selecciona una de las siguientes respuestas posibles:

  • Kerberos

  • Port binding

  • S_ID Lockdown

  • FC-SP

Explicación

Pregunta 31 de 109

1

In an FC SAN environment, what is a benefit of zoning?

Selecciona una de las siguientes respuestas posibles:

  • Restricts RSCN traffic

  • Isolates fabric services

  • Enables online volume expansion

  • Provides non-disruptive data migration

Explicación

Pregunta 32 de 109

1

What is the RAID 5 write penalty for random, small write I/Os?

Selecciona una de las siguientes respuestas posibles:

  • 1

  • 2

  • 4

  • 6

Explicación

Pregunta 33 de 109

1

Which EMC block-level storage virtualization product enables hosts from two different data centers to access a single copy of data?

Selecciona una de las siguientes respuestas posibles:

  • VMAX

  • VPLEX

  • VNX

  • Vblock

Explicación

Pregunta 34 de 109

1

Which EMC product enables VNX array-based remote replication from a primary volume to a secondary volume residing on a different VNX storage system?

Selecciona una de las siguientes respuestas posibles:

  • SnapView

  • RepliStor

  • SRDF

  • MirrorView

Explicación

Pregunta 35 de 109

1

A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings.
Which backup granularity type is recommended to meet the backup window for those nights?

Selecciona una de las siguientes respuestas posibles:

  • Incremental

  • Cumulative

  • Full

  • Differential

Explicación

Pregunta 36 de 109

1

What is a characteristic of a scale-out NAS?

Selecciona una de las siguientes respuestas posibles:

  • Up to four file systems can be created across the cluster

  • File system grows dynamically as nodes are added in the cluster

  • Distinct file systems are created on each node in the cluster

  • Different file systems can be mixed on each node in a single cluster

Explicación

Pregunta 37 de 109

1

In a Microsoft Windows file sharing environment, what is a function of system access control lists (SACL)?

Selecciona una de las siguientes respuestas posibles:

  • Determines object access information that needs to be audited

  • Provides information on system access troubleshooting

  • Uniquely identifies objects, users, and user groups

  • Provides path name to access both inbound and outbound traffic

Explicación

Pregunta 38 de 109

1

What is an advantage of synchronous remote replication compared to other remote replication methods?

Selecciona una de las siguientes respuestas posibles:

  • Near zero RTO

  • Near zero RPO

  • No distance limitation

  • Faster response time

Explicación

Pregunta 39 de 109

1

What is an advantage of sub-LUN tiering?

Selecciona una de las siguientes respuestas posibles:

  • Improved performance

  • Enhanced reliability and availability

  • Dynamic expansion of storage capacity

  • Faster provisioning of thin LUNs

Explicación

Pregunta 40 de 109

1

Which fabric service is responsible for managing and distributing Registered State Change Notifications (RSCNs) to attached node ports?

Selecciona una de las siguientes respuestas posibles:

  • Name server

  • Fabric controller

  • Fabric login server

  • Management server

Explicación

Pregunta 41 de 109

1

Which SAN security mechanism will prevent a switch port from being enabled even after a switch reboot?

Selecciona una de las siguientes respuestas posibles:

  • Persistent Port Disable

  • Port Binding

  • Port Lockdown

  • Persistent Switch Disable

Explicación

Pregunta 42 de 109

1

What does a block map contain in a file system snapshot?

Selecciona una de las siguientes respuestas posibles:

  • Original data when a write is issued to the target for the first time

  • Blocks that have changed since the creation of the snapshot

  • Address from which data is to be read when accessing the snapshot

  • Blocks that have been modified in either the source or the target

Explicación

Pregunta 43 de 109

1

What describes a full mesh topology?

Selecciona una de las siguientes respuestas posibles:

  • All switches are directly connected to each other

  • Consists of core and edge switch tiers

  • Requires four switches

  • Requires two ISL hops for host to storage traffic

Explicación

Pregunta 44 de 109

1

What is a characteristic of pointer-based virtual replication?

Selecciona una de las siguientes respuestas posibles:

  • Replica device is at least as large as the source device

  • Replica is immediately available after activation of a replication session

  • Replica is available only after detachment from the source

  • Source does not need to be healthy for the restore

Explicación

Pregunta 45 de 109

1

When using the image-based backup approach to backup a virtual machine, where does the backup client run?

