Exam E05-001 Information Storage and Management Version 3 Exam

时间:2023-03-08 22:27:19

Emc

考试 e05-001
信息存储和管理版本3考试

[总问题:171]

哪种 emc 产品提供软件定义的存储基础架构的自动监视和报告?

A. viprSrm
B. 斯纳普内
C. 阿瓦马尔
D. 快速副总裁

答: a

关于虚拟磁带库的准确陈述是什么?

A. 传统的备份软件无需额外的模块或更改即可使用
B. 物理磁带的可移植性托夫库内支持位置
C. 只有用于备份和恢复的顺序数据访问支持
D. 需要执行与物理磁带驱动器相关的定期维护任务

答: a

哪种 vmware 产品为软件定义的数据中心提供了网络虚拟化平台?

A. nsx
B. 埃西
C. 地平线
D. 空气观察

答: a

什么是函数纤维中的通道转发器。弗科三?

A. 应用分区配置并提供结构服务
B. 转移弗科fc san 上的流量
C. 将 ip 数据包封装到 fc 帧中
D. 提供 nic 和 fc hba 功能

答: a

vsan 如何确保 it 基础架构的安全性?

A. 通过在共享基础结构上提供隔离
B. 通过对连接结构的新交换机进行身份验证
C. 通过限制结构中的开关数量
D. 禁止使用未使用的交换机端口d

答: a

什么是好处n _ port虚拟化 (npv)?

A. 减少结构中的域 id 数
B. 消除了 fc san 中结构服务的开销
C. 支持虚拟卷的在线扩展
D. 允许n _ port传输多个 vsan 流量

答: a

哪个数据中心管理流程涉及整理和展示资源的利用率?

A. 报告
B. 供应
C. 规划
D. 维护

答: a

san 中的链路聚合有什么好处?

A. 提供比单个更高的吞吐量互交换链接可以提供
B. 在所有虚拟 san 之间分配网络流量, 确保甚至虚拟 san 利用率
C. 通过整合所有互交换链接到单个物理链接
D. 提供部署相同设备的灵活性。互交换fc 和 iscsi 流量的链接

答: a

软件提供的功能电子定义的存储控制器?

A. 能够集中和抽象物理存储和前天作为一个开放的存储平台
B. 多个操作系统能够在单个物理计算系统上同时运行
C. 自动创建用于集中管理的应用程序编程接口的机制
D. 带有集成硬件和软件组件的单一独立软件包

答: a

什么是关于硬战的准确陈述e raid 实现?

A. 使用安装在存储阵列上的专用硬件控制器
B. 使用 cpu 周期的计算执行 raid 计算的系统

C. 需要 raid 控制器和操作系统兼容
D. 提供低成本的解决方案, 提供磁盘保护

答: a

关于 openid 控制的准确陈述是什么?

A. 使组织能够使用来自标识提供程序的身份验证服务
B. 启用启动器和目标使用共享密码相互验证
C. 通过使用密钥加密为客户端-服务器应用程序提供强身份验证
D. 允许客户端代表资源所有者从资源服务器访问受保护的资源

答: a

什么是关于基础架构即服务的准确陈述?

A. 使用者可以控制操作系统和部署的应用程序
B. 使用者仅可以控制用户特定的应用程序配置设置s
C. 消费者可以控制网络设备,计算系统和存储系统
D. 使用者仅可以控制应用程序宿主环境的配置设置

答: a

在存储环境中实现服务器闪存缓存技术的好处是什么?

A. 为读取密集型工作负载提供性能提升
B. 减少数据中心中存储系统的数量

D。提高了高峰工作负载期间的网络性能

答: a

是什么决定了在连续数据保护 (cdp) 解决方案中恢复点的回溯程度?

A. 为日记帐配置的空间量
B. th 的大小e 用于复制的 cdp 设备
C. 源卷和副本卷的大小
D. 用于复制的写拆分器的类型

答: a

大数据分析提供哪种功能?

A. 从大量数据中实现数据驱动的决策
B. 在不影响可用性的情况下存储大量数据
C. 减少数据存储容量要求
D. 使用传统工具执行分析

答: a

哪种 emc 产品是一种超大规模的存储基础架构, 它提供了通用的辅助功能, 并支持对象和 hdfs?

A. 家电
B. xtremio
C. 数据域
D. centera

回答: a

哪种类型的纤维通道 (fc) 端口标签 "x" 和 "y" 在展览中的表示是什么?

A. x 是一个e _ 端口和 y 是一个f _ port
B. x 是一个f _ port和 y 是一个n _ port
C. x 是一个n _ port和 y 是一个e _ 端口
D. x 是一个n _ port和 y 是一个f _ port

答: b

软件定义的存储 (sds) 环境的哪个组件能够与外部监视工具集成?

A. REST 原料药
B. 元数据服务
C. sds 网络服务
D. 存储代理

答: a

什么准确地描述了 fc san 中的流量控制机制?

A. 发送端口和接收端口都同意端口登录期间可用的缓冲区数
B. 协商发生在e _ 端口和一个f _ port, 并且在两个之间n _ 端口
C. 当帧传输时, 信用值会增加, 并在收到响应时递减
D. 如果可用的配额达到, 则从接收端口发送接收方就绪 (r _ rdy)零

答: a

是什么使管理员能够在 ip-san 中创建设备组, 以便将设备通信限制为组?

A. isns发现域
B. 网卡组合
C. 非军事化区
D. 安全标识符

答: a

监视存储基础结构中的容量的目的是什么?

A. 跟踪使用和可用的存储基础结构资源的数量
B. 评估组件的利用率并识别瓶颈
C. 跟踪配置对存储基础结构元素的影响
D. 识别可能导致服务不可用的组件故障

答: a

存储区域网络 (san) 的好处是什么?

A. 使跨地点的计算系统能够访问共享存储
B. 仅使用通道技术确保安全数据传输
C. 确保较高的响应时间, 而不会产生协议开销
D. 支持在单个系统中整合控制和数据平面

答: a

关于虚拟桌面基础结构的准确陈述是什么?

A. 为每个用户提供了一个专用的桌面虚拟机, 其中包含自己的操作系统和应用程序
B. 客户端系统上承载的操作系统和应用程序由多个用户共享
C. 每个用户在远程计算系统上都有一个单独的桌面会话, 应用程序在其中执行
D. 远程桌面上的操作系统和应用程序已关闭加载到客户端上进行本地执行

答: a

组织计划在其数据中心部署新的备份设备。该组织希望新的备份设备支持他们的旧备份软件, 而无需对软件进行任何更改。此外, 组织希望备份开发可提供随机数据访问, 以获得更好的性能。

应推荐哪种备份设备?

A. 虚拟磁带库
B. 基于磁带的备份设备
C. 磁带库
D. 光学点唱机

答: a

在 fc san 环境中, 哪种安全机制可防止交换机端口即使在交换机重新启动后也无法启用?

A. 端口锁定
B. 端口类型锁定
C. 端口绑定
D. 织物装订

答: a

关于基于虚拟机管理程序的连续数据保护 (cdp) 的准确陈述是什么?

A. 写入拆分器嵌入到虚拟机管理程序中
B. 日志存储在虚拟机中
C. 日记和副本使用相同的存储卷
D. 虚拟设备在存储系统上运行

答: a

在连续数据保护 (cdp) 远程复制中, 两个分裂写我/中。一个传入的写 ito 指挥?

A. 一个 ito 转到本地 cdp 设备, 另一个 ito 转到产量
B. 一个 ito 去计算系统, 另一个 ito 去生产容量
C. 一个 ito 转到远程 cdp 设备, 另一个 ito 转到副本
D. 一 i/o 转到日志卷, 而另一个 io 转到副本

答: a

哪种 emc 产品为 emc vmax3 存储系统提供了远程复制解决方案?

A. srdf
B. 斯纳普内
C. 镜像视图
D. 保护点

答: a

哪些基于 emc 块的存储系统使用群集设计来扩展容量和性能?

A. xtremio
B. 伊西隆
C. xtremsf
D. 斯卡莱奥

答: a

业务连续性解决方案中的恢复点目标决定了什么?

A. 备份的频率
B. 备份设备的类型
C. 灾难恢复站点的类型
D. 主恢复站点和灾难恢复站点之间的距离

答: a

关于应用程序虚拟化的应用程序流技术, 什么是准确的陈述?

A. 应用程序在客户端上的部分下载, 以便本地执行
B. 应用程序执行远程它的用户界面被传输到客户端
C. 应用程序在客户端上执行, 而不使用本地安装的代理
D. 应用程序转换为直接在客户端上执行的独立包

安斯韦r: a

"x" 在展览中代表哪种类型的存储设备?

A. 基于对象
B. 基于块
C. 基于文件
D. 基于统一

答: a

关于 vlan 和 vsan 的准确陈述是什么。弗科使用现有的 fc san 的环境?

A. 必须为每个 vsan 配置专用的 vlan
B. 为 vsan 配置的 vlan 必须承载常规 lan 流量
C. 默认 vlan 必须映射到 t 中定义的所有 vsan他弗科开关
D. 必须至少创建四个 vlan 才能隔离 vsan 流量

答: a

什么准确地描述了磁盘驱动器的查找时间?

A. 将读写头放置在正确轨道上所需的时间
B. 盘片将数据放置在 read1 写头下所花费的时间
C. 阅读 b 所需的时间从盘片中锁定数据
D. 控制器使用服务所需的时间一个应用程序中的 i o

答: a

一个应用程序生成8400小的随机 i/中。在读取/写入比率为2:1 的峰值工作负载时。raid 5 配置在峰值活动时的磁盘负载是多少?

a. 我的工作4800
B。11200
C。16800
D。a.22400

答: c

关于应用程序虚拟化的应用程序表示技术, 什么是准确的说明?

A. 应用程序执行远程它的用户界面被传输到客户端
B. 应用程序按部分下载上的本地执行器的客户端离子
C. 应用程序在客户端上执行, 而不使用本地安装的代理
D. 应用程序转换为直接在客户端上执行的独立包

答: a

为了提高性能, emc 的产品允许在计算系统?

A. xtremsf
B. xtremcache
C. 斯卡莱奥
D. xtremio

答: a

部署基于多站点存储系统的远程复制的好处是什么n 解决方案?

A. 确保在发生源或远程站点故障时仍可提供灾难恢复保护
B. 提供将数据恢复到任何时间点的功能
C. 需要较低的网络带宽来执行同步复制
D. 在发生源站点和远程站点故障时, 实现一致的几乎为零的 rpo

答: a

配置的好处是什么?ex _ 端口在每个纤维在 fcip 隧道实现中的通过 ip (fcip) 网关?

A. 在不合并结构的情况下, 通过 fcip 隧道实现 fc-fc 路由
B. 合并 fcip 两端的织物隧道创建单个大型面料
C. 通过 fcip 隧道传输 vsan 标记的流量, 而不会产生 fc 协议开销
D. 创建八个虚拟机fcip 隧道上的 fc 链接, 可以单独暂停和重新启动

答: a

大数据的 "可变性" 特征意味着什么?

A. 数据的意思经常变化
B. 数据由多个来源以不同的格式生成
C. 数据变化率影响其及时分析
D. 不同的数据质量会影响其可靠性和准确性

答: a

是什么提高了 pe上的多线程大型块 ito 工作负载的性能。固态驱动?

A. 并行 ito 通道
B. 伊奥联合
C. 本机命令队列
D. 大容量 ram 缓存

答: a

一个应用程序生成4200小的随机 i/中。在读取/写入比率为2:1 的峰值工作负载时。raid 6 配置在峰值活动时的磁盘负载是多少?

a. 我的工作2800
B。5600
C。8400
D。11200

答: d

软件定义的存储 (sds) 环境的哪个组件管理和提供存储?

