Miscellaneous Practice Questions Flashcards

1
Q

What is true about an OSD storage system?

A

Objects contain user data, related metadata, and user defined attributes of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of a control plane in the SDDC?

A

Performs resource provisioning and provides the programming logic and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which functions align with each layer of the FC Protocol Stack using the following order: FC-4, FC-2, FC-1, and FC-0?

A

Mapping interface
Common services
Encode and decode
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What set of factors are used to calculate the disk service time of a hard disk drive?

A

Seek time -
Rotational latency -
Data transfer rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What restricts a tenant’s access to a specific group of object buckets in a software-defined storage environment?

A

Namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What accurately describes the seek time of a disk drive?

A

Time taken to position the read/write head over the correct track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an accurate statement about a virtual tape library?

A

Legacy backup software can be used without additional modules or changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a company has experienced a passive attack on its IT infrastructure, how is the company’s security impacted?

A

Information privacy is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the “variability” characteristic of big data signify?

A

Importance in obtaining the right information from data at all possible contexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link. Which security mechanism should the administrator use?

A

Port type locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an accurate statement about a fabric-provided MAC address (FPMA) used in an FCoE SAN?

A

FCoE switches provide MAC addresses to VN_Ports during node login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an advantage of performing capacity monitoring in a storage infrastructure environment?

A

Proactively preventing service outages due to the lack of storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an accurate statement about the function of an archiving server?

A

Enables the ability to configure policies for archiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What information is available in a capacity planning report for storage infrastructure?

A

current and historic information about the utilization of storage, file systems, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What accurately describes hypervisor-based continuous data protection?

A

Virtual appliance is running on a hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization is planning to secure the connection between the data center and cloud while performing data backup and replication. Which security control mechanism will help organization to achieve the desired security?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What functionality does the control layer provide in a software-defined networking architecture?

A

Extracts network information from the data plane and sends it to the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which storage management function ensures that the services and service levels are delivered per SLAs?

A

Operation management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the functionality of the application server in a Mobile Device Management?

A

Perform administration and management of all managed devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which file system provides a streaming interface using the MapReduce framework?

A

HDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An organization is interested in a cloud service that provides middleware, development tools, and database management systems for application development and deployment.
Which cloud service model meets these requirements?

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which standard provides FCoE with a lossless Ethernet network?

A

Data Center Bridging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol?

A

Common Internet File System (CIFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An organization wants to replicate data over a public network to a cloud.
Which security control mechanism helps to secure the data during replication?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of technology is used in SSD devices to provide non-volatile data storage?

A

Flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which layer of the OSI reference model is responsible for logical addressing and routing?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a benefit of migrating to a modern data center?

A

Reduce administration complexity and application downtime to consistently meet SLAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which infrastructure building process allows organizations to repurpose existing infrastructure components and provides cost benefits?

A

Brownfield

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a function of VM hardening?

A

Change the default configuration of the VM to enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the lowest to highest order of I/O performance among there storage devices?

A

SATA–>SSD–>SCM–>DRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What describes an incident in a storage infrastructure?

A

Any action that may impact the functionality of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a benefit of including a Defense-in-depth strategy as part of the data center security strategy?

A

Reduce the scope of an information security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

If a packet is sent to an IPv6 address and many devices receive the packet, what is this type of traffic?

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a benefit of unified storage systems?

A

Increases the overall storage capacity utilization with no stranded capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the result of increasing the number of FC switches in a full mesh topology?

A

Reduces switch ports available for node connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the key advantage of cloning a VM?

A

Saves time when creating multiple identical copies of a VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is true about storage system-based replication?

A

Snapshots are immediately accessible after the replication session activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which technology allows automation of sensors and devices to share and process information?

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a feature of 5G technology?

A

Higher connectivity density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is true about Storage Class Memory (SCM)?

A

SCM is slower than DRAM but read and write speeds are faster than flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the maximum number of VLANs that can be supported with one VLAN tag field?

A

4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In continuous data protection, what does the amount of journal space determine?

