deck1 Flashcards
What is an accurate statement about Governance? A. Restrict access to certain users B. Ensure removal of security risks C. Authorize policy-making decisions D. Demonstrate adherence to polices
C. Authorize policy-making decisions
An Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port4 occurs as follows: • Monday = 8 PM to 9 PM • Wednesday 7 PM to 9 PM • Thursday = 6 AM to 9 AM • Saturday = 4 PM to 7 PM What is the MTTR of Port 4? A. 2 hours B. 3 hours C. 28 hours D. 38 hours
A. 2 hours
What accurately describes an iSCSI HBA?
A. Performs both iSCSI and TCP/IP processing
B. Requires CPU cycles for TCP/IP processing
C. Requires a software adapter with built-in functionality
D. Enables transmission of data through iSCSI tunneling
A. Performs both iSCSI and TCP/IP processing
When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments.
What is the maximum number of disk drive failures against which data is protected by the configuration?
A. 3
B. 4
C. 8
D. 12
A. 3
What is a key advantage of cloning a virtual machine (VM)?
A. Ability to run new VMs simultaneously with the same IP address.
B. Reduces the time required to create multiple copies of a VM.
C. Improves the performance of an existing VM and new VMs.
D. Eliminates the need to create multiple snapshots for a VM.
B. Reduces the time required to create multiple copies of a VM.
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?
A. Role-based
B. Profile-based
C. Signature-based
D. Anomaly-based
C. Signature-based
In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object?
A. From the metadata of an object.
B. By using the logical address of the memory space.
C. From the binary representation of an object.
D. By using the physical address of the storage device.
D. By using the physical address of the storage device.
What is a benefit of link aggregation?
A. Optimizes fabric performance by distributing network traffic across ISLs.
B. Improves ISL utilization by increasing the network traffic on a specific ISL.
C. Yields a higher throughput by combining two parallel ISLs into a single physical ISL.
D. Saves bandwidth by restricting traffic to a specific potentially congested ISL.
A. Optimizes fabric performance by distributing network traffic across ISLs.
In a compute-based storage area network (SAN), what is a function of the metadata manager?
A. Holds cluster-wide mapping information and load balancing in a compute-based SAN.
B. Performs the I/O operations on the local storage of a compute system as requested by a client.
C. Provides an interface to the software-defined storage controller.
D. Controls all data read and write operations in a compute-based SAN.
A. Holds cluster-wide mapping information and load balancing in a compute-based SAN.
Why is it important for organizations to store, protect, and manage their data?
A. Reduce the amount of data to be replicated, migrated, and backed up.
B. Rapidly develop and deploy modern applications for business improvement.
C. Develop new business opportunities by leveraging existing data.
D. Reduce the complexity in managing the data center environment.
C. Develop new business opportunities by leveraging existing data.
A Fibre Channel switch has eight ports and all ports must be operational 24x7. However, a failure of Port 5 occurs on a particular week as follows: • Monday = 11 AM to 12 PM • Thursday = 7 AM to 11 AM • Saturday = 11 AM to 1 PM What is the availability of Port 5 in that week? A. 93% B. 94.1% C. 95.8% D. 97%
C. 95.8%
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities? A. Data link B. Presentation C. Session D. Application
A. Data link
What is an accurate statement about variable prefetching?
A. Many blocks that have recently been written to storage by the compute system are retrieved and placed in cache.
B. Many non-contiguous blocks that are not currently required can be retrieved from cache in advance.
C. Storage system prefetches data in multiples of the original I/O request size from the compute system.
D. Storage system prefetches many non-contiguous blocks of data, with varied sizes, from cache.
D. Storage system prefetches many non-contiguous blocks of data, with varied sizes, from cache.
Which Dell EMC product is a hyper-scale storage infrastructure that provides universal accessibility with support for object and HDFS? A. ViPR Controller B. PowerMax C. Isilon D. Elastic Cloud Storage
D. Elastic Cloud Storage
Which cloud deployment model allows provisioning of a cloud infrastructure only for use by a single organization having multiple consumers? A. Public cloud B. Multi-cloud C. Hybrid cloud D. Private cloud
D. Private cloud
A company plans to deploy a new application in their environment. The new application requires 2 TB of storage space. During peak workloads, the application is
expected to generate 4500 IOPS with a typical I/O size of 4 KB. The capacity of each available disk drive is 250 GB. In addition, the maximum number of IOPS a
drive can perform at with a 70% utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application’s capacity and performance requirements for a RAID 0 configuration?
A. 8
B. 40
C. 50
D. 70
D. 70
Which technology decouples the OS, applications, and user state from a physical compute system? A. Application virtualization B. Storage virtualization C. Thin client virtualization D. Desktop virtualization
D. Desktop virtualization
What is the goal of a business continuity solution?
A. Reduce the amount of investment in protecting an organization’s business-related data.
B. Avoid a disaster in a data protection environment to control the loss of data.
C. Ensure information availability that is required to conduct vital business operations.
D. Eliminate security threats in a data protection environment for continuous access to data.
C. Ensure information availability that is required to conduct vital business operations.
QUESTION 22
What is a function of the metadata service in an object-based storage device (OSD)?
A. Generates the file system namespace from the file contents.
B. Manages both physical and logical disks on which the user data is stored.
C. Manages the storage space for all remote clients.
D. Maintains the object IDs and file system namespace mappings.
D. Maintains the object IDs and file system namespace mappings.
What accurately describes virtual SAN (VSAN) trunking?
A. Reduces the utilization of ISLs by removing all the ISLs configured between the FC switches.
B. Increases the number of E_ports used for the ISLs to transfer multiple VSAN traffic.
C. Increases the complexity of managing the FC SAN with an increase in the number of ISLs.
D. Reduces the number of ISLs between switches that are configured with multiple VSANs.
D. Reduces the number of ISLs between switches that are configured with multiple VSANs.