|
Question 1.
How does TimeFinder/Snap save disk space while providing full access to the original data on the snapshot copy?
A. It only copies the data track that is read to the snapshot
B. It creates pointers to the original data
C. It compresses the original data before making the snapshot
D. It compresses the original data after making the snapshot
Answer: B
Question 2.
How is free space in the CLARiiON write cache maintained?
A. Low watermark flushing is suspended during write operations
B. The cache is automatically flushed every 90 minutes
C. The cache is flushed to the drives during I/O bursts and only the least-recently used pages are
flushed
D. Low watermark flushing is suspended during read operations
Answer: C
Question 3.
Which of the following recovery methods is used after a Data Mover failover?
A. Automatic
B. EMC support
C. Manual
D. Retry
Answer: C
Question 4.
What does NDMP represent?
A. Network Data Management Protocol
B. Network Data Mirroring Protocol
C. Network Duplex Migration Policy
D. Network Duplication Mirror Policy
Answer: A
Question 5.
Which of the following is optional when using Synchronous MirrorView?
A. write intent log
B. event error log
C. fracture log
D. connection log
Answer: A
Question 6.
Which of the following protocols uses TCP/IP to tunnel Fibre Channel frames?
A. FCP
B. FCIP
C. CIFS
D. iSCSI
Answer: B
Question 7.
Which of the following is the correct sequence for starting a Control Center component?
A. Repository, Server, Store
B. Server, Repository, Store
C. Repository, Store, Server
D. Store, Server, Repository
Answer: A
Question 8.
Which of the following Symmetrix system uses a two bus architecture that is referred to as an "X" and a "Y" bus?
A. Symmetrix 5.0 LVD
B. Symmetrix 4.8
C. Symmetrix 5.0
D. Symmetrix DMX
Answer: B
Question 9.
Which of the following statements is true?
A. SRDF/Automated Replication provides a copy on the Target (R2) device, which will be at most
one write behind for each Source (R1) device
B. SRDF/Automated Replication provides a copy on the Target (R2) device, up to the last
committed transaction
C. SRDF/Automated Replication provides a copy of the data on the Target (R2) device, which will
be several minutes to hours behind the Source
D. SRDF/Automated Replication provides a copy on the Target (R2) device, that will be a few
seconds to a few minutes behind the Source
Answer: C
Question 10.
Which of the following series of switches can you use EMC Connectrix Manager to manage?
A. M-Series
B. MDS-Series
C. Q-Series
D. B-Series
Answer: A
Question 11.
Which two of the following statements are features of CLARiiON Access Logix? (Choose two.)
A. LUN masking requires the use of storage groups
B. The storage processors in the array do not share Access Logix databases
C. Hosts need to be connected to the storage group to perform LUN masking
D. Storage groups cannot be destroyed once created
Answer: A, C
Question 12.
Which of the following Celerra replication options offers synchronous replication over campus distances for disaster recovery?
A. TimeFinder/FS SRDF/NearCopy
B. TimeFinder/FS SnapSure
C. TimeFinder/FS Snapcopy
D. TimeFinder/FS SRDF/FarCopy
Answer: A
Question 13.
Which of the following are configuration options on the NS600 Data Movers? (Choose two.)
A. One Data Mover is primary, and one acts as a standby
B. All four (4) Data Movers are primary
C. Both Data Movers are primary
D. One Data Mover acts as a standby for the other three (3) Data Movers
Answer: A, C
Question 14.
Which of the following statements is true?
A. Concurrent SRDF has the capability of dynamically defining relationships between SRDF
Source (R1) and Target (R2) devices
B. Concurrent SRDF has the ability to use both RAF processors for Fibre Channel host
connections
C. Concurrent SRDF enables SRDF between Symmetrix systems using Fibre Channel switches
D. With concurrent SRDF, a single SRDF Source device (R1) can be simultaneously paired with
two SRDF Target devices (R2)
Answer: D
Question 15.
In the first step of the copy on first write mechanism used with Reserved LUN Pool, the host sends a write request to the Source LUN.
What is the next step?
A. The snapshot pointer is changed to chunk in Reserved LUN Pool
B. The original Source LUN data chunk is written to Reserved LUN Pool
C. The snapshot pointer writes to Reserved LUN Pool
D. The host data is written to Source LUN
Answer: B
Question 16.
In the first step of a read cache miss operation on a Symmetrix, the host sends a read request.
What is the next step?
A. The Channel Director checks the track table
B. The Channel Director sends data to the host
C. The Disk Director retrieves data
D. The Disk Director sends data to the host
Answer: A
Question 17.
Which of the following statements represents a feature of file level host storage access?
