Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "E20-080" Exam

100% Passed Guaranteed

 

Question 1.
How does TimeFinder/Snap save disk space while providing full access to the original data on the snapshot copy?

A. It only copies the data track that is read to the snapshot
B. It creates pointers to the original data
C. It compresses the original data before making the snapshot
D. It compresses the original data after making the snapshot

Answer: B

Question 2.
How is free space in the CLARiiON write cache maintained?

A. Low watermark flushing is suspended during write operations
B. The cache is automatically flushed every 90 minutes
C. The cache is flushed to the drives during I/O bursts and only the least-recently used pages are
flushed
D. Low watermark flushing is suspended during read operations

Answer: C

Question 3.
Which of the following recovery methods is used after a Data Mover failover?

A. Automatic
B. EMC support
C. Manual
D. Retry

Answer: C

Question 4.
What does NDMP represent?

A. Network Data Management Protocol
B. Network Data Mirroring Protocol
C. Network Duplex Migration Policy
D. Network Duplication Mirror Policy

Answer: A

Question 5.
Which of the following is optional when using Synchronous MirrorView?

A. write intent log
B. event error log
C. fracture log
D. connection log

Answer: A

Question 6.
Which of the following protocols uses TCP/IP to tunnel Fibre Channel frames?

A. FCP
B. FCIP
C. CIFS
D. iSCSI

Answer: B

Question 7.
Which of the following is the correct sequence for starting a Control Center component?

A. Repository, Server, Store
B. Server, Repository, Store
C. Repository, Store, Server
D. Store, Server, Repository

Answer: A

Question 8.
Which of the following Symmetrix system uses a two bus architecture that is referred to as an "X" and a "Y" bus?

A. Symmetrix 5.0 LVD
B. Symmetrix 4.8
C. Symmetrix 5.0
D. Symmetrix DMX

Answer: B

Question 9.
Which of the following statements is true?

A. SRDF/Automated Replication provides a copy on the Target (R2) device, which will be at most
one write behind for each Source (R1) device
B. SRDF/Automated Replication provides a copy on the Target (R2) device, up to the last
committed transaction
C. SRDF/Automated Replication provides a copy of the data on the Target (R2) device, which will
be several minutes to hours behind the Source
D. SRDF/Automated Replication provides a copy on the Target (R2) device, that will be a few
seconds to a few minutes behind the Source

Answer: C

Question 10.
Which of the following series of switches can you use EMC Connectrix Manager to manage?

A. M-Series
B. MDS-Series
C. Q-Series
D. B-Series

Answer: A

Question 11.
Which two of the following statements are features of CLARiiON Access Logix? (Choose two.)

A. LUN masking requires the use of storage groups
B. The storage processors in the array do not share Access Logix databases
C. Hosts need to be connected to the storage group to perform LUN masking
D. Storage groups cannot be destroyed once created

Answer: A, C

Question 12.
Which of the following Celerra replication options offers synchronous replication over campus distances for disaster recovery?

A. TimeFinder/FS SRDF/NearCopy
B. TimeFinder/FS SnapSure
C. TimeFinder/FS Snapcopy
D. TimeFinder/FS SRDF/FarCopy

Answer: A

Question 13.
Which of the following are configuration options on the NS600 Data Movers? (Choose two.)

A. One Data Mover is primary, and one acts as a standby
B. All four (4) Data Movers are primary
C. Both Data Movers are primary
D. One Data Mover acts as a standby for the other three (3) Data Movers

Answer: A, C

Question 14.
Which of the following statements is true?

A. Concurrent SRDF has the capability of dynamically defining relationships between SRDF
Source (R1) and Target (R2) devices
B. Concurrent SRDF has the ability to use both RAF processors for Fibre Channel host
connections
C. Concurrent SRDF enables SRDF between Symmetrix systems using Fibre Channel switches
D. With concurrent SRDF, a single SRDF Source device (R1) can be simultaneously paired with
two SRDF Target devices (R2)

Answer: D

Question 15.
In the first step of the copy on first write mechanism used with Reserved LUN Pool, the host sends a write request to the Source LUN.

What is the next step?

A. The snapshot pointer is changed to chunk in Reserved LUN Pool
B. The original Source LUN data chunk is written to Reserved LUN Pool
C. The snapshot pointer writes to Reserved LUN Pool
D. The host data is written to Source LUN

Answer: B

Question 16.
In the first step of a read cache miss operation on a Symmetrix, the host sends a read request.

What is the next step?

A. The Channel Director checks the track table
B. The Channel Director sends data to the host
C. The Disk Director retrieves data
D. The Disk Director sends data to the host

Answer: A

Question 17.
Which of the following statements represents a feature of file level host storage access?

