Miscellaneous Practice Questions Flashcards

(238 cards)

1
Q

What is true about an OSD storage system?

A

Objects contain user data, related metadata, and user defined attributes of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of a control plane in the SDDC?

A

Performs resource provisioning and provides the programming logic and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which functions align with each layer of the FC Protocol Stack using the following order: FC-4, FC-2, FC-1, and FC-0?

A

Mapping interface
Common services
Encode and decode
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What set of factors are used to calculate the disk service time of a hard disk drive?

A

Seek time -
Rotational latency -
Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What restricts a tenant’s access to a specific group of object buckets in a software-defined storage environment?

A

Namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What accurately describes the seek time of a disk drive?

A

Time taken to position the read/write head over the correct track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an accurate statement about a virtual tape library?

A

Legacy backup software can be used without additional modules or changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a company has experienced a passive attack on its IT infrastructure, how is the company’s security impacted?

A

Information privacy is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the “variability” characteristic of big data signify?

A

Importance in obtaining the right information from data at all possible contexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link. Which security mechanism should the administrator use?

A

Port type locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?

A

FCoE switches provide MAC addresses to VN_Ports during node login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an advantage of performing capacity monitoring in a storage infrastructure environment?

A

Proactively preventing service outages due to the lack of storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an accurate statement about the function of an archiving server?

A

Enables the ability to configure policies for archiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What information is available in a capacity planning report for storage infrastructure?

A

current and historic information about the utilization of storage, file systems, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What accurately describes hypervisor-based continuous data protection?

A

Virtual appliance is running on a hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization is planning to secure the connection between the data center and cloud while performing data backup and replication. Which security control mechanism will help organization to achieve the desired security?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What functionality does the control layer provide in a software-defined networking architecture?

A

Extracts network information from the data plane and sends it to the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which storage management function ensures that the services and service levels are delivered per SLAs?

A

Operation management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the functionality of the application server in a Mobile Device Management?

A

Perform administration and management of all managed devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which file system provides a streaming interface using the MapReduce framework?

A

HDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An organization is interested in a cloud service that provides middleware, development tools, and database management systems for application development and deployment.
Which cloud service model meets these requirements?

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which standard provides FCoE with a lossless Ethernet network?

A

Data Center Bridging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol?

