|
Guys, Learn the material and you will pass!
|
Question 1. The customer activates a VSAN for a new open system environment on the MDS-series switch. What is the EMC recommended default zoning policy for the VSAN? A. Deny - allows all ports in default zone to communicate with on another B. Permit - prevents all ports in the default zone from communicating C. Permit - allows all ports in default zone to communicate with on another D. Deny - prevents all ports in the default zone from communicating Answer: D Question 2. What are two [2] key features of Storage Management Interface (SMI)? A. Automated discovery system B. Common interoperable and statically management transport C. Manually discovery system D. Common interoperable and extensible management transport Answer: A, D Question 3. The redraw time of the alerts window pane in ControlCenter takes several minutes to complete. What do you recommend to fix this problem? A. Edit the Alert Data Collection Policies B. Edit the Alert Definition C. Edit the Alert Templates D. Edit the Alert Data Retention Answer: D Question 4. DRAG DROP A customer has new DS-4100B switches. They want to turn on reporting levels of severity for messages. Match the message to the corresponding severity level. Answer: Question 5. Your company is planning to convert seven DS-32B2 standalone fabrics to a single full ISLs? A. 112 B. 14 C. 84 D. 28 Answer: C Question 6. A customer has implemented a DR site 200 km away. They have an extended fabric configured between the SAN directors at each site, using a 62.5 MB/sec network infrastructure. They want to replicate mission critical data with a RPO objective of 60 seconds using SRDF and the existing SAN infrastructure. What do you recommend to help them meet their objective? A. They cannot meet these objectives using the existing environment B. Add additional ISL bandwidth between directors C. Add extended buffer credit licenses to all directors D. SRDF/A for data replication Answer: D Question 7. Exhibit: When reviewing the print out of the trunking log in the exhibit you see the ISL rerouting. How many ISL connections are between Domain ID 5 and Domain ID 6? A. 5 B. 3 C. 4 D. 6 Answer: B Question 8. A company is replacing some M-series switches with new M-series directors. They will be replacing one for one, and want the least amount of disruption for their AIX and HP-UX boxes by maintaining their D_IDs. How do they do this? A. Set the same domain IDs as the old switches on the new directors Set Insistent Domain_ID on new directors and turn it off on old switches Move host and storage ports and merge B. Set the same domain IDs as the old switches on the new directors Set Insistent Domain_ID on new directors and turn it off on old switches Reboot servers C. Set the different domain IDs as the old switches on the new directors Set Persistent Domain_ID on new directors and turn it off on the old switches Move host and storage ports and merge D. Set the same domain IDs as the old switches on the new directors Disable Insistent Domain_ID on new directors and turn it off on old switches Move host and storage ports and merge Answer: A Question 9. Two MDS-series fabrics, Fabric X and Fabric Y will be merged. Fabric X has one switch A. Fabric Y has three switches B, C and D. The four switches are configured as domain-id preferred. Among the four switches, A has the highest priority and least WWN, C has the lowest priority, and D is the current principle switch in Fabric Y. Assume both fabrics will be merged without any conflicts. Which switch will be the principle switch after the merge? A. Switch B B. Switch A C. Switch D D. Switch C Answer: C Question 10. What is a valid FCID for a node connected to a MDS-series director in a fabric consisting of MDS-series, B-series and M-series switches? A. 0x441111 B. 0x663333 C. 0x552222 D. 0x330000 Answer: B
|
Question 1. Your application includes a standard tab set TS1 with two tabs. You want the tabs to show up only in page 1 but not in page 2. Which actions achieve the stated requirement? A. Edit the tab definition. In the Tab Also Current for Pages field, specify the page number for which the tab is to be rendered. B. Edit the tab definition. Select "Current page Expression 1" for Condition Type and then specify page 1 in the "Expression 1* field. Repeat this process for the other tab. C. Edit the tab definition. Select "Current page is NOT in Expression 1" for Condition Type and then specify the page number for which the tab is to render in the "Expression 1" field. D. Change the region template on the page where the tabs should not be rendered. Answer: B Explanation: B (not A): Even though you set the current for, the tab will still be visible. Only if you use a condition (or authorization) will the table disappear. Question 2. The Interactive Report is displayed in Exhibit 2 Which combination of three actions would need to take place to create the interactive report? A. Create an Interactive Report region to show the list of EMPLOYEES and PRODUCTS based on the Customer ID. B. Create an Interactive Report region that contains a query between the CUSTOMERS, EMPLOYEES, PRODUCTS and SALES table. C. Create an SQL Report region that contains a query between the CUSTOMERS, PRODUCTS and SALES tables only. D. Create a filter on Customer FIRST_NAME and LAST_NAME. E. Create a Control Break on Sales Representative. F. Concatenate FIRST_NAME and LAST NAME for both CUSTOMERS and EMPLOYEES in the query. Answer: B, E, F Explanation: B: The report needs to access data from all four tables. E: You can create a break group of one or several columns by selecting Control Break from the Actions menu. Creating a break group pulls the columns out of the interactive report and displays them as a master record. F: The concatenated names of the Sales Representative (from Employee table) and the concatenated names of Customers are used. Note: Interactive reports include components that enable users to alter the layout of report data. Users can select columns, create filters, apply highlighting, sort columns, define break groups, aggregate columns, create charts, and define computations. Once customized, users can then save an interactive report as named report and download the data to various file formats. Question 3. There are four departments listed as radio group, appearing one below the other in a form (View Exhibit A). You want to edit the item attributes so that they appear as shown in Exhibit B (horizontally, next to each other). Which action would you take to satisfy this requirement? Exhibit A A. Change "Begin on new Line" attribute of radio group to No and set "Begin on New Field" attribute to Yes. B. Change "Begin on new Line" attribute of radio group to Yes and set "Begin on New field" attribute to