Selecciona una de las siguientes respuestas posibles:

  • Proxy server

  • Hypervisor

  • Virtual machine

  • Backup device

Explicación

Pregunta 46 de 109

1

Which NAS implementation consolidates file-based and block-based access on a single storage platform?

Selecciona una de las siguientes respuestas posibles:

  • Unified

  • Scale-out

  • Gateway

  • Integrated

Explicación

Pregunta 47 de 109

1

Which data deduplication method increases the chance of identifying duplicate data even when there is only a minor difference between two documents?

Selecciona una de las siguientes respuestas posibles:

  • Variable-length segment

  • Single-instance

  • File level

  • Fixed-block

Explicación

Pregunta 48 de 109

1

Which operation is performed by an FCoE switch when it receives a frame with an FCoE Ethertype?

Selecciona una de las siguientes respuestas posibles:

  • Switch recognizes that the frame contains an FC payload and forwards it to the FC Forwarder

  • Switch recognizes the frame as Ethernet and forwards it to the Ethernet bridge

  • Switch recognizes the frame as FCoE and forwards it to the Ethernet bridge

  • Switch recognizes that the frame contains an Ethernet payload and forwards it to the FC Forwarder

Explicación

Pregunta 49 de 109

1

What is a key advantage of data striping across multiple disks as compared to a single disk?

Selecciona una de las siguientes respuestas posibles:

  • Performance

  • Space utilization

  • Protection

  • Capacity

Explicación

Pregunta 50 de 109

1

Which EMC product is a disk-based backup and recovery solution and provides source-based data deduplication?

Selecciona una de las siguientes respuestas posibles:

  • Avamar

  • Data Domain

  • NetWorker

  • SourceOne

Explicación

Pregunta 51 de 109

1

When a service is described as “three 9s available”, what is the approximate amount of downtime allowed per week?

Selecciona una de las siguientes respuestas posibles:

  • 10 seconds

  • 10 minutes

  • 10 Day

  • 10 Hrs

Explicación

Pregunta 52 de 109

1

What is a characteristic of an FC-SW implementation?

Selecciona una de las siguientes respuestas posibles:

  • Provides a dedicated path between nodes

  • Nodes arbitrate to gain control of the data path to transfer data

  • Only one node can perform an I/O operation at a time

  • Supports up to 126 nodes

Explicación

Pregunta 53 de 109

1

Which functionality is offered by user access management software?

Selecciona una de las siguientes respuestas posibles:

  • Enables a user to create VMs and allocate them to CPU, memory, and storage capacity

  • Provides a user interface to browse the service catalog and request cloud services

  • Provides a user interface to view a consolidated view of existing physical and virtual infrastructures across data centers

  • Allows a user to monitor performance, capacity, and availability of physical and virtual resources centrally

Explicación

Pregunta 54 de 109

1

What are the key components of an intelligent storage system?

Selecciona una de las siguientes respuestas posibles:

  • Front-end, cache, back-end, and physical disks

  • Host, connectivity, back-end, and storage array

  • Switch, ports, back-end, and physical disks

  • Host, LUNs, cache, and physical disks

Explicación

Pregunta 55 de 109

1

A customer requires additional storage capacity. The storage expansion must be fast and performance is not a constraint. What is the most appropriate LUN expansion method?

Selecciona una de las siguientes respuestas posibles:

  • Concatenated metaLUN

  • Striped metaLUN

  • Base LUN

  • Component LUN

Explicación

Pregunta 56 de 109

1

Which iSCSI discovery mechanism requires manual configuration of the initiator with the target’s network portal?

Selecciona una de las siguientes respuestas posibles:

  • SendTargets discovery

  • iSCSI service location discovery

  • Internet Storage Name Service

  • iSCSI domain name discovery

Explicación

Pregunta 57 de 109

1

What is a characteristic of asynchronous remote replication?

Selecciona una de las siguientes respuestas posibles:

  • Writes are committed to the target before being committed to the source

  • Only the last update is transmitted if there are multiple writes to the same location in the buffer

  • Reads are always serviced from the target replica

  • Distance between the two sites is restricted to less than 200 km

Explicación

Pregunta 58 de 109

1

What is a characteristic of Big Data?