A

How far back the data can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is an advantage of performing incremental backups compared to cumulative backups for the same data?

A

Storage capacity needed for backups is significantly reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which three parameters define information availability in a modern data center environment?

A

Reliability -
Accessibility -
Timeliness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What triggers an appropriate workflow upon receiving a service provisioning or management request?

A

Orchestrated operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What statement describes machine learning?

A

Applies an algorithm to large amounts of data for pattern discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a benefit of using a Scale-Out NAS system vs. general purpose file servers?

A

File system grows dynamically as nodes are added to the NAS cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which block storage device protocol achieves the optimal cost-effective balance between I/O performance and high storage capacity for midrange storage applications?

A

SAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which FCIP protocol stack layer supports FC frame encapsulation?

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An organization wants to replicate their data by extending the local network across a public network. Prior to implementing replication, they need to secure the network.Which security control mechanism is recommended?

A

Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which performance feature does an intelligent storage system provide?

A

Automated storage tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What Smart City municipal function is optimized by IoT?

A

City transportation infrastructure maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a driver for implementing end-to-end NVMe-oF?

A

To maximize speed of SSD storage distributed across an FC SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the functionality of the lock in a cyber recovery process?

A

Restricts overwriting of data to meet both corporate governance and compliance standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a benefit of differential backup over incremental backup?

A

Differential backup can expand to contain more data than an incremental backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What set of components are part of a block-based storage array controller?

A

Front-end ports -
Back-end ports -
Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What method does FCIP use to transport Fibre Channel SAN data?

A

FCIP encapsulates and tunnels FC SAN data over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In a software-defined networking architecture, which layer is responsible for handling data packet forwarding or dropping?

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What type of backup method allows a client to be installed in a VM that sends the data to the backup device?

A

Agent-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a function of a continuous data protection (CDP) appliance?

A

Runs data protection software and manages replications within and across data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

An organization has two data centers separated by a distance of 1600 km. They want to replicate between these data centers for disaster recovery purposes. They are concerned that this will impact application response time.
Which solution will address this concern?

A

Asynchronous remote replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is a key function of the orchestration layer in a modern data center architecture?

A

Allows automated arrangement, coordination, and management of resource provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which VM file is used to keep a record of the VM’s activity and is often used for troubleshooting?

A

Log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the purpose of data archiving?

A

Transfers fixed content that is no longer actively accessed to archive storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What provides flow control in FCIP?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What occurs during a Shared Technology Vulnerability threat?

A

An attacker exploits the weaknesses of tools used to enable multi-tenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

An organization wants to prevent incidents which share common symptoms or root causes from reoccurring. They also want to minimize the adverse impact of incidents that cannot be prevented. Which management function addresses the organization’s requirements?

A

Problem management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is an accurate statement about Governance?

A

Restrict access to certain users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object?

A

From the binary representation of an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

In a compute-based storage area network (SAN), what is a function of the metadata manager?

A

Holds cluster-wide mapping information and load balancing in a compute-based SAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Why is it important for organizations to store, protect, and manage their data?

A

Develop new business opportunities by leveraging existing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is an accurate statement about variable prefetching?

A

Storage system prefetches data in multiples of the original I/O request size from the compute system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What accurately describes virtual SAN (VSAN) trunking?

A

Reduces the number of ISLs between switches that are configured with multiple VSANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What does an area ID represent in Fibre Channel (FC) addressing?

A

Group of switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which functionality does a Control layer provide in a software-defined networking architecture?

A

Making decisions on how the packets should be forwarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which technology combines NAND flash memory into a hard disk drive and is a single, integrated device incorporating both types of storage?

A

Solid-state hybrid drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which Internet of Things (IoT) component is responsible for the automation of operations by applying a force based on the dynamics of data?

A

Actuator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

In an FCoE switch, which function is provided by the Fibre Channel Forwarder (FCF)?

A

Communication bridge between CEE and FC networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Why are organizations moving towards a modern data center implementation?

A

Ability to be agile, operate in real time, and develop intelligent products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a key objective to performing continuous replication?