A

Common Internet File System (CIFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An organization wants to replicate data over a public network to a cloud. Which security control mechanism helps to secure the data during replication?
Encryption
26
What type of technology is used in SSD devices to provide non-volatile data storage?
Flash memory
27
Which layer of the OSI reference model is responsible for logical addressing and routing?
Network
28
What is a benefit of migrating to a modern data center?
Reduce administration complexity and application downtime to consistently meet SLAs
29
Which infrastructure building process allows organizations to repurpose existing infrastructure components and provides cost benefits?
Brownfield
30
What is a function of VM hardening?
Change the default configuration of the VM to enhance security
31
What is the lowest to highest order of I/O performance among there storage devices?
SATA-->SSD-->SCM-->DRAM
32
What describes an incident in a storage infrastructure?
Any action that may impact the functionality of the system
33
What is a benefit of including a Defense-in-depth strategy as part of the data center security strategy?
Reduce the scope of an information security risk
34
If a packet is sent to an IPv6 address and many devices receive the packet, what is this type of traffic?
Multicast
35
What is a benefit of unified storage systems?
Increases the overall storage capacity utilization with no stranded capacity
36
What is the result of increasing the number of FC switches in a full mesh topology?
Reduces switch ports available for node connectivity
37
What is the key advantage of cloning a VM?
Saves time when creating multiple identical copies of a VM
38
What is true about storage system-based replication?
Snapshots are immediately accessible after the replication session activation
39
Which technology allows automation of sensors and devices to share and process information?
Internet of Things
40
What is a feature of 5G technology?
Higher connectivity density
41
What is true about Storage Class Memory (SCM)?
SCM is slower than DRAM but read and write speeds are faster than flash
42
What is the maximum number of VLANs that can be supported with one VLAN tag field?
4096
43
In continuous data protection, what does the amount of journal space determine?
How far back the data can be recovered
44
What is an advantage of performing incremental backups compared to cumulative backups for the same data?
Storage capacity needed for backups is significantly reduced
45
Which three parameters define information availability in a modern data center environment?
Reliability - Accessibility - Timeliness
46
What triggers an appropriate workflow upon receiving a service provisioning or management request?
Orchestrated operations
47
What statement describes machine learning?
Applies an algorithm to large amounts of data for pattern discovery
48
What is a benefit of using a Scale-Out NAS system vs. general purpose file servers?
File system grows dynamically as nodes are added to the NAS cluster
49
Which block storage device protocol achieves the optimal cost-effective balance between I/O performance and high storage capacity for midrange storage applications?
SAS
50
Which FCIP protocol stack layer supports FC frame encapsulation?
IP
51
An organization wants to replicate their data by extending the local network across a public network. Prior to implementing replication, they need to secure the network.Which security control mechanism is recommended?
Virtual private network
52
Which performance feature does an intelligent storage system provide?
Automated storage tiering
53
What Smart City municipal function is optimized by IoT?
City transportation infrastructure maintenance
54
What is a driver for implementing end-to-end NVMe-oF?
To maximize speed of SSD storage distributed across an FC SAN
55
What is the functionality of the lock in a cyber recovery process?
Restricts overwriting of data to meet both corporate governance and compliance standards
56
What is a benefit of differential backup over incremental backup?
Differential backup can expand to contain more data than an incremental backup.
57
What set of components are part of a block-based storage array controller?
Front-end ports - Back-end ports - Cache
58
What method does FCIP use to transport Fibre Channel SAN data?
FCIP encapsulates and tunnels FC SAN data over IP networks.
59
In a software-defined networking architecture, which layer is responsible for handling data packet forwarding or dropping?
Infrastructure
60
What type of backup method allows a client to be installed in a VM that sends the data to the backup device?
Agent-based
61
What is a function of a continuous data protection (CDP) appliance?
Runs data protection software and manages replications within and across data centers
62
An organization has two data centers separated by a distance of 1600 km. They want to replicate between these data centers for disaster recovery purposes. They are concerned that this will impact application response time. Which solution will address this concern?
Asynchronous remote replication
63
What is a key function of the orchestration layer in a modern data center architecture?
Allows automated arrangement, coordination, and management of resource provisioning
64
Which VM file is used to keep a record of the VM's activity and is often used for troubleshooting?
Log file
65
What is the purpose of data archiving?
Transfers fixed content that is no longer actively accessed to archive storage
66
What provides flow control in FCIP?
Transmission Control Protocol
67
What occurs during a Shared Technology Vulnerability threat?
An attacker exploits the weaknesses of tools used to enable multi-tenancy
68
An organization wants to prevent incidents which share common symptoms or root causes from reoccurring. They also want to minimize the adverse impact of incidents that cannot be prevented. Which management function addresses the organization's requirements?
Problem management
69
What is an accurate statement about Governance?
Restrict access to certain users
70
In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object?
