What is a benefit of using content addressed storage (CAS) as an archival solution?
Provides the ability to perform production operations on the CAS
Supports location independence using different content IDs for an object
Ensures content authenticity and integrity
Enables modification of archived data
What is determined based on the recovery point objective in an asynchronous remote replication?
Size of the replica
Size of the buffer
Response time
Location of the source
What is an accurate statement about full volume replication?
Target device is at least as large as the source device
Target device is accessible only after the replication sessionstarts
Target and source devices should be on different storage arrays
Target device requires only a fraction of the space used by the source device
What is an accurate statement about a virtual machine (VM) snapshot?
Provides the capability to delete the parent VM once the snapshot is created
Captures the state and data of a running VM at a specific point-in-time
Runs as an independent copy from the parent VM
Provides the capability to restore VM data to any point-in-time
What is a benefit of deploying a multi-site storage system-based remote replication solution?
Requires low networkbandwidth to perform synchronous replication
Provides the capability to recover data to any point-in-time
Enables a consistent near-zero RPO in the event of source and remote site failures
Ensures disaster recovery protection remains available in the event of source or remote site failures
Which EMC product provides a remote replication solution for EMC VMAX3 storage systems?
ProtectPoint
MirrorView
SnapSure
SRDF
What determines how far back the recovery points can go in a continuous data protection (CDP) solution?
Size of the CDP appliance used for replication
Type of write splitter used for replication
Amount of space that is configured for the journal
Size of the source and replica volumes
What is a benefit of implementing a virtual machine (VM) storage migration?
Improves the security of applications running inside VMs on the migrated storage system
Balances storage utilization by redistributingVMs across different storage systems
Enables VMs to keep functioning even if the source data is lost due to a failure
Reduces the overall storage systemcapacity requirements for organizations
What is an accurate statement about hypervisor-based continuous data protection (CDP)?
Journal and replica use the same storage volume
Journal is stored in a virtual machine
Write splitter is embedded in the hypervisor
Virtual appliance runs on a storage system
What is an example of an active attack on an IT infrastructure?
Attempt to gain access to the data in transit
Attempt to gain unauthorized access into the system
Attempt tocopy the data from the storage system
Attempt to modify information for malicious purposes
What is compromised by a passive attack on an IT infrastructure?
Integrity
Confidentiality
Availability
Repudiation
What is an accurate statement about a denial-of-service attack?
Intentional misuse of privileges to compromisedata security
Prevents legitimate users from accessing resources or services
Captures a user’s credentials and then sends to the attacker
Gaining unauthorized access to a user’s accounts and data
Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false website?
Man-in-the-middle
Denial-of-service
Phishing
What accurately describes an attack vector in an IT infrastructure?
Amount of effort required to exploit vulnerabilities in the infrastructure
Various entry points that can be used to launch an attack
Series of steps that must be followed in order to complete an attack
Process of identifying the system components under attack
What is a benefit of deploying a Defense in Depth strategy?
Provides additional time for organizations to detect and respond to an attack
Eliminates the attack vector from the IT infrastructure
Enables organizations to deploy a unified security solution
Eliminates the attack surface from the IT infrastructure
In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link. Which security mechanism should the administrator use?
Port binding
Port type locking
Persistent port disable
Fabric binding
In an FC SAN environment, which security mechanism prevents a switch port from being enabled even after a switch reboot?
Port locking
What enables an administrator to create device groups in an IP-SAN for restricting device communications to a group?
Security identifier
Demilitarized zone
NIC teaming
iSNSdiscovery domain
How do VSANs ensure security in an IT infrastructure?
By authenticating a new switch thatjoins a fabric
By limiting the number of switches in a fabric
By providing isolation over a shared infrastructure
By prohibiting an unused switch port from being used
What is an accurate statement about OAuth security control?