A. sds 控制器
B. REST 原料药
C. sds 网络服务
D. 存储代理

答: a

展览代表哪种类型的结构拓扑?

A. 全网
B. 部分网格
C. 单芯边
D. 双核心边

答: a

哪种 lun 扩展技术提供了容量扩展和性能改进?

A. 条纹梅塔伦
B. 分区梅塔伦
C. 虚拟梅塔伦
D. 级 联梅塔伦

答: a

组织计划在其环境中部署新应用程序。新应用程序需要 3 tb 的存储空间。在高峰工作负载期间, 应用程序预计将生成 2450 iops, 典型的 ii/o 大小为 2 kb。每个可用的容量磁盘驱动器为 500 gb。驱动器在70% 的利用率下可以执行的 iops 的最大数量为 90 iops。

在给定 raid 0 配置的情况下, 满足应用程序容量和性能要求所需的最小磁盘驱动器数量是多少?上什么?

A. 6
B. 16
C. 25
D. 28

答: d

关于基础结构发现的准确陈述是什么?

A. 创建基础结构组件的清单, 并提供有关组件的信息
B. 规范正在进行的基础设施管理活动和评估活动的潜在风险
C. 对所有基础架构管理进行分类、组织和分析最佳实践存储在数据湖中
D. 检测对中存储的潜在安全攻击。结构, 并部署专门的工具, 以消除攻击

答: a

第三平台采用的运营模式的转换涉及哪些内容?

A. 通过自助服务门户调配 it 资源
B. 建立管理 it 服务的新角色和新责任
C. 采用虚拟化技术实现自动化
D. 在 it 员工中培养新的技术和业务技能

答: a

与相同数据的增量备份相比, 执行累积备份有什么好处?

A. 促进更快的恢复
B. 促进更快的备份
C. 减少备份所需的存储空间
D. 无需完整备份

答: a

管理员已定义备份策略。完整备份将在每周一晚上8点执行, 增量备份将在剩余的几天在晚上8点执行。

有多少份备份副本需要恢复的文件, 如果他们在周五上午被意外删除?

A. 1
B. 2
C. 3
D. 4

答: d

关于挑战握手身份验证协议 (chap) 控制的准确说明是什么?

A. 使启动器和目标能够使用共享的密码相互进行身份验证
B. 通过使用密钥加密为客户端-服务器应用程序提供强身份验证
C. 允许客户端代表资源所有者从资源服务器访问受保护的资源
D. 使组织能够使用来自标识提供程序的身份验证服务

答: a

什么是 fc-1 层的功能他纤维通道 (fc) 协议栈?

A. 定义数据编码
B. 提供 fc 寻址
C. 定义物理接口
D. 将上层协议映射到 fc 图层

答: a

入侵检测和防御系统 (idps) 使用哪种方法通过扫描和分析事件来识别入侵, 以检测它们在统计上是否与正常事件不同?

A. 基于异常
B. 基于签名
C. 基于配置文件
D. 基于设计

答: a

关于混合云的准确陈述是什么?

A. 支持数据和应用程序可移植性, 实现云之间的负载平衡
B. 允许具有共同关注的组织分担部署云
C. 使整个云基础架构由消费者的 it 人员控制
D. 允许组织将私有云的实现外包给云提供商

答: a

什么包含有关备份配置和备份元数据的信息?

A. 备份目录
B. 代理服务器
C. 跟踪数据库
D. 备份映像

答: a

哪种云计算特性支持多租户并抽象所提供资源的位置?

A. 资源池
B. 测量的服务
C. 快速的弹性
D. 广泛的网络访问

答: a

在深度策略中部署防御有什么好处?

A. 为组织提供检测和响应攻击的额外时间
B. 消除 it 基础架构中的攻击媒介
C. 消除 it 基础架构中的攻击面
D. 使组织能够部署统一的安全解决方案

答: a

哪种类型的 lun 提供了精确数据放置的完全控制, 并允许管理员创建如果存在工作负载争用, 则不同 raid 集上的 lun?

A. 传统
B. 薄
C. 杂志
D. 位图

答: a

通过将 it 资源合并到单个包中, 哪种产品为数据中心部署提供了集成的 it 基础架构解决方案?

A. vcevblock
B. EMC VPLEX
C. Emcvipr
D. Vmwarevcloud

答: a

在文件级存储分层环境中, 什么能准确地描述策略引擎的功能?

A. 根据预定义, 方便地将数据从主存储移动到辅助存储

政策
B. 在辅助存储中创建指向主存储上的数据的存根文件
C. 确保主存储和辅助存储具有相同的数据以确保合规性
D. 运行备份代理并确定要复制到辅助存储的文件

答: a

存储基础结构中安全管理任务的示例是什么?

A. 配置 lun 屏蔽以限制主机访问特定 lun
B. 强制实施存储空间配额以限制用户过度调配资源
C. 限制客户端同时访问应用程序服务器的次数
D. 在资源发生故障时启用向支持中心发送消息

答: d

在基于对象的存储系统中, 数据被划分为10个数据使用擦除编码技术的编码段和4个编码段。此配置保护数据的磁盘驱动器故障的最大数量是多少?

A. 4
B. 6
C. 10
D. 14

答: a

组织每周日执行一次完整备份, 并按增量执行备份备份在上午9点的剩余天数。但是, 在周五晚上 10点, 会发生数据损坏, 需要从备份副本中恢复数据。

有多少人回来是否需要执行此还原的副本?

A. 2
B. 4
C. 5
D. 6

答: d

关于 nas 环境中的三方 ndmp 备份, 什么是准确的陈述?

A. 备份数据直接从 nas 发送到备份设备
B. 备份数据通过应用程序服务器发送到备份设备
C. 每个 nas 都需要专用的备份设备
D. 所有 nas 系统都应具有相同的操作环境

答: a

哪个数据中心特性可确保数据的存储和检索与接收数据完全相同?

A. 数据完整性
B. 安全
C. 可 伸缩 性
D. 可管理性

答: b

为什么副本应与其源一致?

A. 确保副本的可用性

B. 减少创建多个副本的需要
C. 确保副本的安全性
D. 减小副本的大小

答: d

哪些 nas 实现需要单独管理 nas 头和存储?

A. 网关
B. 横向扩展
C. 统一
D. 综合

答: a

关于集成 nas 控制器的准确说明是什么?

A. 包含专门用于文件服务的操作系统
B. 跨多个 nas 系统条带数据以保护数据
C. 跨多个 nas 系统的抽象和池 nas 控制器
D. 包含针对文件共享功能进行优化的 fc 转发器

答: a

一个系统有三个组成部分, 所有三个组成部分都需要24小时运行;周一至周五。在一个特别的一周, 失败的构成部分3的发生情况如下:

✑ 星期二 = 上午8时至下午1时
✑ 星期四 = 下午5时至10时

✑ 星期五 = 上午5时至10时

组件3在该周的平均故障间隔时间是多少?

A. 5小时
B. 35小时
C. 40小时
D. 51小时

答: b

哪种类型的数字数据没有定义的格式, 但具有能够进行分析的自我描述结构?

A. 半结构化数据
B. 结构化数据
C. 元
D. 准结构数据

答: a

将数据备份到磁盘库的好处是什么?

A. 提供更好的备份和恢复性能
B. 提供内置的可移植性, 以满足异地要求
C. 支持擦鞋效果, 提高备份性能
D. 预配置和专用设备仅用于备份

答: a

该展览表示一个 fcip 隧道配置, 该配置将两个 fc san 合并在

隧道的尽头。哪些类型的端口做拉在展览中显示的 fcip 网关上的贝尔 "x" 和 "y" 表示?

A. x =e _ 端口和 y =ve _ port
B. x =f _ port和 y =vn _ port
C. x =vf _ port和 y =e _ 端口
D. x =vn _ port和 y =ve _ port

答: a

哪个进程使用文件级存储分层技术来执行基于策略的数据移动?

a. 我的工作
归档
B。
重复数据删除
C。
复制
D。
备份

答: a

it 基础架构受到主动攻击的示例是什么?

A. 试图出于恶意目的修改信息
B. 尝试从存储系统复制数据
C. 试图获得对系统的未经授权的访问
D. 尝试访问传输中的数据

答: a

关于平台即服务的准确陈述是什么?

A. 使用者可以控制已部署的应用程序
B. 消费者对操作系统和数据库管理系统有控制权
C. 使用者可以控制编程语言和工具
D. 缺点umer 可以控制操作系统和存储

答: a

哪些云服务做 vmwarevcloud空气提供?

A. 基础架构即服务
B. 平台即服务
C. 数据库即服务
D. 软件即服务

答: a

元数据管理器的功能是什么。计算基于存储区域网络 (san)?

A. 中的负载平衡和数据迁移。计算基于 san
B. 提供软件定义的存储控制器的接口
C. 中的所有数据读取和写入操作。计算基于 san

D. 在本地存储上执行 ito 操作。计算客户端请求的系统

答: a

哪种技术可保护缓存中的数据不受电源故障的影响?

A. 跳马
B. 镜像
C. 缓存分层
D. 空闲冲洗

答: a

虚拟机管理器的功能是什么?

A. 抽象物理硬件并将其呈现给虚拟系统中国
B. 将资源请求从多个虚拟机发送到虚拟机管理程序内核
C. 将虚拟机硬件映射到虚拟机管理程序内核
D. 将来自虚拟机的资源请求直接显示到物理硬件

答: a

测量的服务特性为云服务提供商提供了哪些好处?

A. 实现资源使用的控制和优化
B. 使云服务能够相互通信
C. 支持特定资源的可用性取决于政策
D. 支持减少和/消除前期 it 支出

答: a

关于远程桌面服务的准确说明是什么?

A. 远程计算系统上承载的操作系统和应用程序由多个用户共享
B. 向用户提供运行操作系统和应用程序的专用虚拟机, 并将其托管在客户端系统上
C. 用户可以灵活地在远程计算系统上安装应用程序和修改操作系统设置
D. 远程桌面的用户界面在不使用远程显示协议的情况下传输到客户端

答: a

实现虚拟机 (vm) 存储迁移的好处是什么?

A. 通过在不同存储系统中重新分配虚拟机来平衡存储利用率
B. 使虚拟机即使由于故障而丢失源数据也能保持正常运行小时
C. 提高了迁移存储系统上虚拟机内部运行的应用程序的安全性
D. 降低组织的总体存储系统容量要求

答: a

文件系统通过网络访问 iscsi 存储系统的数据访问方法是什么?

A. 基于块
B. 基于文件
C. 基于对象

D. 基于部门

答: a

软件定义的网络的特点是什么?

A. 从数据平面中提取和分离控制平面
B. 数据平面将指令发送到控制平面来处理网络流量
C. 网络中的控制器开关柜通过数据平面函数
D. 外部软件结合了数据平面和控制平面函数

答: a

为什么组织在远程站点维护数据副本很重要?

A. 确保灾难恢复
B. 提供操作恢复
C. 确保数据存档以满足法规要求
D. 提供在生产操作中使用存根文件的灵活性

答: a

rest 应用程序编程接口用于发现存储服务的全局寻址是什么?

A. 统一资源标识符
B. 命名 空间
C. 可扩展标记语言
D. 控制器提供的 mac 地址

答: a

关于网络文件系统 (nfs) 协议的准确陈述是什么?