From the binary representation of an object.
71
In a compute-based storage area network (SAN), what is a function of the metadata manager?
Holds cluster-wide mapping information and load balancing in a compute-based SAN.
72
Why is it important for organizations to store, protect, and manage their data?
Develop new business opportunities by leveraging existing data.
73
What is an accurate statement about variable prefetching?
Storage system prefetches data in multiples of the original I/O request size from the compute system.
74
What accurately describes virtual SAN (VSAN) trunking?
Reduces the number of ISLs between switches that are configured with multiple VSANs
75
What does an area ID represent in Fibre Channel (FC) addressing?
Group of switch ports
76
Which functionality does a Control layer provide in a software-defined networking architecture?
Making decisions on how the packets should be forwarded
77
Which technology combines NAND flash memory into a hard disk drive and is a single, integrated device incorporating both types of storage?
Solid-state hybrid drive
78
Which Internet of Things (IoT) component is responsible for the automation of operations by applying a force based on the dynamics of data?
Actuator
79
In an FCoE switch, which function is provided by the Fibre Channel Forwarder (FCF)?
Communication bridge between CEE and FC networks
80
Why are organizations moving towards a modern data center implementation?
Ability to be agile, operate in real time, and develop intelligent products
81
What is a key objective to performing continuous replication?
Reduce the RPO to near-zero.
82
What is an advantage of implementing file-level virtualization in a data center environment?
Provides non-disruptive file mobility across file servers or NAS devices.
83
What is an example of a Performance Management task?
Selecting an appropriate RAID type for a storage pool
84
Which key service management function modifies and aligns services according to consumer needs in the cloud environment?
Service portfolio management
85
Which is true about a type 2 hypervisor?
Installed as an application on an operating system
86
When using a bridged iSCSI connection, which components facilitate communication between gateways?
Compute system with iSCSI ports and the storage system with only FC ports
87
What is an accurate statement about stretched VLANs?
Supports migration of VMs across sites without the need to change their network configurations.
88
What accurately describes a software-defined architecture?
Provides a unified management platform for centralized monitoring and administration.
89
Which technology uses the concept that real-life objects can independently share and process information with minimal human interaction?
Internet of Things
90
Match the virtual machine (VM) file with its description.
Configuration file: Stores information, such as VM name, BIOS information, guest OS type, memory size Virtual disk file: Stores the contents of the VM's disk drive Memory state file: Stores the memory contents of a VM in a suspended state Snapshot file: Stores the VM settings and virtual disk of a VM Log file: Keeps a log of the VM’s activity and is used in troubleshooting
91
Which management function involves configuring LUN masking to restrict hosts from accessing a specific LUN in a data center environment?
Security Management
92
Which Converged Network Adapter (CNA) component encapsulates Fibre Channel (FC) frames into Ethernet frames?
FCoE ASIC
93
Which file system uses only UNIX systems for a client-server application protocol and Remote Procedure Call (RPC) for file sharing?
Network File System (NFS)
94
Which state change notifications (SCNs) are issued by an iSNS server to the registered devices?
Network events
95
Which layer contains services that define network behavior through policies and resource requirements in a software-defined networking architecture?
Application
96
In a recovery operation, what is the correct sequence of steps after the backup client sends a restore request to the backup server?
Backup client requests backup server for data restore (2) Backup server scans backup catalog to identify data to be restored and the client that will receive data (3) Backup server instructs storage node to load backup media in the backup device (4) Data is then read and sent to the backup client (5) Storage node sends restore metadata to the backup server (6) Backup server updates the backup catalog
97
Which compute system component enables dynamic extension of file system capacity and efficient storage management?
Logical Volume Manager
98
A server administrator wants to transfer files between a workstation and a server. It needs to be as simple as possible, without concern for security or advanced functionality. Which is the optimal protocol to choose?
TFTP
99
In a Fibre Channel (FC) protocol stack, what is the function of the FC-2 layer?
Provides FC addressing, structure, and organization of data
100
Which functionality is provided by a process login in a Fibre Channel (FC) SAN environment?
Exchange ULP-related parameters between two N_ports
101
What happens when the size of a write I/O request exceeds the configured write aside size in a block-based storage system?
Cache is bypassed and I/O is written directly to storage account
102
What is an impact of a Denial-of-Service attack?
Computing resources are exhausted and made unavailable to users
103
What is the objective of security control?
Minimize the attack surfaces and minimize the work factors
104
In an SDS environment, which protocol supports the resource-oriented architecture for the development of scalable and lightweight web applications while adhering to a set of constraints?
REST
105
What is an accurate statement about Storage Class Memory (SCM)?
SCM can be addressed at the bit or word level
106
A customer requires a solution that allows data in RAM to be retained in case of power loss. Which technology should be used?
NVDIMM
107
Match the characteristics of big data with their respective descriptions.
Variability: Constant change in the meaning of data Variety: Diversity in the formats and types of data Veracity: Reliability and verifiability of the data Velocity: Rate at which data produces and changes