Selecciona una de las siguientes respuestas posibles:

  • Structured and unstructured data generated by multiple sources

  • Structured data generated by a single source

  • Only unstructured data generated by multiple sources

  • Structured and unstructured data generated by a single source

Explicación

Pregunta 59 de 109

1

A stripe depth of 64 KB has been assigned to a five-disk RAID 0 set. What is the stripe size?

Selecciona una de las siguientes respuestas posibles:

  • 64 KB

  • 128 KB

  • 256 KB

  • 320 KB

Explicación

Pregunta 60 de 109

1

A user tries to update the content of a file stored on a CAS system. What is the result of this operation?

Selecciona una de las siguientes respuestas posibles:

  • CAS generates a new address for the altered content and stores it as a new object

  • CAS uses the same content address for the altered content and the original content

  • CAS overwrites the original content and generates a new content address

  • CAS overwrites the original content but the content address is preserved

Explicación

Pregunta 61 de 109

1

Which EMC product provides target-based deduplication?

Selecciona una de las siguientes respuestas posibles:

  • Data Domain

  • Avamar

  • NetWorker

  • RecoverPoint

Explicación

Pregunta 62 de 109

1

What are the two mechanisms that can be employed to address threats of user identity spoofing?

Selecciona una de las siguientes respuestas posibles:

  • Access Control Lists (ACLs) and access control to storage objects

  • User authentication and user authorization

  • Access control to storage objects and auditing

  • User authentication and Information Rights Management (IRM)

Explicación

Pregunta 63 de 109

1

What is the function of enhanced transmission selection in an FCoE environment?

Selecciona una de las siguientes respuestas posibles:

  • Provides available bandwidth to other classes of traffic when a particular class of traffic does not use its allocated bandwidth

  • Provides the capability to independently pause transmission of FCoE frames over each virtual link

  • Enables an FCoE switch to send a signal to other FCoE switches that need to stop or slow down their transmissions

  • Allows an FCoE switch to distribute configuration parameters to the converged network adapters

Explicación

Pregunta 64 de 109

1

Which benefit is provided by EMC PowerPath?

Selecciona una de las siguientes respuestas posibles:

  • Dynamic load balancing

  • Deduplication of network traffic

  • Multiplexing host traffic

  • Segmentation of fabric to create VSANs

Explicación

Pregunta 65 de 109

1

In a CAS environment, what is used to generate a content address?

Selecciona una de las siguientes respuestas posibles:

  • Binaries of the data

  • Combination of data and metadata of the object

  • Location of the object

  • Object metadata

Explicación

Pregunta 66 de 109

1

Which iSCSI naming feature uses a 16-character hexadecimal string?

Selecciona una de las siguientes respuestas posibles:

  • EUI

  • IQN

  • iSNS

  • ARP

Explicación

Pregunta 67 de 109

1

What describes a repudiation attack?

Selecciona una de las siguientes respuestas posibles:

  • An attempt to compromise accountability goals of the security

  • Stealing a private key to decrypt the data-in-transit

  • Unauthorized access to information to compromise confidentiality

  • A series of repetitive attacks to the physical information infrastructure

Explicación

Pregunta 68 de 109

1

A department within an organization requires 200 GB of storage for their business application. The production LUN is RAID 1+0 protected and has a local and remote replica. The local replica is on a RAID 1 LUN and the remote replica is on a five-disk RAID 5 LUN.
If the cost per GB of storage is $2.00, what is the chargeback cost to the department for application storage?

Selecciona una de las siguientes respuestas posibles:

  • $1050

  • $1500

  • $2100

  • $2900

Explicación

Pregunta 69 de 109

1

A department within an organization requires 200 GB of storage for their business application. The production LUN is RAID 1+0 protected and has a local and remote replica. The local replica is on a RAID 1 LUN and the remote replica is on a five-disk RAID 5 LUN.
If the cost per GB of storage is $2.00, what is the chargeback cost to the department for application storage?

Selecciona una de las siguientes respuestas posibles:

  • $1050

  • $1500

  • $2100

  • $2900

Explicación

Pregunta 70 de 109

1

What is a characteristic of an FC-AL implementation?