Enables initiators and targets to authenticate each other by using a shared secret code
Enables an organization to use authentication services from an identity provider
Allows a client to access protectedresources from a resource server on behalf of a resource owner
Provides strong authentication for client-server applications by using secret-key cryptography
What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?
Enables initiators and targets to authenticateeach other by using a shared secret code
Allows a client to access protected resources from a resource server on behalf of a resource owner
Enables anorganization to use authentication services from an identity provider
What is an accurate statement about OpenID control?
Allows a client to access protected resources from a resource server on behalf of aresource owner
Which technique is used in Kerberos to authenticate a client-server application across an insecure network?
One-way hash function
Shared secret
Secret-key cryptography
OpenID control
Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events?
Profile-based
Anomaly-based
Signature-based
Device-based
Which method is used to establish a VPN connection between a primary and remote data center to perform secure remote replication?
Remote access VPN connection
Intra-site VPN connection
Long distance VPN connection
Site-to-site VPN connection
What is an activity in the risk assessment step of risk management?
Plan and deploy security controls
Continuously observethe existing risks
Determine the likelihood of a risk
Identify the sources of threats that increase the risks
What is the purpose of monitoring capacity in a storage infrastructure?
Evaluating utilization of components and identifying bottlenecks
Tracking the amount of storage infrastructure resources used and available
Tracking configuration changes to the storage infrastructure elements
Identifying component failures that may lead to service unavailability
Which EMC product enables management for Vblock systems?
Unified Infrastructure Manager
Service Assurance Suite
ViPR SRM
What is an example of an availability management task in storage infrastructure management
Performing trend analysis of storage space consumption
Tracking configuration changes to storage components
Designing a new replication solution for data redundancy
Specifying storage space quotas for users
Which EMC product provides automated monitoring and reporting of a software-defined storage infrastructure?
FAST VP
Avamar
What is an accurate statement about infrastructure discovery?
Standardizes on-going infrastructure management activities and assesses potential risks of the activities
Createsan inventory of infrastructure components and provides information about the components
Classifies, organizes, and analyzes all infrastructuremanagement best practices stored in data lakes
Detects potential security attacks on a storage infrastructure and deploys specialized tools to eliminate the attacks
Which data center characteristic ensures that data is stored and retrieved exactly as it was received?
Data integrity
Security
Scalability
Manageability
What is a characteristic of a scale-out NAS?
File system grows dynamically as nodes are added in the cluster
Upto four file systems can be created across the cluster
Distinct file systems are created on each node in the cluster
Different file systems can be mixed on each node in a single cluster
A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings.
Incremental
Cumulative
Full
Differential
What is a benefit when a node is added to a scale-out NAS cluster?
Increased cluster performance
Reduced capital expenditure
Simplified cluster management
Decreased data duplication
Why should a replica be consistent with its source?
Ensure the usability of the replica
Reduce the need to create multiple replicas
Ensure the security of the replica
Reduce the size of the replica
What is an example of a security management task in a storage infrastructure?
Configuring LUN masking to restrict hosts from accessing a specific LUN
Enforcing storage space quotas to restrict users from overprovisioning resources
Restricting the number of simultaneous client access to application servers
Enabling sending messages to a support center in the event of resource failure
In an object-based storage system, which elements are associated with an object?
Metadata, object ID, attributes, and file path
Metadata, LUN ID, data, and object ID
Object ID, attributes, LUN ID, and file path
Metadata, object ID, data, and attributes
In continuous data protection (CDP) remote replication, where are the two split write I/Os of an incoming write I/O directed?
One I/O goes to the remote CDP appliance and the other I/O goes to the replica
One I/O goes to the local CDP appliance and the other I/O goes to the production volume
One I/O goes to the compute system and the other I/O goes to the production volume
One I/O goes to the journal volume and the other I/O goes to the replica
What describes an advantage of the changed block tracking backup technique?
Enable restoration to any point-in-time
Increase backup device performance
Reduce the backup window
Eliminatethe need for data deduplication