Yes. C. Change "Begin on new Line” attribute of radio group to No and set "Begin on New field" attribute to No. D. Edit the List of Values section for the item. Change the "Number of Columns" attribute to the number of columns that should be displayed horizontally. E. Edit the List of Values In Shared Components. Specify the number of columns that you want the List of Values to span. Answer: D Explanation: Question 4. Which three actions can be performed by a Workspace Administrator? A. Monitor workspace activity B. Manage workspace to schema assignments C. Manage user accounts D. Approve workspace requests E. View usage reports of workspace Answer: A, C, E Explanation: Developers can create and edit applications and view developer activity, session state, workspace activity(A), application, and schema reports. Workspace administrators additionally can create and edit user accounts (C), manage groups, and manage development services. Question 5. Which three steps are presented when importing an application? A. Specify where to store the imported application B. Browse to the file location and select the name of the file to be imported C. Select how to resolve Application ID conflicts D. Select the parsing schema and build status E. Select the database character set Answer: B, C, D Explanation: To import an Application or Page Export into a target Oracle Application Express instance: 1. Navigate to the Import page (B) 2. For Specify File, specify the following: a. Import file - Click Browse and navigate to the file. b. File Type - Select Application, Page, or Component Export. c. Verify that File Character Set is correct. d. Click Next. Once you import a file, you have the option to install it. 3. To install an imported file, click Next. 4. In the Install Application wizard, specify the following: (D) a. Parsing Schema - Select a schema. b. Build Status (C) c. Install As Application - Select one of the following: – Auto Assign New Application ID – Reuse Application ID From Export File – Change Application ID Use these options to avoid application ID conflicts. These options come in handy when you have two versions of the same application in the same instance. For example, you might be migrating an application to a production instance and still need to maintain the development version. Reference: Oracle Application Express, Application Builder User’s Guide, Release 3.2, To import an Application or Page Export into a target Oracle Application Express Question 6. You have created an access control list. Which authorization scheme would you select to control access to an application or a page component? A. Access control 1 update B. Restricted access. Only users defined in the access control list are allowed C. Public read only. Edit and administrative privileges controlled by access control list D. Access control - view E. Administrative access only Answer: D Explanation: Question 7. In your Orders application, you created a 30 Pie Flash chart page to display products by category. You provided the following query: Select null link, category_name# count (*) from (SELECT CASE WHEN (category_id between 10 and 19) THEN 'Television1 WHEN (category_id between 20 and 29) THEN 'Computer1 ELSE 'Others1 END category_name VMM new_product. Group by category_name order by 1 View the Exhibit. What action should you perform to display the chart title and the total number of products under each category without using custom XML? A. Edit the Flash Chart region to select the Show Values check box. B. Modify the query to display the value and edit the Flash Chart region to display the chart title C. Edit the Flash Chart region to specify the chart title and select the Show Values check box. D. Edit the Flash Chart region to specify the chart title. Answer: C Explanation: Question 8. Which two are true about creating interactive reports? A. A form and Interactive' -report can be created at the same time, B. An interactive report must be baseiHHp SQL Query. C. All the columns must be shown in the Interactive report. D. Only one interactive report can be defined on a page. D. More than one Interactive report can be viewed on a page. Answer: A, D Explanation: Question 9. Which two statements is true relating to authentication in Oracle Application Express? A. It is a process of establishing user identity before the user can access an application. B. An authentication scheme can be specified for an entire application, page, or specific Components Such as item, button and regions on a page. C. An authentication scheme prevents a user from accessing session state belonging to other users. D. An authentication scheme helps a user to reestablish their session when they log back into an application allowing them to bookmark the application. E. An authentication scheme can only be applied to one application. Answer: A, C Explanation: A: Authentication establishes the identity of each user who accesses your application. Authentication is the process of establishing each user's identify before they can access your application. Authentication may require a user identify a user name and password or could involve the use of digital certificates or a secure key. C: When running custom authentication, Oracle Application Express attempts to prevent two improper situations: * Intentional attempts by a user to access session state belonging to someone else. However, users can still type in an arbitrary application session ID into the URL. * Inadvertent access to a stale session state (probably belonging to the same user from an earlier time). This would commonly result from using bookmarks to application pages. Reference: Oracle Application Express, Application Builder User’s Guide, Release 3.2, Using Preconfigured Authentication Schemes
|