A

Reduce the RPO to near-zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is an advantage of implementing file-level virtualization in a data center environment?

A

Provides non-disruptive file mobility across file servers or NAS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is an example of a Performance Management task?

A

Selecting an appropriate RAID type for a storage pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which key service management function modifies and aligns services according to consumer needs in the cloud environment?

A

Service portfolio management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which is true about a type 2 hypervisor?

A

Installed as an application on an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

When using a bridged iSCSI connection, which components facilitate communication between gateways?

A

Compute system with iSCSI ports and the storage system with only FC ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is an accurate statement about stretched VLANs?

A

Supports migration of VMs across sites without the need to change their network configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What accurately describes a software-defined architecture?

A

Provides a unified management platform for centralized monitoring and administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which technology uses the concept that real-life objects can independently share and process information with minimal human interaction?

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Match the virtual machine (VM) file with its description.

A

Configuration file: Stores information, such as VM name, BIOS information, guest OS type, memory size

Virtual disk file: Stores the contents of the VM’s disk drive

Memory state file: Stores the memory contents of a VM in a suspended state

Snapshot file: Stores the VM settings and virtual disk of a VM

Log file: Keeps a log of the VM’s activity and is used in troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which management function involves configuring LUN masking to restrict hosts from accessing a specific LUN in a data center environment?

A

Security Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which Converged Network Adapter (CNA) component encapsulates Fibre Channel (FC) frames into Ethernet frames?

A

FCoE ASIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which file system uses only UNIX systems for a client-server application protocol and Remote Procedure Call (RPC) for file sharing?

A

Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which state change notifications (SCNs) are issued by an iSNS server to the registered devices?

A

Network events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which layer contains services that define network behavior through policies and resource requirements in a software-defined networking architecture?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

In a recovery operation, what is the correct sequence of steps after the backup client sends a restore request to the backup server?

A

Backup client requests backup server for data restore
(2) Backup server scans backup catalog to identify data to be restored and the client that will receive data
(3) Backup server instructs storage node to load backup media in the backup device
(4) Data is then read and sent to the backup client
(5) Storage node sends restore metadata to the backup server
(6) Backup server updates the backup catalog

97
Q

Which compute system component enables dynamic extension of file system capacity and efficient storage management?

A

Logical Volume Manager

98
Q

A server administrator wants to transfer files between a workstation and a server. It needs to be as simple as possible, without concern for security or advanced functionality.
Which is the optimal protocol to choose?

A

TFTP

99
Q

In a Fibre Channel (FC) protocol stack, what is the function of the FC-2 layer?

A

Provides FC addressing, structure, and organization of data

100
Q

Which functionality is provided by a process login in a Fibre Channel (FC) SAN environment?

A

Exchange ULP-related parameters between two N_ports

101
Q

What happens when the size of a write I/O request exceeds the configured write aside size in a block-based storage system?

A

Cache is bypassed and I/O is written directly to storage account

102
Q

What is an impact of a Denial-of-Service attack?

A

Computing resources are exhausted and made unavailable to users

103
Q

What is the objective of security control?

A

Minimize the attack surfaces and minimize the work factors

104
Q

In an SDS environment, which protocol supports the resource-oriented architecture for the development of scalable and lightweight web applications while adhering to a set of constraints?

A

REST

105
Q

What is an accurate statement about Storage Class Memory (SCM)?

A

SCM can be addressed at the bit or word level

106
Q

A customer requires a solution that allows data in RAM to be retained in case of power loss.
Which technology should be used?

A

NVDIMM

107
Q

Match the characteristics of big data with their respective descriptions.

A

Variability: Constant change in the meaning of data
Variety: Diversity in the formats and types of data
Veracity: Reliability and verifiability of the data
Velocity: Rate at which data produces and changes

108
Q

Which modern data center characteristic helps in improving business agility by automated arrangement and coordination of various component functions that is based on a predefined workflow?

A

Orchestrated management

109
Q

Identify the service of cloud computing in which the resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.