A. 提供一组远程过程调用以访问远程文件系统
B. 使用服务器消息块协议提供文件锁定蒂蒂
C. 将文件系统中的块 ito 请求转换为对象级请求
D. 随着工作负载的增加, 自动扩展客户端上的文件系统

答: a

哪种数据结构使两个节点端口能够识别和管理中的一组信息单元。纤维通道 (fc) san?

A. 交换
B. 序列
C. 框架
D. 域

答: a

存储基础结构管理中的可用性管理任务的示例是什么?

A. 为数据冗余设计新的复制解决方案
B. 执行存储空间消耗的趋势分析
C. 跟踪对存储组件的配置更改
D. 为用户指定存储空间配额

答: a

客户需要每晚执行备份。但是, 客户在一周内运行备份的时间有限夜间ts, 星期一直到周五晚上。

建议使用哪种备份粒度类型来满足这些夜晚的备份窗口?

A. 增量
B. 累积
C. 全
D. 微分

答: c

哪种结构登录类型发生在两个n _ 端口交换 fc-4 上层协议相关参数?

A. prli
B. 弗洛伊
C. 波洛伊
D. wwnn

答: a

组织计划在其环境中部署新应用程序。新应用程序需要 2 tb 的存储空间。在高峰工作负载期间, 应用程序预计将生成 9800 iops, 典型的 ito 大小为 4 kb。每个可用的容量可的磁盘驱动器是 250 gb。驱动器在70% 的利用率下可以执行的 iops 的最大数量为 90 iops。

满足应用程序容量所需的最小磁盘驱动器数量是多少, 以及

性能要求。raid 0 配置?

A. 8
B. 70C。1110D。140

答: c

风险管理风险评估步骤中的活动是什么?

A. 确定风险的可能性
B. 规划和部署安全控制
C. 持续观察现有风险
D. 确定增加风险的威胁来源

答: a

关于软件 raid 实现的准确陈述是什么?

A. 使用 cpu 周期的计算执行 raid 计算的系统
B. 支持在不兼容的 o s 上升级 raid 软件
C. 使用专用硬件控制器执行 raid 计算
D. 支持所有 raid 级别

答: a

有关在弗科三?

A. 弗科交换机提供 mac 地址, 以vn _ 端口在节点登录过程中

B. fc 交换机提供 mac 地址到ve _ 端口在发现过程中动态
C. 公司名称mpute 系统为vf _ 端口上弗科开关
D. 两者都有vf _ 端口和ve _ 端口从 fc 交换机获取 mac 地址

答: a

将节点添加到横向扩展 nas 群集有什么好处?

A. 提高群集性能
B. 减少资本支出
C. 简化的群集管理
D. 减少数据重复

答: b

哪种结构登录类型支持两个n _ 端口交换服务参数以建立会话?

A. 波洛伊
B. prli
C. 弗洛伊
D. wwpn

答: a

哪种数据访问方法使计算系统来访问驻留在存储系统上的文件系统?

A. 基于文件
B. 基于块
C. 基于对象

D. 基于部门

答: a

数据中心基础结构中业务流程层的功能是什么?

A. 提供用于自动执行管理任务的工作流
B. 聚合物理基础设施组件到资源池
C. 衡量 it 资源的消耗白各服务
D. 从底层硬件解耦操作环境

答: a

在一个弗科环境, 其功能为带宽分配提供了一个框架。不同的网络流量类?

A. 增强的变速箱选择
B. 基于优先级的流量控制
C. 拥塞通知
D. 数据中心桥接交换协议

答: a

"就地恢复" 备份方法需要哪种组件?

A. 基于磁盘的备份目标
B. 基于代理备份客户端
C. 服务器
D. 重复数据删除服务器

答: a

块级存储虚拟化的好处是什么?

A. 支持虚拟卷的在线扩展
B. 通过限制 rscn 流量来提高性能
C. 通过块存储的逻辑分段提高安全性设备
D. 通过跨 vsan 分离 fc 地址提高可伸缩性

答: a

一个组织每周日执行一次完整的备份, 并且累积备份在剩下的日子里周四, 发生数据损坏, 需要从备份副本中还原数据。

执行此还原需要多少个备份副本离子?

A. 1
B. 2
C. 3
D. 4

答: b

中的登录阶段发生了哪些操作。弗科三?

A. vn _ 端口获取 fc 地址
B. 节点找到纤维通道转发器
C. 初始化协议开始传输 fc 数据
D. vn _ port自n _ port建立配对

答: a

组织计划在其环境中部署新应用程序。新应用程序需要 4 tb 的存储空间。在高峰工作负载期间, 应用程序预计将生成 4900 iops, 典型的 ii/o 大小为 8 kb。每个可用的容量磁盘驱动器为 500 gb。驱动器在利用率为70% 的情况下可以执行的 iops 的最大数量为 110 iops。

在给定 raid 0 配置的情况下, 满足应用程序容量和性能要求所需的最小磁盘驱动器数量是多少定量?

A. 8
B. 20
C. 30
D. 45

答: d

哪种无损以太网功能有助于融合增强型以太网 (cee) 设备与网络中的其他 cee 设备传输和配置其功能?

A. 数据中心桥接交换协议
B. 增强的变速箱选择
C. 基于优先级的流量控制
D. 拥塞通知

答: a

在n _ port和一个f _ port在一个纤维通道 san 环境我Nt?

A. 弗洛伊
B. 波洛伊
C. prli
D. wwpn

答: a

iscsi 启动器如何发现其目标?

A. 发起者将查询发送到isns服务器的可用目标列表
B. 启动器从主 dns 服务器接收其目标的 iscsi 名称
C. 启动器使用数据中心桥接交换协议进行发现
D. 启动器发送 scsi 命令, 目标通过发送其名称进行响应

答: a

哪种类型的纤维通道 (fc) 端口标签 "x" 和 "y" 在展览中的表示是什么?

A. x 是一个f _ port和 y 是一个e _ 端口
B. x 是一个f _ port和 y 是一个g _ 端口
C. x 是一个g _ 端口和 y 是一个n _ port
D. x 是一个n _ port和 y 是一个e _ 端口

答: d

it 基础结构受到被动攻击会影响什么?

A. 保密
B. 诚信
C. 可用 性
D. 否认

答: a

关于 oauth 安全控制的准确陈述是什么?

A. 允许客户端代表资源所有者从资源服务器访问受保护的资源
B. 通过使用机密为客户端-服务器应用程序提供强身份验证-密钥加密
C. 使启动器和目标能够使用共享的密码相互进行身份验证
D. 使组织能够使用来自标识提供程序的身份验证服务

答: a

根据异步远程复制中的恢复点目标确定了什么?

A. 缓冲区的大小
B. 副本的大小
C. 响应时间
D. 源的位置

答: a

将内容寻址存储 (cas) 用作存档解决方案有什么好处?

A. 确保内容的真实性和完整性
B. 支持使用对象的不同内容 id 实现位置独立性
C. 提供执行生产操作的能力。n cas
D. 启用对存档数据的修改

答: a

在基于 ndmp 的备份方法中, ndmp 服务器的功能是什么?

A. 从存储设备读取数据并将数据发送到备份设备
B. 从备份服务器读取数据并将数据发送到备份设备
C. 指示 nas 的头创业备份操作
D. 指示客户端上的备份代理将数据发送到备份设备

答: a

哪种类型的纤维通道 (fc) 端口标签 "x" 和 "y" 在展览中的表示是什么?

A. x 是一个e _ 端口和 y 是一个n _ port
B. x 是一个f _ port和 y 是一个e _ 端口
C. x 是一个f _ port和 y 是一个f _ port
D. x 是一个n _ port和 y 是一个n _ port

答: d

基于对象的存储系统的哪一项功能抽象并提供了独立于位置的应用程序存储的通用视图?

A. 全局命名空间
B. 灵活的数据访问
C. 多租户
D. 横向扩展体系结构

答: a

使用融合基础架构构建数据中心有什么好处?

A. 缩短获取和获取部署基础 设施
B. 提供购买单个 it 组件的灵活性
C. 将现有的 it 组件集成到基础架构中
D. 提供更改供应商和防止供应商锁定的灵活性

答: a

一家服务提供商正在为企业 p 和企业 q 提供云服务。

展览代表哪种云部署模型?

A. 外部托管的私有云
B. 本地社区云
C. 公共云
D. 外部托管的社区云

答: a

一家预算有限的初创公司正计划为其运营采用混合云解决方案。该公司拥有为客户提供服务并具有严格服务级别的关键业务应用程序。此外, 该公司还没有那么挑剔的应用备份和归档等。

应该向公司推荐哪种混合云战略?

A. 在外部托管的私有云上部署关键业务应用程序。在公共云上部署不太关键的应用程序。
B. 部署总线在本地私有云上的非关键应用程序。在外部托管的私有云上部署不太关键的应用程序。
C. 在本地私有云上部署关键业务应用程序。

部署不太关键的 ap公共云上的应用程序。
D. 在外部托管的私有云上部署关键业务应用程序。在本地私有云上部署不太关键的应用程序。

答: a

关于逻辑卷的准确语句是什么?计算系统?

A. 可以跨越多个物理卷
B. 只能创建弗洛马单个物理卷
C. 必须在多个卷组之间创建
D. 允许多个文件系统运行恩利

答: a

一个系统有三个组成部分, 所有三个组成部分都需要24小时运行;周一至周五。在一个特别的一周, 组件1发生故障, 如下所示:

✑ 星期二 = 上午8时至11时
✑ 星期四 = 晚上8点至晚上10点
✑ 星期五 = 上午5时至9时

组件1在该周的平均故障间隔时间是多少?

A. 3小时
B. 37小时
C. 40小时
D. 53小时

答: b

展览中代表了哪个环境?

A. 回写缓存
B. 写入缓存
C. 阅读小姐
D. 阅读命中

答: a

通过发送欺骗电子邮件并将用户重定向到虚假网站来执行哪种攻击?

A. 钓鱼
B. 中间人
C. 拒绝服务
D. 否认

答: a

组织计划通过保留其旧式备份应用程序来部署重复数据删除解决方案。他们担心应用程序服务器的性能和备份过程中的长备份窗口。

应向组织推荐哪些重复数据删除解决方案?

A. 后处理
B. 基于源的全球重复数据删除
C. 可变长度段和基于源的
D. 固定长度块和基于源

答: a

whi进程将多个物理驱动器分组, 并将其呈现给计算系统作为一个单一的逻辑卷?

A. 串联
B. 分区
C. 条带化
D. 编排

答: a

哪个固态驱动器组件执行写合并?

A. 控制器
B. 接口
C. 非易失性存储器
D. 缓存

答: a

当客户端将数据发送到群集时, 横向扩展的 nas 群集执行哪种操作?

A. 数据被并行划分并存储在多个节点上
B. 数据被整合到一个块中, 然后存储在 nas 头上

C. 数据均匀地分布到群集中的每个文件系统
D. nas 文件系统和集群动态增长以存储数据

答: a

什么准确地描述了 vsan?

A. fc san 上的逻辑结构, 可实现一组节点之间的通信
B. fc san 上的逻辑结构, 它与 fc san 中的区域具有1到1的关系
C. 跨 fc san 聚合 fc 的逻辑结构创建网络池的 san
D. 跨 fc san 的逻辑结构, 允许 san 之间无中断的文件移动

答: a

关于虚拟机 (vm) 快照的准确陈述是什么?

A. 捕获在特定时间点运行的 vm 的状态和数据
B. 提供在创建快照后删除父 vm 的功能
C. 作为父 vm 的独立副本运行
D. 提供将 vm 数据还原到任何点的功能名字

答: a

展览代表哪种类型的结构拓扑?