Question 1. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com has upgraded to System Center 2012 Configuration Manager. You are running a training exercise for ABC.com’s administrators. You are currently discussing the creation of global conditions in Configuration Manager. Which of the following suitably describes global conditions in Configuration Manager? A. Global conditions allow you to upgrade or replace existing applications using a supersedence relationship. B. Global conditions are rules that represent business or technical conditions that can be used to specify how an application is provided and deployed to client devices. C. Global conditions are a method of associating a user with one or more specified devices. D. Global conditions allow virtual applications that you have deployed to share the same file system and registry on client computers. Answer: B Explanation: Question 2. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. ABC.com’s developers have recently created a new application. You then deployed the application using the Available option from the Purpose drop-down list. Which of the following is TRUE with regards to using this option? (Choose all that apply.) A. If the application is deployed to a user, the user sees the published application in the Application Catalog and can request it on demand. B. The application is deployed automatically, in relation to the configured schedule. C. If the application is deployed to a device, the user will see it in the Software Center and can install it on demand. D. The administrator must approve any user requests for the application before it can be installed. Answer: A, C Explanation: Question 3. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. You are running a training exercise for ABC.com’s administrators. You are currently discussing the use of Endpoint Protection in Configuration Manager. Which of the following are TURE with regards to making use of Endpoint Protection in Configuration Manager? (Choose all that apply.) A. You are allowed to configure antimalware policies and Windows Firewall settings for selected groups of computers via custom antimalware policies and client settings. B. You are only allowed to use Windows Update to download the latest antimalware definition Files to keep client workstations up-to-date. C. You are allowed to make use of Configuration Manager software updates to download the most recent antimalware definition files to keep client workstations up-to-date. D. You are not allowed to send email notifications to administrative users to inform them when malware is detected on client workstations. Answer: A, C Explanation: Question 4. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. You are applying updates to operating system images while they are in the Configuration Manager library. Which of the following is TRUE with regards to making use of this update solution? (Choose all that apply.) A. The risk of vulnerabilities during operating system deployments is diminished. B. The risk of vulnerabilities during operating system deployments is reduced. C. The overall operating system deployment to the end user is diminished. D. The overall operating system deployment to the end user is reduced. E. The administrative effort for maintaining your operating system images is diminished. F. The administrative effort for maintaining your operating system images is reduced. Answer: B, D, F Explanation: Question 5. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All workstations on the ABC.com network have a 32-bit version of Windows 7 Enterprise installed. ABC.com makes use of System Center 2012 Configuration Manager in their environment. ABC.com has an image of the 32-bit version of Windows 7 Enterprise, which is deployed to new workstations when necessary. You want to make sure that this image is kept up-to-date. Which of the following is TRUE when updating boot images? (Choose all that apply.) A. You can add device drivers to a boot without importing and enabling them in the device driver catalog. B. The boot image does not change any of the associated packages that the boot image references. C. You must update the distribution points that contain a version of the boot image subsequent to you making changes to a boot image. D. You can schedule an update of the distribution point. Answer: B, C Explanation: Question 6. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. You have been instructed to assign a fellow administrator, named Andy Reid, a security role that allows him to define and monitor security policies. Which of the following is the security role that should be assigned to Andy Reid? A. Asset Manager. B. Endpoint Protection Manager. C. Compliance Settings Manager. D. Infrastructure Administrator. Answer: B Explanation: Question 7. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. You are running a training exercise for ABC.com’s administrators. You are currently discussing Heartbeat Discovery. Which of the following is TRUE with regards to Heartbeat Discovery? (Choose all that apply.) A. It is the only discovery method that provides details about the client installation status. B. The client computer must be able to contact its assigned update point to send the Heartbeat Discovery record. C. You are unable to manually initiate a Heartbeat Discovery cycle on a client. D. You are able to manually initiate a Heartbeat Discovery cycle on a client. Answer: A, D Explanation: Question 8. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. ABC.com’s hierarchy includes a Central Administration site and a primary site. You are currently analyzing the Despool.log files. Which of the following describes a reason for this? A. To view files that transfer via file-based replication between sites. B. To view details about site-to-site job and package replication. C. To view the activities of database replication between sites in the hierarchy. D. To view the replication of files between the site server components and the Scheduler component. Answer: D Explanation: Question 9. You work as a senior administrator at ABC.com. The ABC.com network consists of two active directory forests named eu.ABC.com and us.ABC.com. System Center 2012 Configuration Manager has been deployed in the us.ABC.com forest. You have employed a logon script for deploying the Configuration Manager client to workstations in the us.ABC.com forest. You are then instructed to automatically deploy the Configuration Manager client to workstations in the eu.ABC.com forest. You start by configuring a Client Push Installation account, and enabling the Client Push installation option. Which of the following actions should you take NEXT? A. You should consider enabling the Active Directory System Discovery option. B. You should consider enabling the Database Discovery option. C. You should consider enabling the Site Discovery option. D. You should consider enabling the Domain Discovery option. Answer: A Explanation: Question 10. You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment. ABC.com’s hierarchy only includes a primary site. Have installed the Application Catalog web service point and Application Catalog website point. Which of the following describes a reason for installing the Application Catalog web service point? A. To provide the Application Catalog website with software data from the Software Library. B. To provide users with a list of available software. C. To allow mobile devices to connect to System Center 2012 Configuration Manager servers and receive policy and configuration settings. D. To validate a statement of health using a sequential series of checks. Answer: A Explanation:
|