A. The host sees Logical Volumes as Physical Volumes
B. Data is accessed using NFS, CIFS, and FTP
C. The host typically has exclusive access to Logical Volumes
D. The storage system presents LUNs to hosts
Answer: B
Question 18.
Which of the following sequences would ensure that an I/O is completed when a HBA on a host with Power Path fails when the I/O is being driven through it?
A. Power Path receives I/O timeout, drives I/O through an alternate path, and takes the failed
path offline
B. Power Path receives I/O timeout, takes the failed path offline and drives I/O through an
alternate path
C. Power Path takes the failed path offline, drives I/O through an alternate path, and receives I/O
timeout
D. Power Path takes the failed path offline, receives I/O timeout and drives I/O through an
alternate path
Answer: B
Question 19.
Which two of the following are features of TimeFinder/Mirror Clone? (Choose two.)
A. Utilizes VDEVs
B. Copy on access to allow for instant access to data
C. Point in time copy of Standard or BCV device
D. Requires only a small fraction of Source volume capacity
Answer: B, C
Question 20.
Which of the following statements is true regarding active zone sets in Control Center?
A. Associate an active zone set with multiple fabrics or VSANs at once.
B. Place a copy of an active zone set in the Planned Zone Sets folder for activation/modification.
C. Directly modify an active zone set.
D. Directly delete an active zone set.
Answer: B
Question 21.
Which of the following statements best describes Control Center Auto fixes?
A. Commands that can be run to fix a problem notification from an alert
B. Rules containing all of the general criteria for storage allocation requests
C. Groups of storage devices that SPS will search for available storage
D. A collection of Symmetrix devices used to query status and impart control operations
Answer: A
Question 22.
What is the maximum number of CLARiiON Source systems that can be mirrored to one Target system?
A. 16
B. 4
C. 2
D. 8
Answer: B
Question 23.
Which of the following is monitored by the Control Center storage agent?
A. Brocade switch
B. Legato Networker
C. CLARiiON
D. Windows 2000 disk
Answer: C
Question 24.
Which of the following Windows-based applications in Control Center displays Symmetrix performance for analysis?
A. Symmetrix Manager
B. Storage Scope
C. TimeFinder/SRDF QoS
D. Performance Manager
Answer: D
Question 25.
Which two of the following can you use to allocate CLARiiON LUNs to a server?
(Choose two.)
A. Connectrix Manager
B. Timer Finder
C. ESN Manager
D. Navisphere Manager
E. Control Center
F. TimeFinder/Snap
Answer: D, E
|
Question 1. Examine the following options, which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10? A. access-list 101 permittcp host 192.168.1.10 eq 80 10.1.0.0 0.0.255.255 eq 3030 B. access-list 101permit tcp any eq 3030 C. access-list 101permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.1.10 0.0.0.0 eq www D. access-list 101permit tcp 10.1.128.0 0.0.1.255 eq 3030 192.168.1.0 0.0.0.15 eq www Answer: D Question 2. DRAG DROP Drag three proper statements about the IPsec protocol on the above to the list on the below. Answer: Question 3. In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data? A. Roughly 50 percent B. Roughly 66 percent C. Roughly 75 percent D. Roughly 10 percent Answer: A Question 4. The information of Cisco Router and Security Device Manager(SDM) is shown below: Within the "sdm-permit" policy map, what is the action assigned to the traffic class "class default"? A. inspect B. drop C. police D. pass Answer: B Question 5. DRAG DROP On the basis of the description of SSL-based VPN, place the correct descriptions in the proper locations. Answer: Question 6. Which description is correct based on the exhibit and partial configuration? A. All traffic destined for network 172.16.150.0 will be denied due to the implicitdeny all. B. All traffic from network 10.0.0.0 will be permitted. C. Access-list 101 will prevent address spoofing from interface E0. D. This ACL will prevent any host on the Internet from spoofing the inside network address as the source address for packets coming into the router from the Internet. Answer: C Question 7. For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1? A. pre-shared key B. integrity check value C. XAUTH D. Diffie-Hellman Nonce Answer: A Question 8. Which description about asymmetric encryption algorithms is correct? A. They use the same key for encryption and decryption of data. B. They use different keys for decryption but the same key for encryption of data. C. They use different keys for encryption and decryption of data. D. They use the same key for decryption but different keys for encryption of data. Answer: C Question 9. For the following items, which management topology keeps management traffic isolated from production traffic? A. OTP B. OOB C. SAFE D. MARS Answer: B Question 10. You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel? A. L2F tunnel B. L2TP tunnel C. GRE tunnel D. ISAKMP tunnel Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.