|
thanks for your information.. itcertkeys is rocking site thanks
|
Question 1. When data is written to a SnapView source LUN, at what point are the data chunks saved to the Reserved LUN pool? A. During synchronization B. Every time data is changed on the source C. Every time write cache is flushed D. When source data is changed for the first time Answer: D Question 2. What are the primary goals of an optimization engagement? A. Avoid future problems, reduce complexity, enable high availability B. Fix existing problems, avoid future problems, reduce costs C. Fix existing problems, improve utilization, increase efficiency D. Reduce costs, reduce complexity, increase efficiency Answer: D Question 3. What does Inter-Switch Link trunking do? A. Allows ports on the same blade to be used for ISL B. Enables ISL between switches to reach up to 200 km distances C. Prohibits a port from becoming an E_Port for fabric security D. Aggregates the bandwidth of multiple ISLs Answer: D Question 4. After a Data Mover failover, how is the failback operation performed? A. Automatically B. Data Mover failover is not supported C. Manually D. Recovery is not needed until another failure occurs Answer: C Question 5. A customer implemented BCVs with mirrors for use with the most critical business volumes. The standard volumes were established with the BCVs at the start of the day, but later in the day the customer discovered data corruption. Which action would enable a restore from uncorrupted BCV volumes? A. Differential Split B. Instant Split C. Protected Restore D. Reverse Split Answer: D Question 6. You are giving a presentation to a customer about EMC virtualization products. They specifically ask about file storage virtualization. Which EMC product enables file storage virtualization using industry-standard protocols and mechanisms in a heterogeneous environment? A. Invista B. Rainfinity C. RecoverPoint D. Vmware Answer: B Question 7. An EMC ControlCenter customer is a United States Department of Defense contractor. The contractor needs to show that there is controlled user access to devices and to the modification of these devices. This will allow the contractor to provide proof of compliance and accountability. Which security feature of EMC ControlCenter should you discuss with the contractor to satisfy this requirement? A. Data collection policy (DCP) B. EMC Secure Remote Support (ESRS) Gateway C. Role-based access control (RBAC) D. Secure Socket Layer (SSL) Answer: C Question 8. Your customer is experiencing write performance problems on a RAID 5 LUN used for backup todisk on its CX3 array. The LUN has been placed on ATA drives. The customer has determined that it would like the LUN on Fibre Channel drives instead. The customer has requested you provide the best option to alleviate this performance problem, keeping downtime to a minimum. What action would you recommend? A. Create a new LUN on fibre drives and restore the data from tape to the new LUN. B. Implement a newer array and use MirrorView to migrate the data. C. Use Dynamic Virtual LUN functionality to move the LUN from ATA to fibre drives. D. Use SnapView to make a clone of the LUN on fibre drives and assign the LUN to the appropriate storage group. Answer: C Question 9. A customer has a CX3-80 for Exchange and a critical OLTP database application. Over the last month, during monthly batch processing, users complain of slow response times. Which solution will you recommend to solve this issue? A. Access Logix B. Performance Manager C. Navisphere Quality of Service Manager D. StorageScope Answer: C Question 10. For reporting purposes, which source provides data for the ETL process to populate the StorageScope repository? A. EMC ControlCenter Repository B. Host Agents C. Master Agents D. Store Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.