Question 1. Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while? A. LRU B. HWM C. LWM D. MRU Answer: A Explanation: Cache Management: Algorithms Cache is a finite and expensive resource that needs proper management. Even though modern intelligent storage systems come with a large amount of cache, when all cache pages are filled, some pages have to be freed up to accommodate new data and avoid performance degradation. Various cache management algorithms are implemented in intelligent storage systems to proactively maintain a set of free pages and a list of pages that can be potentially freed up whenever required. The most commonly used algorithms are discussed in the following list: • Least Recently Used (LRU): An algorithm that continuously monitors data access in cache and identifies the cache pages that have not been accessed for a long time. LRU either frees up these pages or marks them for reuse. This algorithm is based on the assumption that data that has not been accessed for a while will not be requested by the host. However, if a page contains write data that has not yet been committed to disk, the data is first written to disk before the page is reused. • Most Recently Used (MRU): This algorithm is the opposite of LRU, where the pages that have been accessed most recently are freed up or marked for reuse. This algorithm is based on the assumption that recently accessed data may not be required for a while. EMC E10-001 Student Resource Guide. Module 4: Intelligent Storage System Question 2. What does the area ID of the FC address identify? A. Group of ports within a switch B. An individual port within a fabric C. Location of the name server within the fabric D. Unique number provided to each switch in the fabric Answer: A Explanation: FC Addressing in Switched Fabric An FC address is dynamically assigned when a node port logs on to the fabric. The FC address has a distinct format, as shown in the slide. The first field of the FC address contains the domain ID of the switch. A Domain ID is a unique number provided to each switch in the fabric. Although this is an 8-bit field, there are only 239 available addresses for domain ID because some addresses are deemed special and reserved for fabric management services. For example, FFFFFC is reserved for the name server, and FFFFFE is reserved for the fabric login service. The area ID is used to identify a group of switch ports used for connecting nodes. An example of a group of ports with common area ID is a port card on the switch. The last field, the port ID, identifies the port within the group. Therefore, the maximum possible number of node ports in a switched fabric is calculated as: 239 domains X 256 areas X 256 ports = 15,663,104 EMC E10-001 Student Resource Guide. Module 5: Fibre Channel Storage Area Network (FC SAN) Question 3. An organization performs copy on first access (CoFA) replication to create a local replica of application data. To perform a successful restore, what should be considered? A. Source devices must be healthy B. Save location size must be larger than the size of all source devices C. Save location size must be equal to the size of all source devices D. All changes to the source and replica must be discarded before the restore starts Answer: A Explanation: Replication: Restore & Restart Considerations Local replicas are used to restore data to production devices. Alternatively, applications can be restarted using the consistent point-in-time replicas. Replicas are used to restore data to the production devices if logical corruption of data on production devices occurs—that is, the devices are available but the data on them is invalid. Examples of logical corruption include accidental deletion of data (tables or entries in a database), incorrect data entry, and incorrect data updates. Restore operations from a replica are incremental and provide a small RTO. In some instances, the applications can be resumed on the production devices prior to the completion of the data copy. Prior to the restore operation, access to production and replica devices should be stopped. Production devices might also become unavailable due to physical failures, such as production server or physical drive failure. In this case, applications can be restarted using the data on the latest replica. As a protection against further failures, a “Gold Copy” (another copy of replica device) of the replica device should be created to preserve a copy of data in the event of failure or corruption of the replica devices. After the issue has been resolved, the data from the replica devices can be restored back to the production devices. Full-volume replicas (both full-volume mirrors and pointer-based in Full Copy mode) can be restored to the original source devices or to a new set of source devices. Restores to the original source devices can be incremental, but restores to a new set of devices are fullvolume copy operations. In pointer-based virtual and pointer-based full-volume replication in CoFA mode, access to data on the replica is dependent on the health and accessibility of the source volumes. If the source volume is inaccessible for any reason, these replicas cannot be used for a restore or a restart operation. EMC E10-001 Student Resource Guide. Module 11: Local Replication Question 4. Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications? A. Converged network adapter B. TCP Offload Engine NIC C. FCIP bridging adapter D. iSCSI host bus adapter Answer: A Explanation: Converged Network Adaptor (CNA) A CNA provides the functionality of both a standard NIC and an FC HBA in a single adapter and consolidates both types of traffic. CNA eliminates the need to deploy separate adapters and cables for FC and Ethernet communications, thereby reducing the required number of server slots and switch ports. CNA offloads the FCoE protocol processing task from the server, thereby freeing the server CPU resources for application processing. A CNA contains separate modules for 10 Gigabit Ethernet, Fibre Channel, and FCoE Application Specific Integrated Circuits (ASICs). The FCoE ASIC encapsulate FC frames into Ethernet frames. One end of this ASIC is connected to 10GbE and FC ASICs for server connectivity, while the other end provides a 10GbE interface to connect to an FCoE switch. EMC E10-001 Student Resource Guide. Module 6: IP SAN and FCoE Question 5. What is a function of unified management software in cloud computing? A. Defining cloud service attributes B. Consolidating infrastructure resources scattered across one or more data centers C. Metering based on usage of resources by the consumer D. Providing an interface to consumers to request cloud services Answer: B Explanation: Cloud Management and Service Creation Tools The cloud management and service creation tools layer includes three types of software: • Physical and virtual infrastructure management