108
Which modern data center characteristic helps in improving business agility by automated arrangement and coordination of various component functions that is based on a predefined workflow?
Orchestrated management
109
Identify the service of cloud computing in which the resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
Measured services
110
Identify what the process is called when the provider's computing resources are put together to serve multiple consumers using a multitenant model. Uses different physical and virtual resources dynamically assigned and reassigned according to consumer demand.
Resource pooling
111
What is a characteristic of block data storage?
Data bytes written to disk devices are stored in blocks of a consistent size.
112
Which one of the following is characteristic of RAID 5?
Distributed parity
113
What is a deficiency of using general-purpose servers for network file sharing?
File system incompatibilities when sharing files with clients that use different operating systems
114
Benefits of VSAN
Online expansion of virtual volumes. Non-disruptive data migration.
115
Membership is based on assigning a switch port to the VLAN.
Physical Layer 1
116
Membership based on the unique Ethernet MAC address of a host NIC port.
Data Link Layer 2
117
Membership is based on the network address portion of the IP address.
Network Layer 3
118
Membership is based on a particular application such as File Transport Protocol (FTP) or Telnet.
Application Layer 7
119
Which fault tolerance mechanism provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?
Erasure Coding
120
Which fault tolerance mechanism enables a compute system to use multiple paths for transferring data to a LUN.?
Multipathing
121
Which fault tolerance mechanism automatically replaces a failed drive with a spare drive to protect against data loss?
Dynamic Disk Sparing
122
What is the benefit of implementing source-based deduplication?
Reduces the amount of data sent over the network.
123
What determines the portion of an IP addresses used to indicate the network or host address?
A subnet mask
124
What are the two DIY approaches and explain each of them?
-Greenfield method: new environment from scratch, "new grass" -Brownfield method: repurposing old HW, updating & upgrading as needed, "old grass"
125
What are the components of an ISS?
Storage and Controller
126
What is a "sector" in a HDD?
a chunk of data
127
Name the different levels of storage Tiering from top to bottom?
-Tier 0: DRAM -Tier 1: SCM -Tier 2: SSDs -Tier 3: SATA
128
What is an attribute of an OSD gateway?
Presents file and block-based storage interfaces to applications
129
Main purpose of FC Address?
routing data through the fabric
130
Which characteristic describes an FC switch?
Each node has a dedicated communication path.
131
What is a benefit of implementing VSANs?
Improves network security
132
What is a purpose of a chargeback report?
. Reports resource consumption per business unit
133
Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?
Hypervisor hardening
134
What is an example of OS hardening?
Deleting unused programs and installing current updates
135
A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment. Which strategy did the cloud provider use to mitigate the risk of security threats?
Defense-in-depth
136
An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model. Which security mechanism would enable them to establish a secure connection to the public cloud?
VPN
137
Which network feature enables dynamic distribution of applications I/O traffic across VMs?
Load Balancing
138
Which action takes place during the login phase in an FCoE SAN?
VN_Ports obtain FC addresses
139
Which cloud computing characteristic enables consumers to use cloud services on heterogeneous thin or thick client platforms?
Broad network access
140
hich cloud computing characteristic enables multi-tenancy and abstracts the location of provided resources?
Resource pooling
141
What is an accurate statement about hypervisor-based continuous data protection (CDP)?
Write splitter is embedded in the hypervisor
142
What is an accurate statement about a continuous data protection (CDP) remote replication solution?
Appliances are present at both the source and remote sites
143
Why do organizations need a malware protection software?
Protect applications and the OS against trojan horse programs
144
A company has virtualized their data center and wants to deploy a recovery-in-place backup approach. What is the advantage of this type of approach?
Eliminates the need to transfer the image from the backup device to the primary storage before it is restarted
145
Which type of storage system is built specifically for storing fixed content?
Content addressed storage
146
A start-up company with a limited budget is planning to adopt a hybrid cloud solution for their operations. The company has business-critical applications that serve customers and have strict service levels. In addition, the company has less critical applications such as backup and archive . Which hybrid cloud strategy should be recommended to the company?
Deploy the business-critical applications on an externally-hosted private cloud. Deploy the less critical applications on a public cloud.
147
What is an accurate statement about Platform as a Service?
Consumer has control over the deployed applications
148
What is an accurate statement about Infrastructure as a Service?
Consumer has control over the operating systems and the deployed applications
149
What is a benefit of using converged infrastructure for building a data center?
Reduces the time to acquire and deploy the infrastructure
150
Which capability is provided by a software-defined storage controller?
Ability to pool and abstract physical storage and present it as an open storage platform
151
What is a benefit of application virtualization?
Avoids conflicts between different versions of the same application
152
What is an accurate statement about the application presentation technique of application virtualization?
Application executes remotely and its user interface is transmitted to the client
153