A. 部分网格
B. 全网
C. 单芯边
D. 双核心边

答: a

关于 vsan 的准确陈述是什么集群?

A. 允许来自多个 vsan 的网络流量遍历单个互交换链接
B. 启用f _ port通过单个端口通道传输多个 vsan 通信
C. 提供 vsan id 到f _ 端口包括他们在 vsan 中
D. 之间转发 fc 帧f _ 端口属于同一 vsan 的

答: a

当新驱动器添加到池中时, 是什么提供了在整个池中自动跨物理存储驱动器重新定位的功能?

A. 存储池重新平衡
B. 搬迁的程度
C. 存储池分层
D. 自动范围分层

答: a

哪种 emc 产品提供了支持对象存储服务的软件定义存储平台?

A. 弹性云存储
B. vipr控制器
C. 斯卡莱奥
D. xtremio

答: a

哪种 emc 产品提供了一个软件定义的存储平台, 以创建计算-基于存储区域网络?

A. 斯卡莱奥
B. xtremio
C. 伊西隆
D. 阿特莫斯

答: a

kerberos 中使用哪种技术在不安全的网络上对客户端-服务器应用程序进行身份验证?

A. 密钥加密
B. 单向哈希函数
C. 共享的秘密
D. 开放 id 控制

答: a

关于通用互联网文件系统 (cifs) 协议的准确陈述是什么?

A. 使 cifs 服务器能够维护有关每个连接的客户端的连接信息
B. 使用远程 p提供对 cifs 支持的文件系统的访问的循环系统调用机制
C. 包含可持续用户数据报协议的一个打开的变体, 该协议存储有关打开文件的信息
D. 使用文件系统锁定使用户能够同时覆盖文件系统的所有元数据

答: a

关于存档服务器功能的准确陈述是什么?

A. 使能够为rchiving 数据
B. 安装阿根特森存档存储设备
C. 扫描可以扫描的数据比尔奇韦德在应用程序服务器上
D. 在存档存储设备上创建存根文件

答: a

在 fc san 环境中, 管理员希望确保特殊开关端口不能用作e _ 端口并且不能用于创建互交换链接。管理员应使用哪种安全机制?

A. 端口类型锁定
B. 端口绑定
C. P埃雷尔波特禁用
D. 织物装订

答: a

大数据的 "多样性" 特征意味着什么?

A. 数据由多个来源以不同的格式生成
B. 数据的意思经常变化
C. 不同的数据质量会影响其可靠性和准确性
D. 数据变化率影响其及时分析

答: a

启用的内容。n _ portid 虚拟化 (npiv)?

A. 一个单一的物理n _ portto获取多个 fc 地址
B. 单个虚拟n _ port充当物理以太网端口
C. 将虚拟卷映射到 lun id 的虚拟化层
D. 一个单一的物理n _ port充当虚拟 hba 端口

答: a

一个应用程序生成8400小的随机 i/中。在读取写入比率为2:1 的峰值工作负载。raid 半配置在峰值活动时的磁盘负载是多少?

a. 我的工作5600
B。11200
C。16800
D。22400

答: b

关于拒绝服务攻击的准确陈述是什么?

A. 防止合法用户从访问资源或服务
B. 故意滥用特权以危害数据安全
C. 获得对用户帐户和数据的未经授权的访问
D. 捕获用户的凭据, 然后发送给攻击者

答: a

关于增量永久备份的准确说明是什么?

A. 只需要一个初始完全备份
B. 需要定期完全备份
C. 备份不是直接从生产数据创建的
D. 复制自上次完全备份以来已更改的数据

答: a

关于完整卷复制的准确说明是什么?

A. 目标设备至少与源设备一样大
B. 目标设备只需要源设备所用空间的一小部分
C. 只有在复制 sessi 之后才能访问目标设备在开始
D. 目标和源设备应位于不同的存储阵列上

答: a

哪种类型的存储系统是专门为存储固定内容而构建的?

A. 内容寻址存储
B. 基于块的存储
C. 基于文件的存储
D. 统一存储

答: a

什么是指 it 基础架构在其指定的运营时间内根据业务预期进行工作的能力?

A. 信息的可用性
B. 灾难恢复
C. 遵守合规性
D. 业务敏捷性

答: a

什么准确地描述了 san 中的链路聚合?

A. 组合两个或多个并行互交换链接到一个单一的逻辑互交换链接
B. 聚合所有 hba 和存储系统端口对的数据传输速率
C. 将计算到计算的流量和存储流量整合到一个单一的互交换链接
D. 替换多个并行互交换链接由一个单一的物理互交换链接

一个沃尔: a

在虚拟化数据中心中采用 "就地恢复" 备份方法的好处是什么?

A. 提供故障虚拟机的即时恢复

B. 降低恢复点目标
C. 消除虚拟机备份过程中的冗余数据
D. 消除备份窗口

答: a

关于数据湖的准确陈述是什么?

A. 将数据存储为源格式的精确或接近精确的副本
B. 支持查询和在存储数据之前对数据进行分类和组织, 进行分析
C. 在基于对象的存储上以结构化格式存储当前和历史数据
D. 为报表生成提供跨组织的单一一致的数据视图

答: a

在文件级虚拟化实现中, 是什么将文件系统的逻辑路径映射到其物理路径?

A. 全局命名空间
B. 远程过程调用
C. 分布式文件系统
D. 缓存一致性

答: a

哪些元素与基于对象的存储系统中的对象相关联?

A. 数据、元数据、对象 id 和属性
B. lun id、数据、元数据和对象 id
C. 元数据、对象 id、属性和文件路径
D. 对象 id、属性、lun id 和文件路径

的哪一部分纤维"x" 标签在展览中的标签是否代表通道 (fc) 框架?

A. 框架标头
B. Crc
C. sof
D. 数据字段

答: a

基于软件的对象存储实现的优势是什么?

A. 提供重用现有基础结构的灵活性
B. 所需的存储容量更少托库亚 大量的对象
C. 提供为对象创建多个对象 id 的灵活性
D. 需要更少的硬件来支持可扩展的体系结构

答: a

哪种数据中心特性可确保提供足够的资源来有效地存储和处理数据?

A. 能力
B. 可用 性
C. 可 伸缩 性
D. 性能

什么准确地描述了 it 基础结构中的攻击媒介?

A. 必须遵循的一系列步骤为了完成攻击
B. 可用于发起攻击的各种入口点
C. 利用中的漏洞所需的工作量。e 基础设施
D. 识别受攻击的系统组件的过程

答: a

哪些 emc 产品支持管理vblock系统?

A. 统一基础架构管理器
B. 镜像视图
C. 服务保险套房
D. viprSrm

答: a

是什么使结构中所有交换机上的名称服务器保持最新?

A. SW-RSCN
B. 管理服务器
C. 分区
D. 弗洛伊

答: a

关于软件即服务的准确陈述是什么?

A. 使用者对用户特定的应用程序配置设置的控制有限
B. 使用者可以控制操作系统和已部署的应用程序
C. 使用者可以控制应用程序宿主环境的配置设置
D. 使用者对选定网络组件 (如主机防火墙) 的控制有限

答: a

使用哪种方法在主数据中心和远程数据中心之间建立 vpn 连接以执行安全的远程复制?

A. 站点到站点 vpn 连接
B. 远程访问 vpn 连接
C. 站点内 vpn 连接
D. 远距离 vpn 连接

答: a

更改块跟踪备份技术的优势是什么?

A. 减少备份窗口
B. 支持对任何时间点的恢复
C. 无需重复数据删除
D. 提高备份设备性能

答: a

哪种类型的数字数据由格式不一致的文本数据组成, 但可以使用软件工具进行格式化?

A. 准结构数据
B. 半结构化数据
C. 元
D. 非结构化数据

答: a

本展览展示了软件定义的存储环境。展览中的标签 "x" 和 "y" 代表什么?

A. x 是虚拟存储系统, y 是虚拟存储池
B. x 是虚拟存储池, y 是虚拟存储系统
C. x 是物理存储池, y 是虚拟存储系统
D. x 是虚拟存储池, y 是物理存储系统

答: a

哪些结构服务将 SW-RSCNs 分配给其他交换机。纤维通道 san?

A. 织物控制器
B. 结构登录服务器
C. 名称服务器
D. 结构管理服务器

答: a

哪种 emc 产品提供了支持块存储和文件存储服务的软件定义平台?

A. vipr控制器
B. 斯卡莱奥
C. 弹性云存储
D. xtremio

答: a

在业务连续性规划生命周期的哪个阶段, 组织确定关键业务流程并分配恢复优先级?

A. 分析
B. 建立目标
C. 设计和开发
D. 实施

答: a

关于 nas 环境中的三方 ndmp 备份, 什么是准确的陈述?

A. 备份设备可以在多个 nas 头之间共享
B. 每个 nas 头应该有一个专用的备份设备
C. 在到达备份设备之前, 备份数据至少要穿过三个 nas 头
D. 只有在存在三个或更多 nas 头的情况下, 才执行备份

答: a

什么是弗科开关?

A. 以太网桥
B. 虚拟n _ port
C. 融合网络适配器
D. fcip 转发器

答: a

组织在其数据中心中部署了多个虚拟机 (vm)。vm 文件存储在基于块的存储系统上。在虚拟机备份过程中, 虚拟机上的应用程序受到影响, 因为虚拟机上的备份代理正在消耗大量资源的数量。

建议使用哪种备用备份解决方案来解决此问题?

A. 基于映像的备份
B. 三向 ndmp 备份
C. 双向 ndmp 备份
D. 基于目标的重复数据删除备份

答: a

在基于对象的存储系统中, 使用擦除编码技术将数据划分为9个数据段和3个编码段。磁盘驱动器故障的最大数量是多少?数据是否受此配置的保护?

A. 3
B. 6
C. 9
D. 12

答: a

应用程序虚拟化的好处是什么?

A. 避免同一应用程序的不同版本之间的冲突
B. 使应用程序能够直接访问存储系统上的 lun
C. 在不需要使用缓存的情况下运行应用程序
D. 向应用程序提供的内存多于物理上可用的内存

答: a

什么是特征横向扩展的 nas?