A

Measured services

110
Q

Identify what the process is called when the provider’s computing resources are put together to serve multiple consumers using a multitenant model. Uses different physical and virtual resources dynamically assigned and reassigned according to consumer demand.

A

Resource pooling

111
Q

What is a characteristic of block data storage?

A

Data bytes written to disk devices are stored in blocks of a consistent size.

112
Q

Which one of the following is characteristic of RAID 5?

A

Distributed parity

113
Q

What is a deficiency of using general-purpose servers for network file sharing?

A

File system incompatibilities when sharing files with clients that use different operating systems

114
Q

Benefits of VSAN

A

Online expansion of virtual volumes.
Non-disruptive data migration.

115
Q

Membership is based on assigning a switch port to the VLAN.

A

Physical Layer 1

116
Q

Membership based on the unique Ethernet MAC address of a host NIC port.

A

Data Link Layer 2

117
Q

Membership is based on the network address portion of the IP address.

A

Network Layer 3

118
Q

Membership is based on a particular application such as File Transport Protocol (FTP) or Telnet.

A

Application Layer 7

119
Q

Which fault tolerance mechanism provides space-optimal data redundancy to prevent data loss against multiple disk drive failures?

A

Erasure Coding

120
Q

Which fault tolerance mechanism enables a compute system to use multiple paths for transferring data to a LUN.?

A

Multipathing

121
Q

Which fault tolerance mechanism automatically replaces a failed drive with a spare drive to protect against data loss?

A

Dynamic Disk Sparing

122
Q

What is the benefit of implementing source-based deduplication?

A

Reduces the amount of data sent over the network.

123
Q

What determines the portion of an IP addresses used to indicate the network or host address?

A

A subnet mask

124
Q

What are the two DIY approaches and explain each of them?

A

-Greenfield method: new environment from scratch, “new grass”
-Brownfield method: repurposing old HW, updating & upgrading as needed, “old grass”

125
Q

What are the components of an ISS?

A

Storage and Controller

126
Q

What is a “sector” in a HDD?

A

a chunk of data

127
Q

Name the different levels of storage Tiering from top to bottom?

A

-Tier 0: DRAM
-Tier 1: SCM
-Tier 2: SSDs
-Tier 3: SATA

128
Q

What is an attribute of an OSD gateway?

A

Presents file and block-based storage interfaces to applications

129
Q

Main purpose of FC Address?

A

routing data through the fabric

130
Q

Which characteristic describes an FC switch?

A

Each node has a dedicated communication path.

131
Q

What is a benefit of implementing VSANs?

A

Improves network security

132
Q

What is a purpose of a chargeback report?

A

. Reports resource consumption per business unit

133
Q

Which host-based security attribute supports audit, multifactor authentication, and IP address filtering?

A

Hypervisor hardening

134
Q

What is an example of OS hardening?

A

Deleting unused programs and installing current updates

135
Q

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment.
Which strategy did the cloud provider use to mitigate the risk of security threats?

A

Defense-in-depth

136
Q

An organization has a private cloud infrastructure. They want to leverage the capabilities of a public cloud by using the hybrid cloud model.

Which security mechanism would enable them to establish a secure connection to the public cloud?

A

VPN

137
Q

Which network feature enables dynamic distribution of applications I/O traffic across VMs?

A

Load Balancing

138
Q

Which action takes place during the login phase in an FCoE SAN?

A

VN_Ports obtain FC addresses

139
Q

Which cloud computing characteristic enables consumers to use cloud services on heterogeneous thin or thick client platforms?

A

Broad network access

140
Q

hich cloud computing characteristic enables multi-tenancy and abstracts the location of provided resources?

A

Resource pooling

141
Q

What is an accurate statement about hypervisor-based continuous data protection (CDP)?

A

Write splitter is embedded in the hypervisor

142
Q

What is an accurate statement about a continuous data protection (CDP) remote replication solution?

A

Appliances are present at both the source and remote sites

143
Q

Why do organizations need a malware protection software?

