|
Question 1. ITCertKeys.com's environment is configured as follows:2 Symmetrix Arrays, each with 1000 Logical Volumes and 2000 Front End Mappings.2 ED-140M directors, fully populated with ports.100 Open Systems Hosts, all with dual paths. This environment is managed with Control Center installed in a single host infrastructure configuration residing on a host that has dual 3 GHz processors, 2GB of RAM and 50 GB of available storage. If ITCertKeys.com wants to install the web console on the Control Center server, what would you tell them? A. That this is not a valid configuration. To install the Web Console on the infrastructure, the server needs to have more and faster processors. B. That this is a valid configuration. The Web Console can reside on this host with the Control Center infrastructure components. C. That this is not a valid configuration. To install the Web Console on the infrastructure, the server needs to have more RAM. D. That this is not a valid configuration. To install the Web Console on this server, it needs to have more available storage. Answer: C Question 2. ITCertKeys.com is planning to implement Control Center to manage their SAN, which consists of 4 DMX arrays, 2 M series switches and 40 hosts. As a result of a meeting to discuss the alert capability of Control Center, they express concerns about receiving alerts on temporary conditions. How would you respond to these concerns? A. By turning off alerts about which ITCertKeys.com expresses concerns. B. By explaining Control Center does not have the ability to handle alert spikes. C. By explaining the before/after capability for alerts. D. By suggesting a case be opened with support so a solution can be developed. Answer: C Question 3. If ITCertKeys.com plans to deploy EMC Visual SRM in their environment, what dynamic will help them to determine which backend database (Oracle or SQL Server) to use? A. The number of Databases, Exchange Servers and Files. B. The number of Databases, Hosts, Storage Arrays and Switch Ports. C. The number of Databases, Exchange Servers and Hosts. D. The number of Databases, Exchange Servers, Hosts and Storage Arrays. Answer: A Question 4. Some months ago, ITCertKeys.com installed Control Center as the main management tool. What kind of Remote Management solution ought to be developed for them, so that the staff can solve Control Center problems during the night? A. Install Control Center Web Server with the SSL option and have them connected and authenticated through the Internet B. Install a Citrix Server on a new Server and have them start a Console through a Citrix Client C. Install Terminal Services on the Infrastructure Server and have them start a Console through Terminal Services D. Install a Citrix Server on the Infrastructure Server and have them start a Console through a Citrix client Answer: B Question 5. While considering the type and protection of the storage for the Control Center database, ITCertKeys.com is looking for a recommendation. Which option is recommended as best practice for database storage? A. Use software based mirroring for the Control Center database B. Due to the daily database exports unprotected disk is recommended C. Use RAID-1 for the Control Center database D. Use RAID-5 for the Control Center database Answer: C Question 6. ITCertKeys.com is using Storage Scope as the reporting tool for multiple sites. They have a Management LAN in place, but they are unhappy because they have to login to Storage Scope every time they want to check a report. What can be done to negate this problem? A. Configure Storage Scope properties so it allows bypassing login. B. Customer can start a Control Center console without the login process and launch Storage Scope from there. C. Nothing, authentication is always required. D. Nothing, there is always a login screen when Storage Scope is started from a browser. Answer: A Question 7. You are tasked with the planning and design for Control Center Alerting in a ITCertKeys.com environment that consists of several CX500, CX600 and CX700 CLARiiON arrays. In addition to this, they also have 10 DMX2000s in their datacenter. Which of the following are valid statements with regards to implementing CLARiiON Performance Alerts into Control Center? A. Performance Alerts are automatically sent to Control Center when the array is discovered B. There are no CLARiiON Performance Alerts in Control Center C. Setup SNMP Traps on the CLARiiON SP to send Performance Traps to the Storage Agent for CLARiiON D. Setup SNMP Traps on the CLARiiON SP to send Performance Traps to Control Center Server Answer: B Question 8. You are planning a Control Center implementation for ITCertKeys.com and they indicate that they want to include 50 of their Oracle databases in Control Center Reports. They would like to receive reports on Table space utilization. With those numbers in mind, what needs to be considered? A. You need to setup a DCP for each of those databases, after they are discovered. B. Nothing