software • Unified management software • User-access management software This classification is based on the different functions performed by these software. These software interact with each other to automate provisioning of cloud services. The physical and virtual infrastructure management software is offered by the vendors of various infrastructure resources and third-party organizations. For example, a storage array has its own management software. Similarly, network and physical servers are managed independently using network and compute management software respectively. These software provide interfaces to construct a virtual infrastructure from the underlying physical infrastructure. Unified management software interacts with all standalone physical and virtual infrastructure management software. It collects information on the existing physical and virtual infrastructure configurations, connectivity, and utilization. Unified management software compiles this information and provides a consolidated view of infrastructure resources scattered across one or more data centers. It allows an administrator to monitor performance, capacity, and availability of physical and virtual resources centrally. Unified management software also provides a single management interface to configure physical and virtual infrastructure and integrate the compute (both CPU and memory), network, and storage pools. The integration allows a group of compute pools to use the storage and network pools for storing and transferring data respectively. The unified management software passes configuration commands to respective physical and virtual infrastructure management software, which executes the instructions. This eliminates the administration of compute, storage, and network resources separately using native management software. The key function of the unified management software is to automate the creation of cloud services. It enables administrators to define service attributes such as CPU power, memory, network bandwidth, storage capacity, name and description of applications and platform software, resource location, and backup policy. When the unified management software receives consumer requests for cloud services, it creates the service based on predefined service attributes. The user-access management software provides a web-based user interface to consumers. Consumers can use the interface to browse the service catalogue and request cloud services. The user-access management software authenticates users before forwarding their request to the unified management software. It also monitors allocation or usage of resources associated to the cloud service instances. Based on the allocation or usage of resources, it generates a chargeback report. The chargeback report is visible to consumers and provides transparency between consumers and providers. EMC E10-001 Student Resource Guide. Module 13: Cloud Computing Question 6. Which EMC product provides the capability to recover data up to any point-in-time? A. RecoverPoint B. NetWorker C. Avamar D. Data Domain Answer: A Explanation: EMC RecoverPoint RecoverPoint is a high-performance, cost-effective, single product that provides local and remote data protection for both physical and virtual environments. It provides faster recovery and unlimited recovery points. RecoverPoint provides continuous data protection and performs replication between the LUNs. RecoverPoint uses lightweight splitting technology either at the application server, fabric, or arrays to mirror a write to a RecoverPoint appliance. The RecoverPoint family of products include RecoverPoint/CL, RecoverPoint/EX, and RecoverPoint/SE. RecoverPoint/CL is a replication product for a heterogeneous server and storage environment. It supports both EMC and non-EMC storage arrays. This product supports hostbased, fabric-based, and array-based write splitters. RecoverPoint/EX supports replication between EMC storage arrays and allows only array-based write splitting. RecoverPoint/SE is a version of RecoverPoint that is targeted for VNX series arrays and enables only Windows-based host and array-based write splitting. EMC E10-001 Student Resource Guide. Module 11: Local Replication Question 7. What is needed to perform a non-disruptive migration of virtual machines (VMs) between hypervisors? A. Hypervisors must have access to the same storage volume B. Physical machines running hypervisors must have the same configuration C. Hypervisors must be running within the same physical machine D. Both hypervisors must have the same IP address Answer: A Explanation: VM Migration: Hypervisor-to-Hypervisor In hypervisor-to-hypervisor VM migration, the entire active state of a VM is moved from one hypervisor to another. This method involves copying the contents of virtual machine memory from the source hypervisor to the target and then transferring the control of the VM’s disk files to the target hypervisor. Because the virtual disks of the VMs are not migrated, this technique requires both source and target hypervisor access to the same storage. EMC E10-001 Student Resource Guide. Module 12: Remote Replication Question 8. Which iSCSI name requires an organization to own a registered domain name? A. IQN B. EUI C. WWNN D. WWPN Answer: A Explanation: iSCSI Name A unique worldwide iSCSI identifier, known as an iSCSI name, is used to identify the initiators and targets within an iSCSI network to facilitate communication. The unique identifier can be a combination of the names of the department, application, or manufacturer, serial number, asset number, or any tag that can be used to recognize and manage the devices. Following are two types of iSCSI names commonly used: • iSCSI Qualified Name (IQN): An organization must own a registered domain name to generate iSCSI Qualified Names. This domain name does not need to be active or resolve to an address. It just needs to be reserved to prevent other organizations from using the same domain name to generate iSCSI names. A date is included in the name to avoid potential conflicts caused by the transfer of domain names. An example of an IQN is iqn.2008-02.com.example:optional_string. The optional_string provides a serial number, an asset number, or any other device identifiers. An iSCSI Qualified Name enables storage administrators to assign meaningful names to iSCSI devices, and therefore, manage those devices more easily. • Extended Unique Identifier (EUI): An EUI is a globally unique identifier based on the IEEE EUI- 64 naming standard. An EUI is composed of the eui prefix followed by a 16-character exadecimal name, such as eui.0300732A32598D26. In either format, the allowed special characters are dots, dashes, and blank spaces. EMC E10-001 Student Resource Guide. Module 6: IP SAN and FCoE Question 9. Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved as it was received? A. Integrity B. Availability C. Security D. Performance Answer: A Explanation: Information Security Framework The basic information security framework is built to achieve four security goals, confidentiality, integrity, and availability (CIA) along with accountability. This framework incorporates all security standards, procedures and controls, required to mitigate threats in the storage infrastructure environment. Confidentiality: Provides the required secrecy of information and ensures that only authorized users have access to data. This requires authentication of users who need to access information. Data in transit (data transmitted over cables) and data at rest (data residing on a primary storage, backup media, or in the archives) can be encrypted to maintain its confidentiality. In addition to restricting unauthorized users from accessing information, confidentiality also requires to implement traffic flow protection measures as part of the security protocol. These protection measures generally include hiding source and destination addresses, frequency of data being sent, and amount of data sent. Integrity: Ensures that the information is unaltered . Ensuring integrity requires detection and protection against unauthorized alteration or deletion of information. Ensuring integrity stipulate measures such as error detection and correction for both data and systems. Availability: This ensures that authorized users have reliable and timely access to systems, data and applications residing on these systems. Availability requires protection against unauthorized deletion of data and denial of service. Availability also implies that sufficient resources are available to provide a service. Accountability: Refers to accounting for all the events and operations that take place in the data center infrastructure. The accountability service maintains a log of events that can be audited or traced later for the purpose of security. EMC E10-001 Student Resource Guide. Module 14: Securing the Storage Infrastructure Question 10. What describes a landing zone in a disk drive? A. Area on which the read/write head rests B. Area where the read/write head lands to access data C. Area where the data is buffered before writing to platters D. Area where sector-specific information is stored on the disk Answer: A Explanation: Disk Drive Components The key components of a hard disk drive are platter, spindle, read-write head, actuator arm assembly, and controller board. I/O operations in a HDD is performed by rapidly moving the arm across the rotating flat platters coated with magnetic particles. Data is transferred between the disk controller and magnetic platters through the read-write (R/W) head which is attached to the arm. Data can be recorded and erased on magnetic platters any number of times. Platter: A typical HDD consists of one or more flat circular disks called platters. The data is recorded on these platters in binary codes (0s and 1s). The set of rotating platters is sealed in a case, called Head Disk Assembly (HDA). A platter is a rigid, round disk coated with magnetic material on both surfaces (top and bottom). The data is encoded by polarizing the magnetic area, or domains, of the disk surface. Data can be written to or read from both surfaces of the platter. The number of platters and the storage capacity of each platter determine the total capacity of the drive. Spindle: A spindle connects all the platters and is connected to a motor. The motor of the spindle rotates with a constant speed. The disk platter spins at a speed of several thousands of revolutions per minute (rpm). Common spindle speeds are 5,400 rpm, 7,200 rpm, 10,000 rpm, and 15,000 rpm. The speed of the platter is increasing with improvements in technology; although, the extent to which it can be improved is limited. Read/Write Head: Read/Write (R/W) heads, read and write data from or to platters. Drives have two R/W heads per platter, one for each surface of the platter. The R/W head changes the agnetic polarization on the surface of the platter when writing data. While reading data, the head detects the magnetic polarization on the surface of the platter. During reads and writes, the R/W head senses the magnetic polarization and never touches the surface of the platter. When the spindle is rotating, there is a microscopic air gap maintained between the R/W heads and the platters, known as the head flying height. This air gap is removed when the spindle stops rotating and the R/W head rests on a special area on the platter near the spindle. This area is called the landing zone . The landing zone is coated with a lubricant to reduce friction between the head and the platter. The logic on the disk drive ensures that heads are moved to the landing zone before they touch the surface. If the drive malfunctions and the R/W head accidentally touches the surface of the platter outside the landing zone, a head crash occurs. In a head crash, the magnetic coating on the platter is scratched and may cause damage to the R/W head. A head crash generally results in data loss. Actuator Arm Assembly: R/W heads are mounted on the actuator arm assembly, which positions the R/W head at the location on the platter where the data needs to be written or read. The R/W heads for all platters on a drive are attached to one actuator arm assembly and move across the platters simultaneously. Drive Controller Board: The controller is a printed circuit board, mounted at the bottom of a disk drive. It consists of a microprocessor, internal memory, circuitry, and firmware. The firmware controls the power to the spindle motor and the speed of the motor. It also manages the communication between the drive and the host. In addition, it controls the R/W operations by moving the actuator arm and switching between different R/W heads, and performs the optimization of data access. EMC E10-001 Student Resource Guide. Module 2: Data Center Environment
|