A. 当节点添加到群集中时, 文件系统会动态增长
B. 在整个集群中最多可以创建四个文件系统
C. 在群集中的每个节点上创建不同的文件系统
D. 可以在单个群集中的每个节点上混合使用不同的文件系统

答: c

s@lm @n
EM C
Exam E05-001
Information Storage and Management Version 3 Exam
[ Total Questions: 171 ]
Which EMC product provides automated monitoring and reporting of a software-defined
storage infrastructure?
A. ViPR SRM
B. SnapSure
C. Avamar
D. FAST VP
Answer: A
What is an accurate statement about a virtual tape library?
A. Legacy backup software can be used without additional modules or changes
B. Portability of physical tapes tooffsite locations is supported
C. Only sequential data access for both backup and recovery is supported
D. Regular maintenance tasks associated with a physical tape drive are required
Answer: A
Which VMware product provides a network virtualization platform for a software-defined
data center?
A. NSX
B. ESXi
C. Horizon
D. AirWatch
Answer: A
QUESTION NO: 1
QUESTION NO: 2
QUESTION NO: 3
QUESTION NO: 4
2
What is a function of a Fibre Channel Forwarder in an FCoE SAN?
A. Applies zoning configurations and provides fabric services
B. Transfers FCoE traffic over an FC SAN
C. Encapsulates IP packets into FC frames
D. Provides both NIC and FC HBA functionality
Answer: A
How do VSANs ensure security in an IT infrastructure?
A. By providing isolation over a shared infrastructure
B. By authenticating a new switch that joins a fabric
C. By limiting the number of switches in a fabric
D. By prohibiting an unused switch port from being used
Answer: A
What is a benefit of N_Port virtualization (NPV)?
A. Reduces the number of domain IDs in a fabric
B. Eliminates the overhead of fabric services in an FC SAN
C. Enables online expansion of virtual volumes
D. Allows an N_Port to transfer multiple VSAN traffic
Answer: A
Which data center management process involves collating and presenting the utilization of
resources?
A. Reporting
QUESTION NO: 5
QUESTION NO: 6
QUESTION NO: 7
3
B. Provisioning
C. Planning
D. Maintenance
Answer: A
What is a benefit of link aggregation in a SAN?
A. Provides a higher throughput than a single interswitch link can provide
B. Distributes the network traffic across all virtual SANs, ensuring even virtual SAN
utilization
C. Optimizes performance by consolidating all interswitch links into a single physical link
D. Provides the flexibility to deploy the same interswitch links for both FC and iSCSI traffic
Answer: A
Which capability is provided by a software-defined storage controller?
A. Ability to pool and abstract physical storage and presentit as an open storage platform
B. Ability for multiple operating systems to run concurrently on a single physical compute
system
C. Mechanisms to automatically create application programming interfaces for centralized
management
D. Single self-contained package with integrated hardware and software components
Answer: A
What is an accurate statement about a hardware RAID implementation?
A. Uses a specialized hardware controller installed on a storage array
B. Uses CPU cycles of a compute system to perform RAID calculations
QUESTION NO: 8
QUESTION NO: 9
QUESTION NO: 10
4
C. Requires a RAID controller and operating system to be compatible
D. Offers a low-cost solution for providing disk protection
Answer: A
What is an accurate statement about OpenID control?
A. Enables an organization to use authentication services from an identity provider
B. Enables initiators and targets to authenticate each other by using a shared secret code
C. Provides strong authentication for client-server applications by using secret-key
cryptography
D. Allows a client to access protected resources from a resource server on behalf of a
resource owner
Answer: A
What is an accurate statement about Infrastructure as a Service?
A. Consumer has control over the operating systems and the deployed applications
B. Consumer only has control over user-specific application configuration settings
C. Consumer has control over network devices, compute systems, and storage systems
D. Consumer only has control over the configuration settings of the application-hosting
environment
Answer: A
What is a benefit of implementing the server flash caching technology in a storage
environment?
A. Provides performance acceleration for read intensive workloads
B. Reduces the number of storage systems in a data center
QUESTION NO: 11
QUESTION NO: 12
QUESTION NO: 13
5
C. Eliminates the need for cache on a storage system
D. Improves the network performance during peak workloads
Answer: A
What determines how far back the recovery points can go in a continuous data protection
(CDP) solution?
A. Amount of space that is configured for the journal
B. Size of the CDP appliance used for replication
C. Size of the source and replica volumes
D. Type of write splitter used for replication
Answer: A
Which capability does big data analytics provide?
A. Enabling data-driven decisions from large volumes of data
B. Storing large volumes of data without affecting availability
C. Reducing the data storage capacity requirement
D. Performing analytics using traditional tools
Answer: A
Which EMC product is a hyper-scale storage infrastructure that provides universal
accessibility with support for object and HDFS?
A. ECS Appliance
B. XtremIO
C. Data Domain
D. Centera
QUESTION NO: 14
QUESTION NO: 15
QUESTION NO: 16
6
Answer: A
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
A. X is an E_Port and Y is an F_Port
B. X is an F_Port and Y is an N_Port
C. X is an N_Port and Y is an E_Port
D. X is an N_Port and Y is an F_Port
Answer: B
Which component of a software-defined storage (SDS) environment enables integration
with external monitoring tools?
A. REST API
B. Metadata service
C. SDS web service
D. Storage agent
Answer: A
QUESTION NO: 17
QUESTION NO: 18
QUESTION NO: 19
7
What accurately describes the flow control mechanism in an FC SAN?
A. Both transmitting and receiving ports agree on the number of buffers available during
port login
B. Negotiation occurs between an E_Port and an F_Port, and between two N_Ports
C. Credit value is incremented when a frame is transmitted and decremented upon
receiving a response
D. Receiver Ready (R_RDY) is sent from the receiving port if available credits reach zero
Answer: A
What enables an administrator to create device groups in an IP-SAN for restricting device
communications to a group?
A. iSNS discovery domain
B. NIC teaming
C. Demilitarized zone
D. Security identifier
Answer: A
What is the purpose of monitoring capacity in a storage infrastructure?
A. Tracking the amount of storage infrastructure resources used and available
B. Evaluating utilization of components and identifying bottlenecks
C. Tracking configuration changes to the storage infrastructure elements
D. Identifying component failures that may lead to service unavailability
Answer: A
What is a benefit of a storage area network (SAN)?
QUESTION NO: 20
QUESTION NO: 21
QUESTION NO: 22
8
A. Enables compute systems across locations to access shared storage
B. Ensures secure data transmission using only channel technologies
C. Ensures high response times without the protocol overhead
D. Enables consolidation of control and data planes in a single system
Answer: A
What is an accurate statement about a virtual desktop infrastructure?
A. Each user is provided a dedicated desktop VM with its own operating system and
applications
B. Operating system and applications hosted on a client system are shared by multiple
users
C. Each user has an individual desktop session on the remote compute system in which
applications execute
D. Operating system and applications on the remote desktop are downloaded on the client
for local execution
Answer: A
An organization plans to deploy a new backup device in their data center. The organization
wants the new backup device to support their legacy backup software without requiring any
changes to the software. In addition, the organization wants the backup device to provide
random data access for better performance.
Which backup device should be recommended?
A. Virtual tape library
B. Tape-based backup appliance
C. Tape library
D. Optical juke box
Answer: A
QUESTION NO: 23
QUESTION NO: 24
9
In an FC SAN environment, which security mechanism prevents a switch port from being
enabled even after a switch reboot?
A. Port locking
B. Port type locking
C. Port binding
D. Fabric binding
Answer: A
What is an accurate statement about hypervisor-based continuous data protection (CDP)?
A. Write splitter is embedded in the hypervisor
B. Journal is stored in a virtual machine
C. Journal and replica use the same storage volume
D. Virtual appliance runs on a storage system
Answer: A
In continuous data protection (CDP) remote replication, where are the two split write I/Os of
an incoming write I/O directed?
A. One I/O goes to the local CDP appliance and the other I/O goes to the production
volume
B. One I/O goes to the compute system and the other I/O goes to the production volume
C. One I/O goes to the remote CDP appliance and the other I/O goes to the replica
D. One I/O goes to the journal volume and the other I/O goes to the replica
Answer: A
QUESTION NO: 25
QUESTION NO: 26
QUESTION NO: 27
QUESTION NO: 28
10
Which EMC product provides a remote replication solution for EMC VMAX3 storage
systems?
A. SRDF
B. SnapSure
C. MirrorView
D. ProtectPoint
Answer: A
Which EMC block-based storage system uses a cluster design to scale both capacity and
performance?
A. XtremIO
B. Isilon
C. XtremSF
D. ScaleIO
Answer: A
What is determined by the recovery point objective in a business continuity solution?
A. Frequency of the backup
B. Type of backup devices
C. Type of disaster recovery site
D. Distance between the primary and disaster recovery sites
Answer: A
What is an accurate statement about the application streaming technique of application
virtualization?
QUESTION NO: 29
QUESTION NO: 30
QUESTION NO: 31
11
A. Application is downloaded in portions on the client for local execution
B. Application executes remotely and its user interface is transmitted to the client
C. Application executes on the client without the use of a locally-installed agent
D. Application is converted into a standalone package that directly executes on the client
Answer: A
Which type of storage device does the “X” represent in the exhibit?
A. Object-based
B. Block-based
C. File-based
D. Unified-based
Answer: A
What is an accurate statement about VLANs and VSANs in an FCoE environment with an
existing FC SAN?
A. A dedicated VLAN must be configured for each VSAN
B. VLANs configured for VSANs must carry regular LAN traffic
C. Default VLAN must map to all VSANs defined in the FCoE switch
D. A minimum of four VLANs must be created to isolate VSAN traffic
Answer: A
QUESTION NO: 32
QUESTION NO: 33
12
What accurately describes the seek time of a disk drive?
A. Time taken to position the read/write head over the correct track
B. Time taken by the platter to position the data under the read/write head
C. Time taken to read a block of data from the platter
D. Time taken by the controller to service an I/O from the application
Answer: A
An application generates 8400 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 5 configuration?
A. 4800
B. 11200
C. 16800
D. A.22400
Answer: C
What is an accurate statement about the application presentation technique of application
virtualization?
A. Application executes remotely and its user interface is transmitted to the client
B. Application is downloaded in portions onthe client for local execution
C. Application executes on the client without the use of a locally-installed agent
D. Application is converted into a standalone package that directly executes on the client
Answer: A
QUESTION NO: 34
QUESTION NO: 35
QUESTION NO: 36
QUESTION NO: 37
13
To improve performance, which EMC product allows a PCIe flash card to be deployed in a
compute system?
A. XtremSF
B. XtremCache
C. ScaleIO
D. XtremIO
Answer: A
What is a benefit of deploying a multi-site storage system-based remote replication
solution?
A. Ensures disaster recovery protection remains available in the event of source or remote
site failures
B. Provides the capability to recover data to any point-in-time
C. Requires low network bandwidth to perform synchronous replication
D. Enables a consistent near-zero RPO in the event of source and remote site failures
Answer: A
What is a benefit of configuring EX_Ports on each Fibre Channel over IP (FCIP) gateway in
an FCIP tunnel implementation?
A. Enables FC-FC routing through the FCIP tunnel without merging the fabrics
B. Merges the fabrics at either end of the FCIP tunnelto create a single large fabric
C. Transfers VSAN tagged traffic over the FCIP tunnel without FC protocol overhead
D. Creates eight virtual FC links on the FCIP tunnel that can be paused and restarted
independently
Answer: A
QUESTION NO: 38
QUESTION NO: 39
QUESTION NO: 40
14
What is signified by the “variability” characteristic of big data?
A. Meaning of the data changes constantly
B. Data is generated in different formats by numerous sources
C. Data change rate affects its timely analysis
D. Varying data quality affects its reliability and accuracy
Answer: A
What improves the performance of multi-threaded large block I/O workloads on a solid
state drive?
A. Parallel I/O channels