In which data access method does the file system access an iSCSI storage system over a network?
Block-based
154
What is an accurate statement about a logical volume in a compute system?
Can span across multiple physical volumes
155
Which data access method enables a compute system to access a file system that resides on a storage system?
File-based
156
Which type of LUN provides full control for precise data placement and allows an administrator to create LUNs on different RAID sets if there is workload contention?
Traditional
157
Which technique protects the data in cache from power failures?
Vaulting
158
What is an accurate statement about the Common Internet File System (CIFS) protocol?
Enables a CIFS server to maintain connection information regarding every connected client
159
Which feature of an object-based storage system abstracts and provides a common view of storage independent of location to applications?
Global namespace
160
What is an example of a security management task in a storage infrastructure?
Configuring LUN masking to restrict hosts from accessing a specific LUN
161
What is a component of an FCoE switch?
Ethernet Bridge
162
What is the purpose of monitoring capacity in a storage infrastructure?
Tracking the amount of storage infrastructure resources used and available
163
Which data center management process involves collating and presenting the utilization of resources?
Reporting
164
What contains the information about backup configuration and backup metadata?
Backup image
165
Which NAS implementation requires separate management of the NAS head and the storage?
Gateway
166
Which capability does big data analytics provide?
Enabling data-driven decisions from large volumes of data
167
In continuous data protection (CDP) remote replication, where are the two split write I/Os of an incoming write I/O directed?
One I/O goes to the local CDP appliance and the other I/O goes to the production volume
168
What is an accurate statement about full volume replication?
Target device is at least as large as the source device
169
What is an accurate statement about an integrated NAS controller?
Contains a specialized operating system dedicated to file serving
170
What is a benefit of a storage area network (SAN)?
Enables compute systems across locations to access shared storage
171
What is enabled by the N_Port ID virtualization (NPIV)?
A single physical N_Port to obtain multiple FC addresses
172
What determines how far back the recovery points can go in a continuous data protection (CDP) solution?
Amount of space that is configured for the journal
173
What is a function of a Fibre Channel Forwarder in an FCoE SAN?
Applies zoning configurations and provides fabric services
174
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
Fabric controller
175
What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?
A dedicated VLAN must be configured for each VSAN
176
Which method is used to establish a VPN connection between a primary and remote data center to perform secure remote replication?
Site-to-site VPN connection
177
An application generates 8400 small random I/Os at peak workloads with a read/write ratio of 2:1. What is the disk load at peak activity for a RAID 5 configuration?
16800
178
Why should a replica be consistent with its source?
Ensure the usability of the replica
179
What is an accurate statement about a hybrid cloud?
Supports data and application portability for load balancing between clouds
180
An organization plans to deploy a deduplication solution by retaining their legacy backup application. They are concerned about the application servers performance and a long backup window during backups. Which deduplication solution(s) should be recommended to the organization?
Post-process
181
What is a function of a virtual machine manager?
Abstracts physical hardware and presents it to a virtual machine
182
What is a benefit of configuring EX_Ports on each Fibre Channel over IP (FCIP) gateway in an FCIP tunnel implementation?
Enables FC-FC routing through the FCIP tunnel without merging the fabrics
183
What is a function of the metadata manager in a compute-based storage area network (SAN)?
Controls load balancing and data migration in a compute-based SAN
184
How do VSANs ensure security in an IT infrastructure?
By providing isolation over a shared infrastructure
185
What is an accurate statement about a data lake?
Stores data as an exact or near-exact copy of the source format
186
In an FC SAN environment, which security mechanism prevents a switch port from being enabled even after a switch reboot?
Port locking
187
What is an example of an active attack on an IT infrastructure?
Attempt to modify information for malicious purposes
188
Which component is required for a "recovery-in-place" backup approach?
Disk-based backup target
189
What is a benefit of a "recovery-in-place" backup approach in a virtualized data center?
Provides instant recovery of a failed virtual machine
190
What is an accurate statement about Software as a Service?
Consumer has limited control over user-specific application configuration settings
191
What is a benefit of N_Port virtualization (NPV)?
Reduces the number of domain IDs in a fabric
192
What is an accurate statement about OAuth security control?
Allows a client to access protected resources from a resource server on behalf of a resource owner
193
Which factor has contributed to the growth of digital data?
Proliferation of applications and smart devices
194
What is the purpose of monitoring availability in a storage infrastructure?
Identify component failures that may lead to service unavailability
195
An organization requires a backup solution for their NAS environment. They are concerned about the performance of their application servers while backing up data during peak workloads. Which recommended solution will meet the organization's requirements?
NDMP-based backup
196
Which parameter determines the rotation latency of a disk drive?
Speed of the spindle
197
What is an accurate statement about a core-edge topology?
Core-tier is extended by adding more switches at the core
198
What is an advantage of implementing an image-based backup solution in a virtualized environment?