A

Protect applications and the OS against trojan horse programs

144
Q

A company has virtualized their data center and wants to deploy a recovery-in-place backup approach.
What is the advantage of this type of approach?

A

Eliminates the need to transfer the image from the backup device to the primary storage before it is restarted

145
Q

Which type of storage system is built specifically for storing fixed content?

A

Content addressed storage

146
Q

A start-up company with a limited budget is planning to adopt a hybrid cloud solution for their operations. The company has business-critical applications that serve customers and have strict service levels. In addition, the company has less critical applications such as backup and archive .
Which hybrid cloud strategy should be recommended to the company?

A

Deploy the business-critical applications on an externally-hosted private cloud. Deploy the less critical applications on a public cloud.

147
Q

What is an accurate statement about Platform as a Service?

A

Consumer has control over the deployed applications

148
Q

What is an accurate statement about Infrastructure as a Service?

A

Consumer has control over the operating systems and the deployed applications

149
Q

What is a benefit of using converged infrastructure for building a data center?

A

Reduces the time to acquire and deploy the infrastructure

150
Q

Which capability is provided by a software-defined storage controller?

A

Ability to pool and abstract physical storage and present it as an open storage platform

151
Q

What is a benefit of application virtualization?

A

Avoids conflicts between different versions of the same application

152
Q

What is an accurate statement about the application presentation technique of application virtualization?

A

Application executes remotely and its user interface is transmitted to the client

153
Q

In which data access method does the file system access an iSCSI storage system over a network?

A

Block-based

154
Q

What is an accurate statement about a logical volume in a compute system?

A

Can span across multiple physical volumes

155
Q

Which data access method enables a compute system to access a file system that resides on a storage system?

A

File-based

156
Q

Which type of LUN provides full control for precise data placement and allows an administrator to create LUNs on different RAID sets if there is workload contention?

A

Traditional

157
Q

Which technique protects the data in cache from power failures?

A

Vaulting

158
Q

What is an accurate statement about the Common Internet File System (CIFS) protocol?

A

Enables a CIFS server to maintain connection information regarding every connected client

159
Q

Which feature of an object-based storage system abstracts and provides a common view of storage independent of location to applications?

A

Global namespace

160
Q

What is an example of a security management task in a storage infrastructure?

A

Configuring LUN masking to restrict hosts from accessing a specific LUN

161
Q

What is a component of an FCoE switch?

A

Ethernet Bridge

162
Q

What is the purpose of monitoring capacity in a storage infrastructure?

A

Tracking the amount of storage infrastructure resources used and available

163
Q

Which data center management process involves collating and presenting the utilization of resources?

A

Reporting

164
Q

What contains the information about backup configuration and backup metadata?

A

Backup image

165
Q

Which NAS implementation requires separate management of the NAS head and the storage?

A

Gateway

166
Q

Which capability does big data analytics provide?

A

Enabling data-driven decisions from large volumes of data

167
Q

In continuous data protection (CDP) remote replication, where are the two split write I/Os of an incoming write I/O directed?

A

One I/O goes to the local CDP appliance and the other I/O goes to the production volume

168
Q

What is an accurate statement about full volume replication?

A

Target device is at least as large as the source device

169
Q

What is an accurate statement about an integrated NAS controller?

A

Contains a specialized operating system dedicated to file serving

170
Q

What is a benefit of a storage area network (SAN)?

A

Enables compute systems across locations to access shared storage

171
Q

What is enabled by the N_Port ID virtualization (NPIV)?

A

A single physical N_Port to obtain multiple FC addresses

172
Q

What determines how far back the recovery points can go in a continuous data protection (CDP) solution?

A

Amount of space that is configured for the journal

173
Q

What is a function of a Fibre Channel Forwarder in an FCoE SAN?

A

Applies zoning configurations and provides fabric services

174
Q

Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?

A

Fabric controller

175
Q

What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?

A

A dedicated VLAN must be configured for each VSAN

176
Q

Which method is used to establish a VPN connection between a primary and remote data center to perform secure remote replication?