A. The host sees Logical Volumes as Physical Volumes
B. Data is accessed using NFS, CIFS, and FTP
C. The host typically has exclusive access to Logical Volumes
D. The storage system presents LUNs to hosts

Answer: B

Question 18.
Which of the following sequences would ensure that an I/O is completed when a HBA on a host with Power Path fails when the I/O is being driven through it?

A. Power Path receives I/O timeout, drives I/O through an alternate path, and takes the failed
path offline
B. Power Path receives I/O timeout, takes the failed path offline and drives I/O through an
alternate path
C. Power Path takes the failed path offline, drives I/O through an alternate path, and receives I/O
timeout
D. Power Path takes the failed path offline, receives I/O timeout and drives I/O through an
alternate path

Answer: B

Question 19.
Which two of the following are features of TimeFinder/Mirror Clone? (Choose two.)

A. Utilizes VDEVs
B. Copy on access to allow for instant access to data
C. Point in time copy of Standard or BCV device
D. Requires only a small fraction of Source volume capacity

Answer: B, C

Question 20.
Which of the following statements is true regarding active zone sets in Control Center?

A. Associate an active zone set with multiple fabrics or VSANs at once.
B. Place a copy of an active zone set in the Planned Zone Sets folder for activation/modification.
C. Directly modify an active zone set.
D. Directly delete an active zone set.

Answer: B

Question 21.
Which of the following statements best describes Control Center Auto fixes?

A. Commands that can be run to fix a problem notification from an alert
B. Rules containing all of the general criteria for storage allocation requests
C. Groups of storage devices that SPS will search for available storage
D. A collection of Symmetrix devices used to query status and impart control operations

Answer: A

Question 22.
What is the maximum number of CLARiiON Source systems that can be mirrored to one Target system?

A. 16
B. 4
C. 2
D. 8

Answer: B

Question 23.
Which of the following is monitored by the Control Center storage agent?

A. Brocade switch
B. Legato Networker
C. CLARiiON
D. Windows 2000 disk

Answer: C

Question 24.
Which of the following Windows-based applications in Control Center displays Symmetrix performance for analysis?

A. Symmetrix Manager
B. Storage Scope
C. TimeFinder/SRDF QoS
D. Performance Manager

Answer: D

Question 25.
Which two of the following can you use to allocate CLARiiON LUNs to a server?
(Choose two.)

A. Connectrix Manager
B. Timer Finder
C. ESN Manager
D. Navisphere Manager
E. Control Center
F. TimeFinder/Snap

Answer: D, E
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 640-553 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "640-553" Exam

IINS Implementing Cisco IOS Network Security

 Question 1.
Examine the following options, which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10?

A. access-list 101 permittcp host 192.168.1.10 eq 80 10.1.0.0 0.0.255.255 eq 3030
B. access-list 101permit tcp any eq 3030
C. access-list 101permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.1.10 0.0.0.0 eq www
D. access-list 101permit tcp 10.1.128.0 0.0.1.255 eq 3030 192.168.1.0 0.0.0.15 eq www

Answer: D

Question 2.
DRAG DROP
Drag three proper statements about the IPsec protocol on the above to the list on the below.
 

Answer:
 

Question 3.
In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?

A. Roughly 50 percent
B. Roughly 66 percent
C. Roughly 75 percent
D. Roughly 10 percent

Answer: A

Question 4.
The information of Cisco Router and Security Device Manager(SDM) is shown below:
 

Within the "sdm-permit" policy map, what is the action assigned to the traffic class "class default"?

A. inspect
B. drop
C. police
D. pass

Answer: B

Question 5.
DRAG DROP
On the basis of the description of SSL-based VPN, place the correct descriptions in the proper locations.
 

Answer:
 
Question 6.
Which description is correct based on the exhibit and partial configuration?
 

A. All traffic destined for network 172.16.150.0 will be denied due to the implicitdeny all.
B. All traffic from network 10.0.0.0 will be permitted.
C. Access-list 101 will prevent address spoofing from interface E0.
D. This ACL will prevent any host on the Internet from spoofing the inside network address as the 
    source address for packets coming into the router from the Internet.

Answer: C

Question 7.
For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?

A. pre-shared key
B. integrity check value
C. XAUTH
D. Diffie-Hellman Nonce

Answer: A

Question 8.
Which description about asymmetric encryption algorithms is correct?

A. They use the same key for encryption and decryption of data.
B. They use different keys for decryption but the same key for encryption of data.
C. They use different keys for encryption and decryption of data.
D. They use the same key for decryption but different keys for encryption of data.

Answer: C

Question 9.
For the following items, which management topology keeps management traffic isolated from production traffic?

A. OTP
B. OOB
C. SAFE
D. MARS

Answer: B

Question 10.
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel?

A. L2F tunnel
B. L2TP tunnel
C. GRE tunnel
D. ISAKMP tunnel

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.