Selecciona una de las siguientes respuestas posibles:

  • Reserves one address for connecting an FC-SW port

  • Supports connectivity up to 15 million nodes

  • Devices can be added and removed dynamically without any impact

  • Requires at least one connectivity device

Explicación

Pregunta 71 de 109

1

Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?

Selecciona una de las siguientes respuestas posibles:

  • NIC with software-based iSCSI initiator

  • TCP offload engine

  • iSCSI HBA

  • Converged Network Adapter

Explicación

Pregunta 72 de 109

1

What is a characteristic of an enterprise flash drive?

Selecciona una de las siguientes respuestas posibles:

  • Uses semiconductor-based solid state media

  • Performs data search and retrieval sequentially

  • Performs rotational speed at more than 30000 rpm

  • Writes once and reads many

Explicación

Pregunta 73 de 109

1

What defines the time taken to position the sector on the platter under the read/write head?

Selecciona una de las siguientes respuestas posibles:

  • Seek time

  • Rotational delay

  • Response time

  • Data transfer rate

Explicación

Pregunta 74 de 109

1

What is true about cache dirty page?

Selecciona una de las siguientes respuestas posibles:

  • Data that has changed but is not yet written to disk

  • Data read from disk but not accessed by the host

  • Data that has changed and has been written to disk

  • Data requested by the host but not yet fetched

Explicación

Pregunta 75 de 109

1

As your organization’s SAN environment grows, you realize there is a greater need to manage SAN security. Which mechanism is required to prevent unauthorized activity on the FC fabric for management operations?

Selecciona una de las siguientes respuestas posibles:

  • Role-based access control

  • Access control lists

  • VSAN

  • Zoning

Explicación

Pregunta 76 de 109

1

Which operation is performed by a scale-out NAS when it receives a large write I/O from its clients?

Selecciona una de las siguientes respuestas posibles:

  • I/O is striped across multiple nodes for processing

  • I/O is sent to the high performance node in the cluster for processing

  • A new node is dynamically added to the cluster to process the I/O

  • I/O is sent to the high storage capacity node in the cluster for processing

Explicación

Pregunta 77 de 109

1

When developing a disaster recovery plan, what is the result of choosing a particular recovery time objective for a system?

Selecciona una de las siguientes respuestas posibles:

  • Determines the type and location of the backup media

  • Determines how often to take a backup of the system

  • Determines how long to retain backup copies

  • Determines how many transaction logs should be backed up

Explicación

Pregunta 78 de 109

1

Which operation writes data in cache, and immediately to disk, before sending an acknowledgement to the host?

Selecciona una de las siguientes respuestas posibles:

  • Write-through cache

  • Write-back cache

  • Write aside cache

  • Write cache vaulting

Explicación

Pregunta 79 de 109

1

What is a benefit of WWN zoning over port zoning?

Selecciona una de las siguientes respuestas posibles:

  • A server, after being moved to another switch port in the fabric, maintains connectivity to its zone partners without the need to modify the zoning configuration

  • A server, after replacement of its HBAs, maintains connectivity to its zone partners without the need to modify the zoning configuration.

  • A server, after replacement of its HBAs, does not require performing a fabric login to maintain connectivity to its zone partners.

  • A server, after being moved to another fabric, maintains connectivity to its zone partners without the need to modify the zoning configuration.

Explicación

Pregunta 80 de 109

1

A department conducts business, Monday through Saturday from 9 A.M. to 5 P.M. each day. The department takes in revenue on an average of $500,000 per week. Employee salaries are approximately $5,000 per week. The department requires the use of a computer system with an RPO of 2 hours and an RTO of 4 hours.
To determine the business impact of downtime, what is the average cost of downtime per hour of the business

Selecciona una de las siguientes respuestas posibles:

  • $10,417

  • $10,521

  • $11,105

  • $12,024

Explicación

Pregunta 81 de 109

1

In Kerberos authentication, what is a role of the Active Directory?

Selecciona una de las siguientes respuestas posibles:

  • Verifies the user’s login information

  • Implements the Authentication service and Ticket Granting service

  • Verifies the session ID when the client-server session is established

  • Maintains the access control list in a keytab file

Explicación

Pregunta 82 de 109

1

A finance department wants to secure its data while the data traverses over the FC SAN. Currently the SAN is also used by other departments in the organization.
Which implementation should be recommended to isolate other department traffic from the finance department traffic?