A

Site-to-site VPN connection

177
Q

An application generates 8400 small random I/Os at peak workloads with a read/write ratio of 2:1. What is the disk load at peak activity for a RAID 5 configuration?

A

16800

178
Q

Why should a replica be consistent with its source?

A

Ensure the usability of the replica

179
Q

What is an accurate statement about a hybrid cloud?

A

Supports data and application portability for load balancing between clouds

180
Q

An organization plans to deploy a deduplication solution by retaining their legacy backup application. They are concerned about the application servers performance and a long backup window during backups. Which deduplication solution(s) should be recommended to the organization?

A

Post-process

181
Q

What is a function of a virtual machine manager?

A

Abstracts physical hardware and presents it to a virtual machine

182
Q

What is a benefit of configuring EX_Ports on each Fibre Channel over IP (FCIP) gateway in an FCIP tunnel implementation?

A

Enables FC-FC routing through the FCIP tunnel without merging the fabrics

183
Q

What is a function of the metadata manager in a compute-based storage area network (SAN)?

A

Controls load balancing and data migration in a compute-based SAN

184
Q

How do VSANs ensure security in an IT infrastructure?

A

By providing isolation over a shared infrastructure

185
Q

What is an accurate statement about a data lake?

A

Stores data as an exact or near-exact copy of the source format

186
Q

In an FC SAN environment, which security mechanism prevents a switch port from being enabled even after a switch reboot?

A

Port locking

187
Q

What is an example of an active attack on an IT infrastructure?

A

Attempt to modify information for malicious purposes

188
Q

Which component is required for a “recovery-in-place” backup approach?

A

Disk-based backup target

189
Q

What is a benefit of a “recovery-in-place” backup approach in a virtualized data center?

A

Provides instant recovery of a failed virtual machine

190
Q

What is an accurate statement about Software as a Service?

A

Consumer has limited control over user-specific application configuration settings

191
Q

What is a benefit of N_Port virtualization (NPV)?

A

Reduces the number of domain IDs in a fabric

192
Q

What is an accurate statement about OAuth security control?

A

Allows a client to access protected resources from a resource server on behalf of a resource owner

193
Q

Which factor has contributed to the growth of digital data?

A

Proliferation of applications and smart devices

194
Q

What is the purpose of monitoring availability in a storage infrastructure?

A

Identify component failures that may lead to service unavailability

195
Q

An organization requires a backup solution for their NAS environment. They are concerned about the performance of their application servers while backing up data during peak workloads.

Which recommended solution will meet the organization’s requirements?

A

NDMP-based backup

196
Q

Which parameter determines the rotation latency of a disk drive?

A

Speed of the spindle

197
Q

What is an accurate statement about a core-edge topology?

A

Core-tier is extended by adding more switches at the core

198
Q

What is an advantage of implementing an image-based backup solution in a virtualized environment?

A

Backup process is offloaded from the production virtual machine

199
Q

What is an accurate statement about a virtual machine (VM) clone?

A

Clone VM is assigned a separate network identity

200
Q

Which benefit is provided by the REST application programming interface of a software-defined storage (SDS) controller?

A

Enables the use of third-party software tools to manage the storage infrastructure

201
Q

What is an accurate statement about an FCoE environment?

A

FCoE network must be configured to support jumbo frames for optimal performance

202
Q

Which capability is provided by software-defined networking?

A

A single control point to the entire network infrastructure enabling policy-based network management

203
Q

Which storage infrastructure management activity involves measuring throughput of components and identifying bottlenecks?

A

Performance management

204
Q

What is an accurate statement about a continuous data protection (CDP) remote replication solution?

A

Appliances are present at both the source and remote sites

205
Q

In an FCoE environment, which functionality provides a framework for the allocation of bandwidth to different network traffic classes?

A

Enhanced transmission selection

206
Q

What accurately describes a shared pool in virtual provisioning?

A

Supports a single RAID protection level.

207
Q

What is an accurate statement about the application streaming technique of application virtualization?

A

Application is downloaded in portions on the client for local execution

208
Q

What is a benefit of implementing a virtual machine (VM) storage migration?

