|
Question 1. Your new customer will be monitoring 4 DMX800s, 1 DMX1000, 2 DMX2000P direct attached arrays with ControlCenter. What are the minimum total gatekeepers recommended if configurations are changed by EMC during outage windows only? A. 14 B. 20 C. 24 D. 28 Answer: A Question 2. Your customer is using ControlCenter to manage multiple data centers in multiple time zones. What might happen if data collection policies are scheduled incorrectly? A. SAN performance degrades B. Information is missing from StorageScope reports C. Agents cannot be installed D. Storage performance degrades Answer: B Question 3. Exhibit: A customer has the environment shown in the graphic. The customer has a very tight security policy for its networks and has installed separate firewall zones for all of its sites. The customer has reported that network latency is within the supported limits for ControlCenter. A large, distributed two-Store ControlCenter infrastructure has been purchased and installed at Site 1. What must you check before you begin deploying agents to the remote sites? A. Firewalls are NAT based and all the required ports have been opened B. Firewall rules have been created to allow the agents to send information to ControlCenter only C. Firewalls are all Static Rule-based and the required ports have been opened D. Firewalls are all PAT-based and all the required ports have been opened Answer: C Question 4. After the merger of BigBank and LittleBank, several storage administrators continued to use their own ControlCenter accounts. Several months later, it was determined that none of the current administrators knew the "eccadmin" password. What can be done? A. Reinstall just the server component B. Force a zone transfer C. Delete the "eccadmin" account from the domain D. Change the local user's password Answer: D Question 5. A customer wants all switch hardware faults to be forwarded to a SNMP management framework that has been set up for SNMP version 3 only. What must be configured? A. Switch to forward SNMP informs to a third-party framework application B. Switch to forward SNMPv1 traps to a third-party framework application C. Switch to forward SNMP informs to ControlCenter D. ControlCenter to forward SNMP traps to a third-party framework application Answer: A Question 6. Exhibit: Host A has access to RAID-1 protected STD device. An unprotected R1/BCV is used to replicate this STD device. The R2 is RAID-1 protected. In StorageScope terminology, what is the allocated raw capacity for Host A? A. 12GB B. 4GB C. 8GB D. 20GB Answer: D Question 7. To upgrade VisualSAN when space is limited, select three [3] files that should be considered to determine the size of VisualSAN database? A. VSAN.MDF B. NM.MDF C. PM.MDF D. PDMA.MDF E. CM.MDF Answer: B, C, E Question 8. After a lightning strike, a Connectrix M series switch was replaced with an identical spare. The new switch was configured using Telnet. Now, Storage Provisioning Services (SPS) reports errors during attempts to allocate certain volumes. Why? A. SNMP community is wrong B. Switch password was changed C. An active zoneset is obsolete D. Telnet is no longer supported Answer: C Question 9. You are installing ControlCenter 5.2 on a single infrastructure Server with Windows 2003 and 4GB of memory. Which concern must be addressed? A. memquery.exe file must be replaced prior to beginning the installation B. memquery.exe file must be replaced prior to installing the Repository C. There are no issues if the Server is running Windows 2003 D. memquery.exe file must be replaced prior to installing the Server Answer: B Question 10. Your customer is complaining that the ControlCenter FCC Agent is not working properly. During your troubleshooting, you have confirmed there are no firewalls. Select (2) conflicts which could be interfering with the FCC Agent. A. SDM Agent B. Dell OpenManage service C. VNC D. NAS Agent E. Windows Terminal Services Answer: B, D Question 11. How would an administrator define Windows user groups that correspond to functional VisualSAN roles? A. Assign roles using the Windows Management Interface B. Use the "Administration" tab C. Edit the NetworkSecurity.properties file D. Use the "Settings>Role-Based Setting" menu Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.