at all, all databases are automatically discovered when the Agent is installed. C. You need to setup Alerts for the table spaces in order to report utilization numbers. D. You need to setup a DCP for all of those databases which is specified during the discovery process. Answer: A Question 9. ITCertKeys.com requires a Chargeback Report, which must be based on array devices allocated to each host. The cost of each device must be calculated based on array type, array model, as well as device size and device protection. The report must also display the cost per Host and Business Unit. What needs to be created if Control Center Storage Scope and Storage Scope FLR are deployed? A. A custom layout of the Host Chargeback report in the Storage Scope Web Interface. B. File Groups in Storage Scope FLR and use the Chargeback Summary Report. C. A custom report with data from the Storage Scope API and customer supplied data. D. A custom layout of the Array Device Allocation report in the Storage Scope Web Interface. Answer: C Question 10. Of the following, which are the three broad Control Center Alerts categories? (Choose three) A. Monitoring B. Performance C. Health D. Free Space E. Capacity Answer: B, C, E Question 11. For a Control Center review and validation by the Solutions Validation Center (SVC), which two documents are vital? (Choose two) A. Statement of Work (SOW) B. Scope C. Qualifier D. Work Breakdown Structure Answer: A, C Question 12. You have designed a Control Center configuration for a client. The implementation specialist calls you while they are on site and says that they are unable to discover the ED140M switches in Control Center. They can, however, see them in Connectrix Manager. What is the possible source of this problem? A. DSM-Connect is not installed on the Connectrix Service Processor. B. Symmwin is not installed on the Connectrix Service Processor. C. The EOS version of firmware needs to be upgraded on the switches. D. Fibre zone Bridge is not installed on the Connectrix Service Processor. Answer: D Question 13. ITCertKeys.com is increasing their environment from 2 to 4 medium sized CLARiiON arrays, for which they currently have one Storage Agent. Which Control Center design change is required for this to be achieved? A. Add additional CLARiiON agents for the growth. B. Add more servers for additional agents and more memory to the existing servers. C. Modify the CLARiiON WLA DCP's from 15 to 20 minutes. D. Install a second infrastructure to handle the growth. Answer: C
|
Question 1. Authentication is used in Secure Application Provisioning to: A. Quarantine malicious traffic B. Persistently apply policy C. Allow configuration of a switch's host data port D. provide additional network access Answer: D Question 2. Saving a NetSight Atlas Policy Manager configuration to a .pmd file: A. Writes the configuration to NVRAM on the switches B. Allows for multiple configurations to be stored on the NMS C. Notifies the RADIUS server that new policies have been created D. Temporarily disables communication between all RADIUS clients until the save is complete Answer: B Question 3. Certificate services must be installed when using: A. EAP-TLS B. EAP-MD5 C. PWA D. MAC authentication Answer: A Question 4. Persistent policy assignment: A. Can be effective in an incremental deployment of acceptable use policy B. Is dependent upon a RADIUS back-end configuration C. Is deployed based on user authentication D. Cannot be used on uplink ports Answer: A Question 5. A distinguishing characteristic of PEAP is: A. It adds security by running over a VPN tunnel B. It uses salt encryption C. It requires that only the supplicant present a certificate D. It creates keying material using the Pseudo-Random Function Answer: D Question 6. In the Enterasys policy-enabled network model, on-demand policy assignment: A. Is the result of a manual configuration B. Makes use of the Filter-ID parameter C. Is overridden by a ports default role D. Requires the use of 802.1X authentication mechanisms Answer: B Question 7. All of the following are services which make up the pre-configured Acceptable Use Policy service group EXCEPT: A. Deny Spoofing B. Permit Legacy Protocols C. Limit Exposure to DoS attacks D. Protocol Priority Access Control Answer: B Question 8. After configuration changes have been made in NetSight Atlas Policy Manager, what must be done before the changes take effect on the devices? A. The NMS must be rebooted B. The changes must be enforced C. The changes must be verified D. Nothing the changes take effect immediately Answer: B Question 9. In the three-level policy model, Enterasys maps: A. The business/network level to classification rules B. The service-provisioning level to roles C. The device level to classification rules D. All of the above Answer: C Question 10. The Active Edge consists of: A. Policy-enabled switches B. Core routers C. SAP servers D. User resources Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.