CIS Review Flashcards
What is a key performance consideration for migrating operations to the Cloud?
Availability of target based de-duplication capability
XXResource utilization matrix
Latency of the network between consumer and service provider
Availability of different storage performance tiers
Which Cloud service model includes the complete stack provided as a service, including all the layers of the service model?
IT-as-a-Service
Platform-as-a-Service
XXXSoftware-as-a-Service
Infrastructure-as-a-Service
Which is a best practice for selecting drives for a thin pool?
Drives should be supplied by the same vendor
XXDrives should run at the same RPM
Drive speed should be 15000 rpm or higher
The pool should be created from mix of FC, SATA, and Flash drives
Which statement is true about User State virtualization?
XXXUser States are preserved as temporary files
Operating system refreshes and migrations become easier to deploy
Common User States are used for all the desktops
Templates are used to create User States
Which is a benefit of data striping in RAID?
Efficient allocation of random reads and writes
XXXIndependent disks allow multiple reads and writes to take place simultaneously
Improved security by creating multiple identical copies of data
Efficient allocation of sequential reads and writes
An administrator is concerned about Denial of Service attacks on their virtual machines (VMs). What should be your recommendation to reduce the impact of this type of attack?
Deploy role-based access control on the VMs
Harden all VMs
Perform regular hypervisor updates
XXXXLimit the resource consumption of a VM
Which is responsible for creating Cloud services
Cloud deployment
User access management
XXXXUnified management
Virtual infrastructure management
Which is a feature of EMC PowerPath/VE?
Storm Control
Integrated Traffic Steering
Traffic Shaping
XXXDynamic Load Balancing
Which mechanism provides protection against NIC failure?
NIC trunking
Port grouping
XXXNIC teaming
VLAN tagging
Which statement is true about a Trunk link in a VLAN environment?
It is a link between two virtual switches that carries tagged Ethernet frames
XXXXIt is a single network connection that carries multiple VLAN traffic
It is a dedicated link for transferring traffic belonging to a single VLAN
It transfers untagged Ethernet frames from different VLANs
What is the correct sequence of steps for performing a hot conversion from a physical machine to a virtual machine (VM)?
virtual machine (VM)
2413
The converter server creates a VM on the destination machine
1234
The agent synchronizes the data and installs the required drivers to allow the OS to boot from the VM and personalize the VM
1234
The converter server installs the agent on the source physical machine
1234
The agent clones the physical disk of the source machine to the virtual disk of the destination VM
Which is a benefit of the Public Cloud?
Simplification of regulatory compliance
Transparent Provider-to-Provider migrations
XXXXSelf-service resource requests
Reduced OPEX (Operational Expenditure
How does a domain name server balance client traffic across a cluster of servers?
By translating the domain name to the IP address of higher throughput servers
XXXXBy mapping the domain name to the IP address of servers in round-robin fashion
By mapping the domain name to the IP address of a load balancing device
By sending client traffic to each server that uses a driver to filter client traffic
A Cloud service provider is considering offering both a SaaS and a PaaS service to their customers.
Would their security concerns about virtualization differ if they were to choose only one of these services, and why?
Yes; SaaS implementations require an API to encrypt data at rest; PaaS implementations do not
XXXXXNo; SaaS and PaaS implementations both require that the customer is responsible for data security
No; SaaS and PaaS implementations both require the same attention to virtualization security
Yes; PaaS implementations require an API for authenticating users with external identity systems; SaaS implementations do not
Which issues are addressed by RAID technologies?
Performance and data backup
Data corruption and backup
Loss of data due to disk drive hardware failures and data corruption
XXXXLoss of data due to disk drive hardware failure and performance
An organization performs full backup of its data every week. They are experiencing long backup windows and huge network bandwidth consumption during the backup process.
What should the organization do?
Use backup to tape
Change the backup software
Use target-based deduplication
XXXUse source-based deduplication
What enables a LUN that has more capacity than is physically allocated to be presented to a compute system?
Raw Device Mapping
XXXXVirtual provisioning
Global namespace mapping
Automated storage tiering
During which phase of the Cloud migration process should it be verified that an application behaves as expected in the Cloud?
Optimization
XXXProof of Concept
Assessment
Automation
Which data center management activity helps ensure business continuity by eliminating single points of failure?
XXXXPerformance management
Availability management
Security management
Capacity management