B. I/O coalescing
C. Native command queuing
D. High capacity RAM cache
Answer: A
An application generates 4200 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 6 configuration?
A. 2800
B. 5600
C. 8400
D. 11200
Answer: D
Which component of a software-defined storage (SDS) environment manages and
provisions storage?
QUESTION NO: 41
QUESTION NO: 42
QUESTION NO: 43
15
A. SDS controller
B. REST API
C. SDS web service
D. Storage agent
Answer: A
Which type of fabric topology does the exhibit represent?
A. Full mesh
B. Partial mesh
C. Single core-edge
D. Dual core-edge
Answer: A
Which LUN expansion technique provides both capacity expansion and performance
improvement?
A. Striped metaLUN
B. Partitioned metaLUN
C. Virtual metaLUN
D. Concatenated metaLUN
QUESTION NO: 44
QUESTION NO: 45
16
Answer: A
An organization plans to deploy a new application in their environment. The new
application requires 3 TB of storage space. During peak workloads, the application is
expected to generate 2450 IOPS with a typical I/O size of 2 KB. The capacity of each
available disk drive is 500 GB. The maximum number of IOPS a drive can perform at with
70percent utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and
performance requirements given a RAID 0 configuration?
A. 6
B. 16
C. 25
D. 28
Answer: D
What is an accurate statement about infrastructure discovery?
A. Creates an inventory of infrastructure components and provides information about the
components
B. Standardizes on-going infrastructure management activities andassesses potential risks
of the activities
C. Classifies, organizes, and analyzes all infrastructure management bestpractices stored
in data lakes
D. Detects potential security attacks on a storage infrastructure and deploys specialized
tools to eliminate the attacks
Answer: A
QUESTION NO: 46
QUESTION NO: 47
QUESTION NO: 48
17
What does the transformation of an operating model for third platform adoption involve?
A. Provisioning IT resources through a self-service portal
B. Establishing new roles and responsibilities to manage IT services
C. Adopting virtualization technologies to enable automation
D. Building new technical and business skills in the IT staff
Answer: A
What is an advantage of performing cumulative backups compared to incremental backups
for the same data?
A. Facilitates faster restores
B. Facilitates faster backups
C. Reduces the storage space required for backups
D. Eliminates the need for full backups
Answer: A
An administrator has defined a backup policy. Full backups will be performed at 8 PM every
Monday and incremental backups performed at 8 PM the remaining days.
How many backup copies are required to restore the files if they were accidentally deleted
on Friday morning?
A. 1
B. 2
C. 3
D. 4
Answer: D
QUESTION NO: 49
QUESTION NO: 50
QUESTION NO: 51
18
What is an accurate statement about Challenge Handshake Authentication Protocol
(CHAP) control?
A. Enables initiators and targets to authenticate each other by using a shared secret code
B. Provides strong authentication for client-server applications by using secret-key
cryptography
C. Allows a client to access protected resources from a resource server on behalf of a
resource owner
D. Enables an organization to use authentication services from an identity provider
Answer: A
What is a function of the FC-1 layer of the Fibre Channel (FC) protocol stack?
A. Defines data encoding
B. Provides FC addressing
C. Defines the physical interface
D. Maps upper layer protocols to FC layers
Answer: A
Which method does an intrusion detection and prevention system (IDPS) use to identify
intrusions by scanning and analyzing events to detect if they are statistically different from
normal events?
A. Anomaly-based
B. Signature-based
C. Profile-based
D. Device-based
Answer: A
QUESTION NO: 52
QUESTION NO: 53
QUESTION NO: 54
19
What is an accurate statement about a hybrid cloud?
A. Supports data and application portability for load balancing between clouds
B. Allows organizations with common concerns to share the cost of deploying the cloud
C. Enables the entire cloud infrastructure to be controlled by the consumer’s IT staff
D. Allows an organization to outsource the implementation of a private cloud to a cloud
provider
Answer: A
What contains the information about backup configuration and backup metadata?
A. Backup catalog
B. Proxy server
C. Tracking database
D. Backup image
Answer: A
Which cloud computing characteristic enables multi-tenancy and abstracts the location of
provided resources?
A. Resource pooling
B. Measured service
C. Rapid elasticity
D. Broad network access
Answer: A
What is a benefit of deploying a Defense in Depth strategy?
QUESTION NO: 55
QUESTION NO: 56
QUESTION NO: 57
20
A. Provides additional time for organizations to detect and respond to an attack
B. Eliminates the attack vector from the IT infrastructure
C. Eliminates the attack surface from the IT infrastructure
D. Enables organizations to deploy a unified security solution
Answer: A
Which type of LUN provides full control for precise data placement and allows an
administrator to create LUNs on different RAID sets if there is workload contention?
A. Traditional
B. Thin
C. Journal
D. Bitmap
Answer: A
Which product provides an integrated IT infrastructure solution for data center deployment
by combining IT resources into a single package?
A. VCE Vblock
B. EMC VPLEX
C. EMC ViPR
D. VMware vCloud
Answer: A
What accurately describes the function of the policy engine in a file-level storage tiering
environment?
A. Facilitates moving data from primary storage to secondary storage based on pre-defined
QUESTION NO: 58
QUESTION NO: 59
QUESTION NO: 60
21
policies
B. Creates a stub file in secondary storage pointing to data on the primary storage
C. Ensures that primary and secondary storage have identical data for compliance
D. Runs the backup agent and determines the files to be copied to the secondary storage
Answer: A
What is an example of a security management task in a storage infrastructure?
A. Configuring LUN masking to restrict hosts from accessing a specific LUN
B. Enforcing storage space quotas to restrict users from overprovisioning resources
C. Restricting the number of simultaneous client access to application servers
D. Enabling sending messages to a support center in the event of resource failure
Answer: D
In an object-based storage system, data is divided into 10 data segments and 4 coding
segments using the erasure coding technique. What is the maximum number of disk drive
failures against which data is protected by this configuration?
A. 4
B. 6
C. 10
D. 14
Answer: A
An organization performs a full back up every Sunday and incremental back ups on the
remaining days at 9:00 AM. However, at 10 PM on Friday, a data corruption occurs that
requires a data restoration from the backup copies.
QUESTION NO: 61
QUESTION NO: 62
QUESTION NO: 63
22
How many backup copies are required to perform this restoration?
A. 2
B. 4
C. 5
D. 6
Answer: D
What is an accurate statement about three-way NDMP backup in a NAS environment?
A. Backup data is sent directly from NAS to the backup device
B. Backup data is sent to the backup device through the application servers
C. A dedicated backup device is required for each NAS
D. All NAS systems should have the same operating environment
Answer: A
Which data center characteristic ensures that data is stored and retrieved exactly as it was
received?
A. Data integrity
B. Security
C. Scalability
D. Manageability
Answer: B
Why should a replica be consistent with its source?
A. Ensure the usability of the replica
QUESTION NO: 64
QUESTION NO: 65
QUESTION NO: 66
23
1
1
B. Reduce the need to create multiple replicas
C. Ensure the security of the replica
D. Reduce the size of the replica
Answer: D
Which NAS implementation requires separate management of the NAS head and the
storage?
A. Gateway
B. Scale-out
C. Unified
D. Integrated
Answer: A
What is an accurate statement about an integrated NAS controller?
A. Contains a specialized operating system dedicated to file serving
B. Stripes data across multiple NAS systems for data protection
C. Abstracts and pools NAS controllers across multiple NAS systems
D. Contains an FC Forwarder that is optimized for file sharing functions
Answer: A
A system has three components and all three components need to be operational for 24
hours; Monday through Friday. During a particular week, failure of component 3 occurred
as follows:
Tuesday = 8 AM to 1 PM
Thursday = 5 PM to 10 PM
QUESTION NO: 67
QUESTION NO: 68
QUESTION NO: 69
24
1 Friday = 5 AM to 10 AM
What is the mean time between failures on component 3 for that week?
A. 5 hours
B. 35 hours
C. 40 hours
D. 51 hours
Answer: B
Which type of digital data has no defined format but has a self-describing structure that
enables its analysis?
A. Semi-structured data
B. Structured data
C. Metadata
D. Quasi-structured data
Answer: A
What is a benefit of backing up data to a disk library?
A. Provides improved backup and recovery performance
B. Provides built-in portability to meet offsite requirements
C. Supports the shoe shining effect for improved backup performance
D. Pre-configured and dedicated appliance is only used for backups
Answer: A
The exhibit represents an FCIP tunnel configuration that merges the two FC SANs at either
QUESTION NO: 70
QUESTION NO: 71
QUESTION NO: 72
25
end of the tunnel. Which types of ports do the labels "X" and "Y" represent on the FCIP
gateway shown in the exhibit?
A. X = E_Port and Y = VE_Port
B. X = F_Port and Y = VN_Port
C. X = VF_Port and Y = E_Port
D. X = VN_Port and Y = VE_Port
Answer: A
Which process uses a file-level storage tiering technique to perform policy-based data
movement?
A.
Archiving
B.
Deduplication
C.
Replication
D.
Backup
Answer: A
What is an example of an active attack on an IT infrastructure?
QUESTION NO: 73
QUESTION NO: 74
26
A. Attempt to modify information for malicious purposes
B. Attempt to copy the data from the storage system
C. Attempt to gain unauthorized access into the system
D. Attempt to gain access to the data in transit
Answer: A
What is an accurate statement about Platform as a Service?
A. Consumer has control over the deployed applications
B. Consumer has control over the operating system and database management system
C. Consumer has control over the programming languages and tools
D. Consumer has control over the operating system and storage
Answer: A
Which cloud service does VMware vCloud Air provide?
A. Infrastructure as a Service
B. Platform as a Service
C. Database as a Service
D. Software as a Service
Answer: A
What is a function of the metadata manager in a compute-based storage area network
(SAN)?
A. Controls load balancing and data migration in a compute-based SAN
B. Provides an interface to the software-defined storage controller
C. Controls all data read and write operations in a compute-based SAN
QUESTION NO: 75
QUESTION NO: 76
QUESTION NO: 77
27
D. Performs the I/O operations on the local storage of a compute system as requested by a
client
Answer: A
Which technique protects the data in cache from power failures?
A. Vaulting
B. Mirroring
C. Cache tiering
D. Idle flushing
Answer: A
What is a function of a virtual machine manager?
A. Abstracts physical hardware and presents it to a virtual machine
B. Sends resource requests from multiple virtual machines to the hypervisor kernel
C. Maps the virtual machine hardware to the hypervisor kernel
D. Presents resource requests from a virtual machine directly to physical hardware
Answer: A
Which benefit does the measured service characteristic provide to a cloud service
provider?
A. Enables control and optimization of resource use
B. Enables cloud services to communicate with each other
C. Enables availability of specific resources depending on policy
D. Enables the reduction and/or elimination of upfront IT expenditure
QUESTION NO: 78
QUESTION NO: 79
QUESTION NO: 80
28
Answer: A
What is an accurate statement about remote desktop services?
A. Operating system and applications hosted on a remote compute system are shared by
multiple users
B. Users are provided dedicated virtual machines running operating system and
applications, and hosted on a client system
C. Users have the flexibility to install applications and modify operating system settings on
the remote compute system
D. Users' interface of the remote desktop is transmitted to the client without the use of a
remote display protocol
Answer: A
What is a benefit of implementing a virtual machine (VM) storage migration?
A. Balances storage utilization by redistributing VMs across different storage systems
B. Enables VMs to keep functioning even if the source data is lost due to a failure
C. Improves the security of applications running inside VMs on the migrated storage
system
D. Reduces the overall storage system capacity requirements for organizations
Answer: A
In which data access method does the file system access an iSCSI storage system over a
network?
A. Block-based
B. File-based
C. Object-based
QUESTION NO: 81
QUESTION NO: 82
QUESTION NO: 83
29
D. Sector-based
Answer: A
What is a characteristic of software-defined networking?
A. Abstracts and separates the control plane from the data plane