Backup process is offloaded from the production virtual machine
199
What is an accurate statement about a virtual machine (VM) clone?
Clone VM is assigned a separate network identity
200
Which benefit is provided by the REST application programming interface of a software-defined storage (SDS) controller?
Enables the use of third-party software tools to manage the storage infrastructure
201
What is an accurate statement about an FCoE environment?
FCoE network must be configured to support jumbo frames for optimal performance
202
Which capability is provided by software-defined networking?
A single control point to the entire network infrastructure enabling policy-based network management
203
Which storage infrastructure management activity involves measuring throughput of components and identifying bottlenecks?
Performance management
204
What is an accurate statement about a continuous data protection (CDP) remote replication solution?
Appliances are present at both the source and remote sites
205
In an FCoE environment, which functionality provides a framework for the allocation of bandwidth to different network traffic classes?
Enhanced transmission selection
206
What accurately describes a shared pool in virtual provisioning?
Supports a single RAID protection level.
207
What is an accurate statement about the application streaming technique of application virtualization?
Application is downloaded in portions on the client for local execution
208
What is a benefit of implementing a virtual machine (VM) storage migration?
Balances storage utilization by redistributing VMs across different storage systems
209
What is a function of a cloud-based object storage gateway?
Performing protocol conversion to send data directly to cloud storage
210
An organization has an iSCSI storage system accessed by 20 compute systems running a hypervisor over a physical Ethernet network. The network enables the transfer of compute-to-compute, compute-to-storage, and management traffic. The compute systems host several virtual machines that are accessed by 31 user groups. In addition, the network has two Ethernet core switches in an active/passive configuration and three edge switches that connect all the compute systems. Multiple VLAN trunk links exist between the core and the edge switches. However, recently the user groups are experiencing performance issues due to excessive utilization of the core switch and the trunk links . What can be implemented to minimize the performance issues?
Switch aggregation
211
What is a benefit of using content addressed storage (CAS) as an archival solution?
Ensures content authenticity and integrity
212
What accurately describes a data lake in a big data environment?
Stores large volumes of structured and unstructured data collected from various sources
213
Which functionality is provided by the REST API in a software-defined storage environment?
Integration and access to external cloud storage services
214
What is an advantage of sub-LUN tiering?
Improved performance
215
What does a domain ID represent in Fiber Channel (FC) addressing?
Unique number provided to each switch in the fabric
216
Why do organizations prefer to adopt cloud-based archiving?
Support massive data growth and data retention requirements
217
Which task is performed during infrastructure discovery?
Creates a list of infrastructure components and their related information
218
What is the function of MapReduce in big data analytics?
Enable the distribution of computations across multiple compute systems for parallel processing
219
The graphic represents an FCIP tunnel configuration that merges two Fibre Channel SANs at either end of the tunnel. Which types of ports do the labels "X" and "Y" represent on the FCIP gateway?
X = E_port and Y = VE_port
220
Which object-based storage system feature provides self-configuring and self-healing capabilities to reduce complexity and downtime?
Automated system management
221
What accurately describes an FCIP tunnel?
Consists of one or more independent connections between two FCIP ports on gateways
222
If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI?
Username
223
What is an advantage of deploying a storage area network (SAN) in a data center environment?
Enables data replication between storage systems across different locations
224
What accurately describes an image-based backup?
Recovery at both virtual machine and file levels is supported
225
What is the advantage of adopting OpenID by an organization?
Eliminates the need to deploy a separate authentication system
226
What happens when a write request to a valid page is received in a solid-state drive?
Requested page is marked invalid and the write continues with an available empty page
227
What is an accurate statement about cache vaulting?
Contents of cache is dumped to a set of physical storage drives during a power failure
228
What accurately describes an NDMP-based backup in a NAS environment?
Backup data is sent directly from a NAS device to the backup device
229
Which items are found in an iSCSI address?
IP address, TCP port number, and iSCSI name
230
What happens when a disk fails in a RAID 5 array configured with a hot spare?
Both read and write operations can continue
231
Which functionality does Risk Management provide?
Identifies resources that should not be accessed by certain users
232
What will enable a company to plan for the frequency of their backups?
Recovery Point Objective
233
What is an advantage of using a single-switch topology for a Fibre Channel (FC) SAN deployment?
Increases the number of node ports for ISL connectivity
234
What is the fundamental unit of data transfer in an FC network?
Frame
235
What accurately describes modern applications?
Designed to be distributed and developed using multiple programming languages
236
A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?
Desktop as a Service
237
What is an accurate statement about Zoning?
Nodes that are distributed across multiple switches in a switched fabric may also be grouped into the same zone
238
What is a recommendation for a virtual machine (VM) snapshot?
Parent VM must be healthy in order to use the snapshot for a rollback operation