Selecciona una de las siguientes respuestas posibles:

  • Virtual LAN

  • Virtual SAN

  • Fabric binding

  • Port binding

Explicación

Pregunta 83 de 109

1

Which data center characteristic refers to the capability to grow resources without impacting business operations?

Selecciona una de las siguientes respuestas posibles:

  • Scalability

  • Security

  • Availability

  • Performance

Explicación

Pregunta 84 de 109

1

What is an advantage of reporting on storage arrays?

Selecciona una de las siguientes respuestas posibles:

  • Planning for capacity

  • Monitoring the number of arrays

  • Monitoring the number of disks in a RAID group

  • Planning for storage groups

Explicación

Pregunta 85 de 109

1

A customer wants to connect iSCSI-enabled hosts to an existing Fibre Channel (FC) storage array. Which networking device enables the connectivity between the host and the storage array?

Selecciona una de las siguientes respuestas posibles:

  • iSCSI gateway

  • FCIP bridge

  • FC gateway

  • IP router

Explicación

Pregunta 86 de 109

1

What is a benefit of virtual storage provisioning over traditional provisioning?

Selecciona una de las siguientes respuestas posibles:

  • Enables more efficient allocation of storage to hosts

  • Can be used for applications that require predictable performance

  • Provides full control for precise data placement

  • Does not enable oversubscription

Explicación

Pregunta 87 de 109

1

Can be used for applications that require predictable performance

Selecciona una de las siguientes respuestas posibles:

  • Cloud infrastructure package

  • Block-based storage device

  • SMI specification

  • Virtual tape library

Explicación

Pregunta 88 de 109

1

Which report provides information about the allocation and utilization of storage infrastructure components by various departments or user groups?

Selecciona una de las siguientes respuestas posibles:

  • Capacity Planning

  • Chargeback

  • Configuration and Asset Management

  • Service Management

Explicación

Pregunta 89 de 109

1

Which component of an archiving solution is responsible for scanning data that can be archived based on a policy?

Selecciona una de las siguientes respuestas posibles:

  • Archiving agent

  • Archiving server

  • Archiving policy server

  • Archiving storage device

Explicación

Pregunta 90 de 109

1

What describes a hybrid cloud?

Selecciona una de las siguientes respuestas posibles:

  • Combination of two distinct cloud infrastructures (on-premise and externally-hosted) that are managed together

  • Composed of distinct clouds that are bound together by standardized or proprietary technology

  • Composed of two or more distinct data centers that enable data and application portability

  • Combination of a private cloud and a public cloud that are owned, managed, and operated by a single organization

Explicación

Pregunta 91 de 109

1

What is a requirement for a native iSCSI implementation?

Selecciona una de las siguientes respuestas posibles:

  • Host with an iSCSI HBA and an array with an iSCSI port

  • Host with a NIC and an array with an FCoE port

  • Host with iSCSI initiator software and an array with an FCIP port

  • Host with an iSCSI HBA and an array with an FC port

Explicación

Pregunta 92 de 109

1

In addition to applications and databases, what are the other core elements of a data center infrastructure?

Selecciona una de las siguientes respuestas posibles:

  • JBOD, networks, and storage arrays

  • Servers/operating systems, DAS, and NAS

  • Servers/operating systems, networks, and storage arrays

  • Servers/operating systems, SAN, and JBOD

Explicación

Pregunta 93 de 109

1

Why does a restore operation need to communicate with the backup server?

Selecciona una de las siguientes respuestas posibles:

  • Locate the data to be restored using the backup catalog

  • Determine the RTO of the backup save set

  • Run the restore automatically according to a schedule

  • Determine the RPO of the backup save set

Explicación

Pregunta 94 de 109

1

Which data protection technology provides the highest degree of protection against logical corruption and a near-zero RPO?

Selecciona una de las siguientes respuestas posibles:

  • CDP

  • Mirroring

  • Backup-to-disk

  • Snapshots with CoFW

Explicación

Pregunta 95 de 109

1

Which remote replication solution has the highest bandwidth requirements?