Question 1. In which Cloud deployment model would an organization see operational expenditures grow in proportion to capital expenditures? A. On-premise Private Cloud B. External Private Cloud C. Public Cloud D. Hybrid Cloud Answer: A Explanation: Question 2. What is the Cloud service model offered by EMC Mozy? A. Software-as-a-Service B. Platform-as-a-Service C. Infrastructure-as-a-Service D. Virtualization-as-a-Service Answer: A Explanation: Question 3. As an organization leverages more resources from Cloud service providers, which expense of the organization would be expected to grow larger? A. Power and energy B. Management C. Infrastructure D. Operational Answer: D Explanation: Question 4. What best describes the "metered service" characteristic of Cloud computing? A. Consumers are billed based on resource usage. B. Services are provisioned based on their demand. C. Metering services are created when required from the resource pools. D. Metering services can scale up and down based on resource usage. Answer: A Explanation: Question 5. Which Cloud service model allows the user to run any operating system and application? A. Platform-as-a-Service B. Infrastructure-as-a-Service C. Software-as-a-Service D. IT-as-a-Service Answer: B Explanation: Question 6. Which Cloud service model is most appropriate for application development? A. Infrastructure-as-a-Service B. Platform-as-a-Service C. Software-as-a-Service D. IT-as-a-Service Answer: B Explanation: Question 7. An organization runs a proprietary operating system for its custom applications. System performance has been declining at an increasing rate. They would like to leverage a Cloud solution to address their problem. Which Cloud service model would be appropriate for them? A. Infrastructure-as-a-Service B. Platform-as-a-Service C. Software-as-a-Service D. IT-as-a-Service Answer: A Explanation: Question 8. Which problem is addressed by RAID technologies? A. Data corruption B. Data backup C. Data loss D. Data security Answer: C Explanation: Question 9. Which is a benefit of server clustering? A. High CPU utilization B. High availability C. High memory utilization D. High security Answer: B Explanation: Question 10. Which RAID type uses parity to protect against data loss? A. RAID 3 B. RAID 0 C. RAID 1 D. Nested Answer: A Explanation:
|
Question 1. Which statement defines retention period? A. Amount of time available for restoring a particular version of a backup dataset B. Amount of time available for overwriting a volume containing backups C. Period of time in which a backup must be restored D. Amount of time allocated for full system recovery Answer: A Explanation: Question 2. Which type of backup only copies the files that have changed since the last full backup? A. Cumulative B. Full C. Incremental D. Synthetic full Answer: A Explanation: Question 3. Which type of backup should be used to create a backup copy offline without disrupting I/O operations on a production volume? A. Cumulative backup B. Incremental backup C. Full backup D. Synthetic full backup Answer: D Explanation: Question 4. What is the interval of time between the creation and expiration of the backup called? A. Retention period B. Recovery point objective (RPO) C. Recovery time objective (RTO) D. Backup window Answer: A Explanation: Question 5. What is the primary reason for having disaster recovery backups? A. To restore data from an alternate site due to data loss at a primary site B. To restore data when data loss or logical corruptions occur during routine processing C. To restore data that was archived for regulatory compliance D. To restore data when data loss occurs due to minor hardware component failures Answer: A Explanation: Question 6. What is recovery point objective? A. Maximum allowable time to fully recover an application B. Actual time that it takes to recover all data C. Amount of data loss that is acceptable by the business D. Length of time that backups are kept for recovery purposes Answer: C Explanation: Question 7. A customer has a requirement to restore operations within two hours after a disaster. What is this time period called? A. Recovery time objective (RTO) B. Retention period C. Recovery point objective (RPO) D. Backup window Answer: A Explanation: Question 8. A full backup of a file system is performed once a week on Saturday and cumulative backups are performed on all other days. Backups start at 20:00 with a two-hour window. Data on the file system changes every day. How many backups are required to perform a full system restore as of Friday morning? A. 2 B. 6 C. 1 D. 7 Answer: A Explanation: Question 9. A customer is moving data from a backup disk to tape, which will later will be stored offsite. What is this process called? A. Cloning B. Staging C. Aging D. Mirroring Answer: B Explanation: Question 10. You are planning the staging policy for disk-to-offsite tape backup media. In addition to available disk space, which factor is most significant when determining how long to keep the backup data on disk? A. Length of time when most restore requests are expected to occur B. Location of offsite storage C. Cost of shipping and storing tapes D. Tape capacity Answer: A Explanation:
|
Question 1. You are using MADlib for Linear Regression analysis. Which value does the statement return? SELECT (linregr(depvar, indepvar)).r2 FROM zeta1; A. Goodness of fit B. Coefficients C. Standard error D. P-value Answer: A Explanation: Question 2. Which data asset is an example of quasi-structured data? A. Webserver log B. XML data file C. Database table D. News article Answer: A Explanation: Question 3. What would be considered "Big Data"? A. An OLAP Cube containing customer demographic information about 100,000,000 customers B. Daily Log files from a web server that receives 100,000 hits per minute C. Aggregated statistical data stored in a relational database table D. Spreadsheets containing monthly sales data for a Global 100 corporation Answer: B Explanation: Question 4. A data scientist plans to classify the sentiment polarity of 10, 000 product reviews collected from the Internet. What is the most appropriate model to use? Suppose labeled training data is available. A. Naïve Bayesian classifier B. Linear regression C. Logistic regression D. K-means clustering Answer: A Explanation: Question 5. In which lifecycle stage are test and training data sets created? A. Model building B. Model planning C. Discovery D. Data preparation Answer: A Explanation: Question 6. When creating a presentation for a technical audience, what is the main objective? A. Show that you met the project goals B. Show how you met the project goals C. Show if the model will meet the SLA D. Show the technique to be used in the production environment Answer: B Explanation: Question 7. Your company has 3 different sales teams. Each team's sales manager has developed incentive offers to increase the size of each sales transaction. Any sales manager whose incentive program can be shown to increase the size of the average sales transaction will receive a bonus. Data are available for the number and average sale amount for transactions offering one of the incentives as well as transactions offering no incentive. The VP of Sales has asked you to determine analytically if any of the incentive programs has resulted in a demonstrable increase in the average sale amount. Which analytical technique would be appropriate in this situation? A. One-way ANOVA B. Multi-way ANOVA C. Student's t-test D. Wilcoxson Rank Sum Test Answer: A Explanation: Question 8. In data visualization, what is used to focus the audience on a key part of a chart? A. Emphasis colors B. Detailed text C. Pastel colors D. A data table Answer: A Explanation: Question 9. Which word or phrase completes the statement? Data-ink ratio is to data visualization as __________ . A. Confusion matrix is to classifier B. Data scientist is to big data C. Seasonality is to ARIMA D. K-means is to Naive Bayes Answer: A Explanation: Question 10. Consider a database with 4 transactions: Transaction 1: {cheese, bread, milk} Transaction 2: {soda, bread, milk} Transaction 3: {cheese, bread} Transaction 4: {cheese, soda, juice} You decide to run the association rules algorithm where minimum support is 50%. Which rule has a confidence at least 50%? A. {cheese} => {bread} B. {juice} => {cheese} C. {milk} => {soda} D. {soda} => {milk} Answer: A Explanation:
|
Question 1. What is the first phase of the Virtual Data Center Design Process? A. Evaluate technology options B. Create plan C. Perform initial analysis D. Gather data Answer: D Explanation: Question 2. What is the key business goal when consolidating by business application? A. Virtualize the compute environment for efficiency B. Identify security gaps and increase security measures C. Reduce footprint by decreasing energy and space requirements D. Implement converged network technology for performance Answer: A Explanation: Question 3. A large company with multiple heterogeneous arrays would like to take advantage of the performance simplified management benefits of storage virtualization. They have a data center transformation pain that includes producing power and cooling at a high priority. Which storage virtualization method would meet their requirements? A. Network-based storage tiering B. Vertical storage tiering C. Server-based storage tiering D. Horizontal storage tiering Answer: B Explanation: Question 4. When using logging to maintain server security, which is the key element for intrusion detection and should be contained the server logs? A. Vulnerability scan that identifies susceptible services that are active on the server. B. Results of penetration testing through uncover problem probable weaknesses. C. An entry for each application transaction with details of the organization. D. Alerts to suspicious activities that require further investigation. Answer: D Explanation: Question 5. What is a key VDC and cloud planning consideration for IT governance? A. Change management B. Regulations C. Separation of duties D. Creating trust zones Answer: C Explanation: Question 6. A midsize company has deployed centralized storage and is currently planning to virtualize their servers. They have considered their application into Tiers, with Tier 1 application requiring the same service and performance levels of the current servers. They have purchased new, high capacity servers for the virtualized environment and are planning to consolidate several physical servers into a single hypervisor. They are know determining the bandwidth requirements of the application in order to purchase the current number of FCME CNAs for each server. The results of their analysis for Tier 1 application are as follows: Average SAN Bandwidth: 3 Gb/s Average LAN Bandwidth: 2 Gb/s What is the minimum number of CNAs they would need to install an each server to meet the bandwidth required for the Tier 1 application while providing CAN redundancy and high availability? A. 1 B. 2 C. 3 D. 4 Answer: B Explanation: Question 7. What are three attributes of a cloud services design? A. Web-based APIs, shared resources, minimal capital expenditures B. Static service, fixed priced access, improved economics C. Accessed via a web portal, self-service, throttled access D. Dedicated resources, usage-based pricing, web-based APIs Answer: A Explanation: Question 8. What would you identify as a business application in applying IT as a Service to IT processions? A. Defined workflow request processes B. Funded as a cost center C. Virtual data center best practices D. SLA-driven management Answer: A Explanation: Question 9. A development organization uses a PaaS service from a public cloud to develop and test an application. Once sending and verification are complete, the development team discovers that the cloud services uses proprietary software in the PaaS clustering mailing and deployment of the application within their production data center imposition without significant application records. What this type of lock-in called? A. Geographical lock-in B. Technology lock-in C. Cloud lock-in D. Vendor lock-in Answer: D Explanation: Question 10. When applying compliance principles to your company’s VDC and cloud architectures, how should you approach your information life cycle management strategy? A. Data of reset B. Archival and offsite storage C. Production and backup D. Inception to completion Answer: B Explanation:
|
Question 1. Which command is used to assign root privileges to an existing user? A. /nas/sbin/enableRootToUser B. /nas/sbin/addRootIdToUser C. /nas/sbin/switchToRoot D. /nas/sbin/enableRootID Answer: B Explanation: Question 2. Which Unisphere storage domain role will limit a user to the administration of file system checkpoints, LUN mirrors, and Replication Manager tasks? A. Data recovery B. Data protection C. Administrator D. NAS administrator Answer: A Explanation: Question 3. In a VNX system, which feature manages access to specific management clients? A. IP address filtering B. Auditing C. Public key infrastructure D. User privileges Answer: A Explanation: Question 4. Which LDAP username format is correct for CLI authentication on a VNX system? A.\ B. .FQDN C. @FQDN D. Answer: C Explanation: Question 5. What is the maximum number of LDAP service connections available when configuring LDAP for VNX Block storage systems? A. 1 B. 2 C. 4 D. 8 Answer: B Explanation: Question 6. What is the default port used for secure LDAP (LDAPS) communications on a VNX system? A. 389 B. 443 C. 563 D. 636 Answer: D Explanation: Question 7. In which file are the default audit events defined? A. /etc/auditd.conf B. /nas/audit/audit.rules C. /nas/etc/audit.rules D. /etc/audit/audit.rules Answer: D Explanation: Question 8. In which directory are VNX audit logs located? A. /celerra/audit B. /nas/var/log C. /nas/log D. /var/log Answer: A Explanation: Question 9. What is the length of RSA keys used to encrypt and decrypt network traffic in a VNX environment? A. 2048 bits B. 1024 bits C. 2048 bytes D. 1024 bytes Answer: A Explanation: Question 10. Which authority (ies) signs certificates generated for Data Movers? A. Data Movers B. External CA, Control Station C. Management server D. Data Movers, management server Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.