B. Data plane sends instructions to the controlplane to handle network traffic
C. Controller in network switchestakes over data plane functions
D. External software combines both data plane and control plane functions
Answer: A
Why is it important for organizations to maintain a copy of data at a remote site?
A. Ensure disaster recovery
B. Provide operational recovery
C. Ensure data archiving to meet regulatory requirements
D. Provide flexibility to use stub files for production operations
Answer: A
Which global addressing does the REST application programming interface use for the
discovery of a storage service?
A. Uniform Resource Identifier
B. Namespace
C. Extensible Markup Language
D. Controller-provided MAC address
Answer: A
QUESTION NO: 84
QUESTION NO: 85
QUESTION NO: 86
30
What is an accurate statement about the Network File System (NFS) protocol?
A. Provides a set of remote procedure calls to access a remote file system
B. Uses the server message block protocol to provide file locking capability
C. Translates block I/O requests from a file system into object-level requests
D. Automatically scales the file systems on clients as the workload increases
Answer: A
Which data structure enables two node ports to identify and manage a set of information
units in a Fibre Channel (FC) SAN?
A. Exchange
B. Sequence
C. Frame
D. Domain
Answer: A
What is an example of an availability management task in storage infrastructure
management?
A. Designing a new replication solution for data redundancy
B. Performing trend analysis of storage space consumption
C. Tracking configuration changes to storage components
D. Specifying storage space quotas for users
Answer: A
QUESTION NO: 87
QUESTION NO: 88
QUESTION NO: 89
31
A customer has a requirement to perform a backup each night. However, the customer has
a limited amount of time for backups to run on week nights,Monday through Friday
evenings.
Which backup granularity type is recommended to meet the backup window for those
nights?
A. Incremental
B. Cumulative
C. Full
D. Differential
Answer: C
Which fabric login type occurs between two N_Ports to exchange FC-4 upper layer
protocol-related parameters?
A. PRLI
B. FLOGI
C. PLOGI
D. WWNN
Answer: A
An organization plans to deploy a new application in their environment. The new
application requires 2 TB of storage space. During peak workloads, the application is
expected to generate 9800 IOPS with a typical I/O size of 4 KB. The capacity of each
available disk drive is 250 GB. The maximum number of IOPS a drive can perform at with
70percent utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and
QUESTION NO: 90
QUESTION NO: 91
QUESTION NO: 92
32
performance requirements given a RAID 0 configuration?
A. 8
B. 70
C. 110
D. 140
Answer: C
What is an activity in the risk assessment step of risk management?
A. Determine the likelihood of a risk
B. Plan and deploy security controls
C. Continuously observe the existing risks
D. Identify the sources of threats that increase the risks
Answer: A
What is an accurate statement about a software RAID implementation?
A. Uses CPU cycles of a compute system to perform RAID calculations
B. Supports the upgrade of RAID software on incompatible O/S
C. Uses a specialized hardware controller to perform RAID calculations
D. Supports all RAID levels
Answer: A
What is an accurate statement about a fabric-provided MAC address (FPMA) used in an
FCoE SAN?
A. FCoE switches provide MAC addresses to VN_Ports during node login
QUESTION NO: 93
QUESTION NO: 94
QUESTION NO: 95
33
B. FC switches provide MAC addresses to VE_Ports dynamically during discovery
C. Compute systems provide MAC addresses to the VF_Ports on FCoE switches
D. Both VF_Ports and VE_Ports obtain MAC addresses from FC switches
Answer: A
What is a benefit when a node is added to a scale-out NAS cluster?
A. Increased cluster performance
B. Reduced capital expenditure
C. Simplified cluster management
D. Decreased data duplication
Answer: B
Which fabric login type enables two N_Ports to exchange service parameters to establish a
session?
A. PLOGI
B. PRLI
C. FLOGI
D. WWPN
Answer: A
Which data access method enables a compute system to access a file system that resides
on a storage system?
A. File-based
B. Block-based
C. Object-based
QUESTION NO: 96
QUESTION NO: 97
QUESTION NO: 98
34
D. Sector-based
Answer: A
What is a function of the orchestration layer in a data center infrastructure?
A. Provides workflows for automated execution of management tasks
B. Aggregates physical infrastructurecomponents into resource pools
C. Measures the consumption of IT resources byvarious services
D. Decouples an operating environment from the underlying hardware
Answer: A
In an FCoE environment, which functionality provides a framework for the allocation of
bandwidth to different network traffic classes?
A. Enhanced transmission selection
B. Priority-based flow control
C. Congestion notification
D. Data center bridging exchange protocol
Answer: A
Which component is required for a “recovery-in-place” backup approach?
A. Disk-based backup target
B. Agent-based backupclient
C. NDMP server
D. Data deduplication server
Answer: A
QUESTION NO: 99
QUESTION NO: 100
QUESTION NO: 101
35
What is a benefit of block-level storage virtualization?
A. Enables the online expansion of virtual volumes
B. Enhances performance by limiting the RSCN traffic
C. Improves security through logical segmentation of block storage devices
D. Increases scalability through separation of FC addresses across VSANs
Answer: A
An organization performs a full back up every Sunday and cumulative back ups on the
remaining days. On Thursday, a data corruption occurs that requires a data restoration
from the backup copies.
How many backup copies are required to perform this restoration?
A. 1
B. 2
C. 3
D. 4
Answer: B
Which action takes place during the login phase in an FCoE SAN?
A. VN_Ports obtain FC addresses
B. Nodes locate the Fibre Channel Forwarder
C. Initialization protocol starts transporting FC data
D. VN_Port to N_Port pairing is established
QUESTION NO: 102
QUESTION NO: 103
QUESTION NO: 104
36
Answer: A
An organization plans to deploy a new application in their environment. The new
application requires 4 TB of storage space. During peak workloads, the application is
expected to generate 4900 IOPS with a typical I/O size of 8 KB. The capacity of each
available disk drive is 500 GB. The maximum number of IOPS a drive can perform at with a
70 percent utilization is 110 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and
performance requirements given a RAID 0 configuration?
A. 8
B. 20
C. 30
D. 45
Answer: D
Which lossless Ethernet functionality helps Converged Enhanced Ethernet (CEE) devices
to convey and configure their features with the other CEE devices in the network?
A. Data center bridging exchange protocol
B. Enhanced transmission selection
C. Priority-based flow control
D. Congestion notification
Answer: A
Which type of login is performed between an N_Port and an F_Port in a Fibre Channel
SAN environment?
QUESTION NO: 105
QUESTION NO: 106
QUESTION NO: 107
37
A. FLOGI
B. PLOGI
C. PRLI
D. WWPN
Answer: A
How does an iSCSI initiator discover its targets?
A. Initiator sends a query to an iSNS server for a list of available targets
B. Initiator receives the iSCSI names of its targets from the primary DNS server
C. Initiator uses the data center bridging exchange protocol for the discovery
D. Initiator sends SCSI commands and the target responds by sending its name
Answer: A
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
A. X is an F_Port and Y is an E_Port
B. X is an F_Port and Y is a G_Port
C. X is a G_Port and Y is an N_Port
D. X is an N_Port and Y is an E_Port
Answer: D
QUESTION NO: 108
QUESTION NO: 109
38
What is compromised by a passive attack on an IT infrastructure?
A. Confidentiality
B. Integrity
C. Availability
D. Repudiation
Answer: A
What is an accurate statement about OAuth security control?
A. Allows a client to access protected resources from a resource server on behalf of a
resource owner
B. Provides strong authentication for client-server applications by using secret-key
cryptography
C. Enables initiators and targets to authenticate each other by using a shared secret code
D. Enables an organization to use authentication services from an identity provider
Answer: A
What is determined based on the recovery point objective in an asynchronous remote
replication?
A. Size of the buffer
B. Size of the replica
C. Response time
D. Location of the source
Answer: A
QUESTION NO: 110
QUESTION NO: 111
QUESTION NO: 112
QUESTION NO: 113
39
What is a benefit of using content addressed storage (CAS) as an archival solution?
A. Ensures content authenticity and integrity
B. Supports location independence using different content IDs for an object
C. Provides the ability to perform production operations on the CAS
D. Enables modification of archived data
Answer: A
What is a function of the NDMP server in an NDMP-based backup approach?
A. Reads the data from the storage device and sends the data to the backup device
B. Reads the data from the backup server and sends the data to the backup device
C. Instructs the NAS head to startthe backup operation
D. Instructs the backup agent on the client to send the data to the backup device
Answer: A
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
A. X is an E_Port and Y is an N_Port
B. X is an F_Port and Y is an E_Port
C. X is an F_Port and Y is an F_Port
D. X is an N_Port and Y is an N_Port
QUESTION NO: 114
QUESTION NO: 115
40
Answer: D
Which feature of an object-based storage system abstracts and provides a common view of
storage independent of location to applications?
A. Global namespace
B. Flexible data access
C. Multi-tenancy
D. Scale-out architecture
Answer: A
What is a benefit of using converged infrastructure for building a data center?
A. Reduces the time to acquire and deploythe infrastructure
B. Provides the flexibility to purchase individual IT components
C. Integrates existing IT components into the infrastructure
D. Offers the flexibility to change vendors and prevent vendor lock-in
Answer: A
A service provider is offering cloud services to Enterprise P and Enterprise Q.
QUESTION NO: 116
QUESTION NO: 117
QUESTION NO: 118
41
Which cloud deployment model does the exhibit represent?
A. Externally-hosted private cloud
B. On-premise community cloud
C. Public cloud
D. Externally-hosted community cloud
Answer: A
A start-up company with a limited budget is planning to adopt a hybrid cloud solution for
their operations. The company has business-critical applications that serve customers and
have strict service levels. In addition, the company has less critical applications such as
backup and archive.
Which hybrid cloud strategy should be recommended to the company?
A. Deploy the business-critical applications on an externally-hosted private cloud.
Deploy the less critical applications on a public cloud.
B. Deploy the business-critical applications on an on-premise private cloud.
Deploy the less critical applications on an externally-hosted private cloud.
C. Deploy the business-critical applications on an on-premise private cloud.
QUESTION NO: 119
42
1
1
1
Deploy the less critical applications on a public cloud.
D. Deploy the business-critical applications on an externally-hosted private cloud.
Deploy the less critical applications on an on-premise private cloud.
Answer: A
What is an accurate statement about a logical volume in a compute system?
A. Can span across multiple physical volumes
B. Can only be created froma single physical volume
C. Must be created across multiple volume groups
D. Allows multiple file systems to run concurrently
Answer: A
A system has three components and all three components need to be operational for 24
hours; Monday through Friday. During a particular week, failure of component 1 occurred
as follows:
Tuesday = 8 AM to 11 AM
Thursday = 8 PM to 10 PM
Friday = 5 AM to 9 AM
What is the mean time between failures on component 1 for that week?
A. 3 hours
B. 37 hours
C. 40 hours
D. 53 hours
Answer: B
QUESTION NO: 120
QUESTION NO: 121
QUESTION NO: 122
43
Which environment is represented in the exhibit?
A. Write-back cache
B. Write-through cache
C. Read miss
D. Read hit
Answer: A
Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false
website?
A. Phishing
B. Man-in-the-middle
C. Denial-of-service
D. Repudiation
Answer: A
An organization plans to deploy a deduplication solution by retaining their legacy backup
application. They are concerned about the application servers’ performance and a long
backup window during backups.
Which deduplication solution(s) should be recommended to the organization?
QUESTION NO: 123
QUESTION NO: 124
44
A. Post-process
B. Source-based global deduplication
C. Variable-length segment and source-based
D. Fixed-length block and source-based
Answer: A
Which process groups multiple physical drives and presents them to a compute system as
a single logical volume?
A. Concatenation
B. Partitioning
C. Striping
D. Orchestration
Answer: A
Which solid state drive component performs write coalescing?
A. Controller
B. I/O interface
C. Non-volatile memory
D. Cache
Answer: A
Which operation is performed by a scale-out NAS cluster when clients send data to the