Selecciona una de las siguientes respuestas posibles:

  • Array-based disk buffered

  • Array-based synchronous

  • Host-based asynchronous LVM mirroring

  • Log shipping over IP networks

Explicación

Pregunta 96 de 109

1

In a Fibre Channel (FC) SAN, which protocol implementation is used?

Selecciona una de las siguientes respuestas posibles:

  • SCSI over FC

  • SCSI over FCoE

  • FC over iSCSI

  • FC over SCSI

Explicación

Pregunta 97 de 109

1

Which NAS backup environment transfers data to be backed up over a private backup network?

Selecciona una de las siguientes respuestas posibles:

  • NDMP three-way

  • NDMP two-way

  • Server-based

  • Serverless

Explicación

Pregunta 98 de 109

1

Which three subject areas, taken together, define storage security?

Selecciona una de las siguientes respuestas posibles:

  • Information, networking, and storage

  • Access control, storage, and encryption

  • Access control, information, and networking

  • Application, management, and backup

Explicación

Pregunta 99 de 109

1

If a disk drive’s rotational speed is 10000 revolutions per minute, what is its average rotational latency?

Selecciona una de las siguientes respuestas posibles:

  • 0.003 milliseconds

  • 0.05 milliseconds

  • 3 milliseconds

  • 5 milliseconds

Explicación

Pregunta 100 de 109

1

In the context of information security, which attribute other than individual identity and group membership can be used to restrict unauthorized access?

Selecciona una de las siguientes respuestas posibles:

  • Role

  • Cryptography

  • World Wide Name

  • Host network address

Explicación

Pregunta 101 de 109

1

What is a characteristic of an active/passive storage array configuration?

Selecciona una de las siguientes respuestas posibles:

  • Host can perform I/Os to its LUNs through any of the available controllers

  • Read and write I/Os are performed only through the controller that manages the LUN

  • Read and write I/Os are performed only through active cache

  • Passive array is used for backup; active array is used for production data

Explicación

Pregunta 102 de 109

1

An eight-disk RAID 6 set has a stripe size of 192 KB. What is the stripe depth?

Selecciona una de las siguientes respuestas posibles:

  • 24 KB

  • 32 KB

  • 48 KB

  • 64 KB

Explicación

Pregunta 103 de 109

1

What is a key benefit of RAID 5 compared to RAID 1+0 for small, random I/Os?

Selecciona una de las siguientes respuestas posibles:

  • Improved storage space utilization

  • Improved write performance

  • Higher availability

  • Faster rebuild times after failure

Explicación

Pregunta 104 de 109

1

What is a characteristic of asynchronous remote replication?

Selecciona una de las siguientes respuestas posibles:

  • A near-zero RPO disaster recovery solution

  • Write must be committed at the target before being acknowledged as complete

  • Deployed only for distances within 200 km between two sites

  • Replica will be behind the source by at least the size of the buffer

Explicación

Pregunta 105 de 109

1

What is a characteristic of triangle/multitarget replication?

Selecciona una de las siguientes respuestas posibles:

  • Failover can occur to either of the two remote sites

  • Distance between all sites must be less than 125 km

  • Bunker site must be in sync with the remote site at all times

  • Only the production site is available during normal operations

Explicación

Pregunta 106 de 109

1

What is a characteristic of cloud-optimized storage?

Selecciona una de las siguientes respuestas posibles:

  • Single access mechanism

  • Secure multitenancy

Explicación

Pregunta 107 de 109

1

What is the name of the drive sub-assembly which contains the platters and read/write heads?

Selecciona una de las siguientes respuestas posibles:

  • ATA

  • SATA

  • HDA

  • IDE

Explicación

Pregunta 108 de 109

1

Which two mechanisms address threats of elevating user privileges in the application access domain?

Selecciona una de las siguientes respuestas posibles:

  • Access control to storage objects and Access Control Lists (ACLs)

  • Authentication and authorization

  • Access control to storage objects and auditing

  • User authentication and Information Rights Management (IRM)

Explicación

Pregunta 109 de 109

1

A customer has an existing SAN environment. The customer wants to add NAS to share the storage space. Which solution is most appropriate?

Selecciona una de las siguientes respuestas posibles:

  • Scale-out NAS

  • Gateway NAS

  • FCoE SAN

  • IP SAN

Explicación