A

Balances storage utilization by redistributing VMs across different storage systems

209
Q

What is a function of a cloud-based object storage gateway?

A

Performing protocol conversion to send data directly to cloud storage

210
Q

An organization has an iSCSI storage system accessed by 20 compute systems running a hypervisor over a physical Ethernet network. The network enables the transfer of compute-to-compute, compute-to-storage, and management traffic.

The compute systems host several virtual machines that are accessed by 31 user groups. In addition, the network has two Ethernet core switches in an active/passive configuration and three edge switches that connect all the compute systems. Multiple VLAN trunk links exist between the core and the edge switches.

However, recently the user groups are experiencing performance issues due to excessive utilization of the core switch and the trunk links .

What can be implemented to minimize the performance issues?

A

Switch aggregation

211
Q

What is a benefit of using content addressed storage (CAS) as an archival solution?

A

Ensures content authenticity and integrity

212
Q

What accurately describes a data lake in a big data environment?

A

Stores large volumes of structured and unstructured data collected from various sources

213
Q

Which functionality is provided by the REST API in a software-defined storage environment?

A

Integration and access to external cloud storage services

214
Q

What is an advantage of sub-LUN tiering?

A

Improved performance

215
Q

What does a domain ID represent in Fiber Channel (FC) addressing?

A

Unique number provided to each switch in the fabric

216
Q

Why do organizations prefer to adopt cloud-based archiving?

A

Support massive data growth and data retention requirements

217
Q

Which task is performed during infrastructure discovery?

A

Creates a list of infrastructure components and their related information

218
Q

What is the function of MapReduce in big data analytics?

A

Enable the distribution of computations across multiple compute systems for parallel processing

219
Q

The graphic represents an FCIP tunnel configuration that merges two Fibre Channel SANs at either end of the tunnel. Which types of ports do the labels “X” and “Y” represent on the FCIP gateway?

A

X = E_port and Y = VE_port

220
Q

Which object-based storage system feature provides self-configuring and self-healing capabilities to reduce complexity and downtime?

A

Automated system management

221
Q

What accurately describes an FCIP tunnel?

A

Consists of one or more independent connections between two FCIP ports on gateways

222
Q

If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI?

A

Username

223
Q

What is an advantage of deploying a storage area network (SAN) in a data center environment?

A

Enables data replication between storage systems across different locations

224
Q

What accurately describes an image-based backup?

A

Recovery at both virtual machine and file levels is supported

225
Q

What is the advantage of adopting OpenID by an organization?

A

Eliminates the need to deploy a separate authentication system

226
Q

What happens when a write request to a valid page is received in a solid-state drive?

A

Requested page is marked invalid and the write continues with an available empty page

227
Q

What is an accurate statement about cache vaulting?

A

Contents of cache is dumped to a set of physical storage drives during a power failure

228
Q

What accurately describes an NDMP-based backup in a NAS environment?

A

Backup data is sent directly from a NAS device to the backup device

229
Q

Which items are found in an iSCSI address?

A

IP address, TCP port number, and iSCSI name

230
Q

What happens when a disk fails in a RAID 5 array configured with a hot spare?

A

Both read and write operations can continue

231
Q

Which functionality does Risk Management provide?

A

Identifies resources that should not be accessed by certain users

232
Q

What will enable a company to plan for the frequency of their backups?

A

Recovery Point Objective

233
Q

What is an advantage of using a single-switch topology for a Fibre Channel (FC) SAN deployment?

A

Increases the number of node ports for ISL connectivity

234
Q

What is the fundamental unit of data transfer in an FC network?

A

Frame

235
Q

What accurately describes modern applications?

A

Designed to be distributed and developed using multiple programming languages

236
Q

A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?

A

Desktop as a Service

237
Q

What is an accurate statement about Zoning?

A

Nodes that are distributed across multiple switches in a switched fabric may also be grouped into the same zone

238
Q

What is a recommendation for a virtual machine (VM) snapshot?

A

Parent VM must be healthy in order to use the snapshot for a rollback operation