cluster?
A. Data is divided and stored on multiple nodes in parallel
B. Data is consolidated into a block and then stored on the NAS head
QUESTION NO: 125
QUESTION NO: 126
QUESTION NO: 127
45
C. Data is evenly distributed to every file system in the cluster
D. NAS file system and cluster grow dynamically to store the data
Answer: A
What accurately describes a VSAN?
A. A logical fabric on an FC SAN that enables communication among a group of nodes
B. A logical fabric on an FC SAN that has a 1-to-1 relationship with a zone in the FC SAN
C. A logical fabric across FC SANs that aggregates the FC SANs to create a network pool
D. A logical fabric across FC SANs that allows non-disruptive file mobility between the
SANs
Answer: A
What is an accurate statement about a virtual machine (VM) snapshot?
A. Captures the state and data of a running VM at a specific point-in-time
B. Provides the capability to delete the parent VM once the snapshot is created
C. Runs as an independent copy from the parent VM
D. Provides the capability to restore VM data to any point-in-time
Answer: A
Which type of fabric topology does the exhibit represent?
QUESTION NO: 128
QUESTION NO: 129
QUESTION NO: 130
46
A. Partial mesh
B. Full mesh
C. Single core-edge
D. Dual core-edge
Answer: A
What is an accurate statement about VSAN trunking?
A. Allows network traffic from multiple VSANs to traverse a single interswitch link
B. Enables an F_Port to transfer multiple VSAN traffic over a single port channel
C. Provides VSAN IDs to F_Ports to include them in the VSANs
D. Forwards FC frames between F_Ports that belong to the same VSAN
Answer: A
What provides the ability to automatically relocate extents across physical storage drives
over the entire pool when new drives are added to the pool?
A. Storage pool rebalancing
B. Extent relocation
C. Storage pool tiering
D. Automated extent tiering
QUESTION NO: 131
QUESTION NO: 132
47
Answer: A
Which EMC product provides a software-defined storage platform that supports object
storage services?
A. Elastic Cloud Storage
B. ViPR Controller
C. ScaleIO
D. XtremIO
Answer: A
Which EMC product provides a software-defined storage platform to create a computebased
storage area network?
A. ScaleIO
B. XtremIO
C. Isilon
D. Atmos
Answer: A
Which technique is used in Kerberos to authenticate a client-server application across an
insecure network?
A. Secret-key cryptography
B. One-way hash function
C. Shared secret
D. OpenID control
Answer: A
QUESTION NO: 133
QUESTION NO: 134
QUESTION NO: 135
48
What is an accurate statement about the Common Internet File System (CIFS) protocol?
A. Enables a CIFS server to maintain connection information regarding every connected
client
B. Uses a Remote Procedure Call mechanism to provide access to the CIFS supported file
systems
C. Contains an open variation of the stateless user datagram protocol that stores
information about open files
D. Uses file system locking to enable users to simultaneously overwrite all metadata of a
file system
Answer: A
What is an accurate statement about the function of an archiving server?
A. Enables the ability to configure policies for archiving data
B. Installs agentson the archiving storage device
C. Scans the data that can bearchived on application servers
D. Creates stub files on an archiving storage device
Answer: A
In an FC SAN environment, an administrator wants to ensure that a particular switch port
cannot function as an E_Port and cannot be used to create an interswitch link. Which
security mechanism should the administrator use?
A. Port type locking
B. Port binding
C. Persistent port disable
D. Fabric binding
QUESTION NO: 136
QUESTION NO: 137
QUESTION NO: 138
49
Answer: A
What is signified by the “variety” characteristic of big data?
A. Data is generated in different formats by numerous sources
B. Meaning of the data changes constantly
C. Varying data quality affects its reliability and accuracy
D. Data change rate affects its timely analysis
Answer: A
What is enabled by the N_Port ID virtualization (NPIV)?
A. A single physical N_Portto obtain multiple FC addresses
B. A single virtual N_Port to act as a physical Ethernet port
C. A virtualization layer to map virtual volumes to LUN IDs
D. A single physical N_Port to act as a virtual HBA port
Answer: A
An application generates 8400 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 1/0 configuration?
A. 5600
B. 11200
C. 16800
D. 22400
Answer: B
QUESTION NO: 139
QUESTION NO: 140
QUESTION NO: 141
50
What is an accurate statement about a denial-of-service attack?
A. Prevents legitimate users fromaccessing resources or services
B. Intentional misuse of privileges to compromise data security
C. Gaining unauthorized access to a user’s accounts and data
D. Captures a user’s credentials and then sends to the attacker
Answer: A
What is an accurate statement about incremental forever backups?
A. Requires only one initial full back up
B. Requires periodic full back ups
C. Backup is not created directly from the production data
D. Copies the data that has changed since the last full back up
Answer: A
What is an accurate statement about full volume replication?
A. Target device is at least as large as the source device
B. Target device requires only a fraction of the space used by the source device
C. Target device is accessible only after the replication session starts
D. Target and source devices should be on different storage arrays
Answer: A
QUESTION NO: 142
QUESTION NO: 143
QUESTION NO: 144
QUESTION NO: 145
51
Which type of storage system is built specifically for storing fixed content?
A. Content addressed storage
B. Block-based storage
C. File-based storage
D. Unified storage
Answer: A
What refers to an IT infrastructure's ability to function based on business expectations
during its specified time of operations?
A. Information availability
B. Disaster recovery
C. Compliance adherence
D. Business agility
Answer: A
What accurately describes link aggregation in a SAN?
A. Combines two or more parallel interswitch links into a single logical interswitch link
B. Aggregates the data transmission rate of all HBA and storage system port pairs
C. Consolidates compute-to-compute traffic and storage traffic into a single interswitch link
D. Replaces multiple parallel interswitch links by a single physical interswitch link
Answer: A
What is a benefit of a “recovery-in-place” backup approach in a virtualized data center?
A. Provides instant recovery of a failed virtual machine
QUESTION NO: 146
QUESTION NO: 147
QUESTION NO: 148
52
B. Reduces the recovery point objective
C. Eliminates redundant data during virtual machine backups
D. Eliminates the backup window
Answer: A
What is an accurate statement about a data lake?
A. Stores data as an exact or near-exact copy of the source format
B. Supports query and analysis by classifying and organizing data before storing
C. Stores current and historical data in a structured format on object-based storage
D. Provides a single consistent view of data across an organization for report generation
Answer: A
What maps the logical path of a file system to its physical path in a file-level virtualization
implementation?
A. Global namespace
B. Remote procedure call
C. Distributed file system
D. Cache coherency
Answer: A
Which elements are associated with an object in an object-based storage system?
A. Data, metadata, object ID, and attributes
B. LUN ID, data, metadata, and object ID
C. Metadata, object ID, attributes, and file path
D. Object ID, attributes, LUN ID, and file path
QUESTION NO: 149
QUESTION NO: 150
QUESTION NO: 151
53
Answer: A
Which part of the Fibre Channel (FC) frame does the label “X” represent in the exhibit?
A. Frame Header
B. CRC
C. SOF
D. Data Field
Answer: A
What is an advantage of a software-based object storage implementation?
A. Provides the flexibility to reuse the existing infrastructure
B. Requires less storage capacity tostore a large number of objects
C. Provides the flexibility to create more than one object ID for an object
D. Requires less hardware to support scalable architecture
Answer: A
Which data center characteristic ensures that adequate resources are provided to
efficiently store and process data?
A. Capacity
B. Availability
C. Scalability
D. Performance
QUESTION NO: 152
QUESTION NO: 153
QUESTION NO: 154
54
Answer: A
What accurately describes an attack vector in an IT infrastructure?
A. Series of steps that must be followed in order to complete an attack
B. Various entry points that can be used to launch an attack
C. Amount of effort required to exploit vulnerabilities in the infrastructure
D. Process of identifying the system components under attack
Answer: A
Which EMC product enables management for Vblock systems?
A. Unified Infrastructure Manager
B. MirrorView
C. Service Assurance Suite
D. ViPR SRM
Answer: A
What keeps the name server up-to-date on all switches in a fabric?
A. SW-RSCN
B. Management server
C. Zoning
D. FLOGI
Answer: A
QUESTION NO: 155
QUESTION NO: 156
QUESTION NO: 157
55
What is an accurate statement about Software as a Service?
A. Consumer has limited control over user-specific application configuration settings
B. Consumer has control over the operating systems and deployed applications
C. Consumer has control over the configuration settings of the application-hosting
environment
D. Consumer has limited control over select networking components, such as host firewalls
Answer: A
Which method is used to establish a VPN connection between a primary and remote data
center to perform secure remote replication?
A. Site-to-site VPN connection
B. Remote access VPN connection
C. Intra-site VPN connection
D. Long distance VPN connection
Answer: A
What is an advantage of the changed block tracking backup technique?
A. Reduces the backup window
B. Enables restoration to any point-in-time
C. Eliminates the need for data deduplication
D. Increases backup device performance
Answer: A
QUESTION NO: 158
QUESTION NO: 159
QUESTION NO: 160
QUESTION NO: 161
56
Which type of digital data consists of textual data with inconsistent formats but can be
formatted with the use of software tools?
A. Quasi-structured data
B. Semi-structured data
C. Metadata
D. Unstructured data
Answer: A
The exhibit illustrates a software-defined storage environment. What do the labels “X” and
“Y” represent in the exhibit?
QUESTION NO: 162
57
A. X is a virtual storage system and Y is a virtual storage pool
B. X is a virtual storage pool and Y is a virtual storage system
C. X is a physical storage pool and Y is a virtual storage system
D. X is a virtual storage pool and Y is a physical storage system
Answer: A
58
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
A. Fabric controller
B. Fabric login server
C. Name server
D. Fabric management server
Answer: A
Which EMC product provides a software-defined platform that supports both block and file
storage services?
A. ViPR Controller
B. ScaleIO
C. Elastic Cloud Storage
D. XtremIO
Answer: A
In which stage of the business continuity planning lifecycle does an organization identify
critical business processes and assign recovery priorities?
A. Analyzing
B. Establishing objectives
C. Designing and developing
D. Implementing
Answer: A
QUESTION NO: 163
QUESTION NO: 164
QUESTION NO: 165
59
What is an accurate statement about three-way NDMP backup in a NAS environment?
A. Backup device can be shared among multiple NAS heads
B. Each NAS head should have a dedicated backup device
C. Backup data traverses at least three NAS heads before reaching the backup device
D. Backup is performed only when three or more NAS heads are present
Answer: A
What is a component of an FCoE switch?
A. Ethernet Bridge
B. Virtual N_Port
C. Converged Network Adapter
D. FCIP Forwarder
Answer: A
An organization has several virtual machines (VMs) deployed in their data center. The VM
files are stored on a block-based storage system. The applications on the VMs are
impacted during VM backup because the backup agents on the VMs are consuming a large
amount of resources.
Which alternate backup solution is recommended to address this issue?
A. Image-based backup
B. Three-way NDMP backup
C. Two-way NDMP backup
D. Target-based deduplication backup
Answer: A
QUESTION NO: 166
QUESTION NO: 167
QUESTION NO: 168
60
In an object-based storage system, data is divided into 9 data segments and 3 coding
segments using the erasure coding technique. What is the maximum number of disk drive
failures against which data is protected by this configuration?
A. 3
B. 6
C. 9
D. 12
Answer: A
What is a benefit of application virtualization?
A. Avoids conflicts between different versions of the same application
B. Enables an application to directly access a LUN on a storage system
C. Runs applications without requiring the use of cache memory
D. Presents more memory to an application than is physically available
Answer: A
What is a characteristic of a scale-out NAS?
A. File system grows dynamically as nodes are added in the cluster
B. Up to four file systems can be created across the cluster
C. Distinct file systems are created on each node in the cluster
D. Different file systems can be mixed on each node in a single cluster
Answer: C
QUESTION NO: 169
QUESTION NO: 170
QUESTION NO: 171
61
62