Вы находитесь на странице: 1из 20

1) Which iSCSI topology does the graphic represent?

( ) Bridged
( ) Native
( ) Combined
( ) Isolated
Answer: Bridged

2) Which EMC backup and recovery product provides source-based data deduplication?
( ) Avamar
( ) PowerPath/VE
( ) HomeBase
( ) Unisphere
Answer: Avamar
3) Which type of port does label A in the graphic represent?
( ) E_port
( ) N_port
( ) F_port
( ) NL_port

A
Answer: E_port

4) Which type of storage system does the graphic represent?


( ) Unified storage
( ) Block-based storage
( ) File-based storage
( ) Object-based storage

Answer: Unified storage


5) Which component of an FCoE network performs the function of both a NIC and an FC HBA?
( ) Converged Network Adapter
( ) Enhanced Ethernet Adapter
( ) Fibre Channel Forwarder
( ) Ethernet Forwarder

Answer: Converged Network Adapter

6) Which EMC product offers CDP functionality?


(
(
(
(

) RecoverPoint
) TimeFinder
) MirrorView
) SnapView

Answer: RecoverPoint

7) Which type of zoning does Zone 3 represent in the graphic?


( ) WWN
( ) Port
( ) Mixed
( ) Domain

Answer: Mixed
8) Which RAID technique does the graphic represent?
(
(
(
(

) Parity
) Mirroring
) Striping
) Nested

Answer: Mirroring

9) Why is a bare-metal hypervisor more efficient than a hosted hypervisor?


( ) Allows applications to run directly on physical hardware
( ) Allows binary translation to be performed by applications
( ) Allows binary translation to be performed directly by a guest OS
( ) Provides direct access to the hardware resources

Answer: Provides direct access to the hardware resources


10) Which hypervisor component is responsible for performing binary translation of
instructions that can NOT be virtualized?
(
(
(
(

) Guest OS
) Virtual machine
) Kernel
) Virtual machine monitor

Answer: Virtual machine monitor


11) An administrator wants to install a guest OS on a newly created virtual machine. What
enables the administrator to perform the installation?
(
(
(
(

) Virtual machine monitor


) Virtual machine console
) Virtual machine template
) Virtual machine manager

Answer: Virtual machine console


12) Which statement best describes the function of a hypervisor?
(
(
(
(

) Encapsulates VMs inside applications


) Allows applications to run directly on physical hardware resources
) Creates a virtualization layer between applications and VMs
) Provides hardware resources to VMs

Answer: Provides hardware resources to VMs


13) What enables a virtual machine to be portable across physical machines running the same
hypervisor?
( ) Guest OS running on a virtual machine
( ) Standardized virtual machine hardware
( ) Virtual machine monitor
( ) Hardware assisted virtualization technique

Answer: Standardized virtual machine hardware

14) Which cloud computing characteristic enables consumers to get computing resources
without any human intervention?
(
(
(
(

) Broad network access


) Measured service
) Rapid elasticity
) On-demand self-service

Answer: On-demand self-service

15) Which technique can be used to cluster a virtual machine with a physical machine?
(
(
(
(

) Raw Device Mapping


) File-level virtualization
) Storage Tiering
) Block-level virtualization

Answer: Raw Device Mapping


16) The graphic shows three thin LUNs with their allocated and reported capacities. The total
usable capacity of the storage system is 1500 GB. What is the available capacity of the storage
system?
( ) 300 GB
( ) 750 GB
( ) 900 GB
( ) 1050 GB
Answer: 1050 GB

17) What is a storage group in automated storage tiering?


( ) Logical collection of LUNs that are managed together
( ) Physical collection of RAID-protected storage drives

( ) Logical collection of LUNs created only from storage drives of the same type
( ) Physical collection of storage drives over which data is uniformly distributed
Answer: Logical collection of LUNs that are managed together
18) What best describes a thin LUN extent?
( ) Minimum amount of storage allocated at a time to a thin LUN from a thin Pool
( ) Collection of physical drives that provide the actual physical storage used by thin LUNs
( ) Maximum amount of storage that can be allocated at a time to dynamically expand a thin
LUN
( ) Total amount of physical storage allocated to the thin LUN from the thin pool

Answer: Minimum amount of storage allocated at a time to a thin LUN from a thin Pool
19) What is a benefit of NIC teaming?
(
(
(
(

) Improves network security


) Increases switch port availability
) Provides fault tolerance
) Avoids physical NIC failure

Answer: Provides fault tolerance


20) What is a component of VM network?
(
(
(
(

) Virtual switch
) Virtual IDE Controller
) Virtual machine monitor
) Virtual SCSI controller

Answer: Virtual switch


21) Which networking component does the label X represent in the graphic?
( ) Physical NIC
( ) Virtual NIC

( ) Physical HBA
( ) Virtual HBA

Answer: Physical NIC


22) What is a feature of a VSAN?
(
(
(
(

) Each VSAN has its own fabric services


) Multiple VSAN can be members of a zone
) Each VSAN has its own, dedicated trunk link
) VSAN ID must be unique for each trunk port

Answer: Each VSAN has its own fabric services


23) What is a benefit of a VLAN?
( ) Increases security level
( ) Standardized networking
( ) Reduced OPEX
( ) Increased broadcast activity

Answer: Increases security level


24) An organization requires that each user needs to access their own copy of OS and
applications installed on a centralized location. Which virtualization solution will you
recommend?
( ) Virtual Desktop Infrastructure
( ) Application Encapsulation
( ) Remote Desktop Services
( ) Application Streaming
Answer: Virtual Desktop Infrastructure
25) What is explored during the proof of concept phase for cloud adoption?
( ) Ensure the provider supports the open virtual machine format
( ) Ensure the provider has the capability to meet the service level objectives

( ) Ensure the provider can provide the RPO


( ) Ensure the provider stores the data in a geographic location that the organization chooses

Answer: Ensure the provider supports the open virtual machine format
26) What is updated when attributes of a cloud service change?
(
(
(
(

) Incident history log file


) Problem resolution document
) Chargeback report
) Configuration management database

Answer: Configuration management database


27) Which cloud deployment model is typically preferred by an individual who is least
concerned about the security or availability risks and most concerned about reducing cost?
(
(
(
(

) Public
) Private
) Community
) Hybrid

Answer: Public
28) The slower data transfer rate between a compute cluster and a storage array has been
adversely impacting multiple cl oud services. Which service management process helps to
mitigate this impact?
( ) Service catalogue management
( ) Service asset and configuration management
( ) Performance management
( ) Compliance management
Answer: Performance management
29) Which product provides cloud user access management capability?
( ) EMC Unified Infrastructure Manager
( ) EMC Unisphere

( ) VMware Service Manager


( ) VMware vCloud Director

Answer: VMware vCloud Director


30) An administrator wants to use a single management interface to interact with all
standalone virtual infrastructure components for creating virtual pools. These components
include compute, network, and storage devices from multiple vendors.
Which software will you recommend to the administrator?
( ) Unified management
( ) User access management
( ) Virtual infrastructure management
( ) Element management

Answer: Unified management

31) What is a key activity in problem management?


( ) Transfers error correction activity to incident management
( ) Prioritizes incidents based on the timestamp
( ) Documents the incident history or all services
( ) Analyzes the incident history and identifies the impending service failures
Answer: Analyzes the incident history and identifies the impending service failures
32) What does integrity ensure in an information system?
(
(
(
(

) Only authorized changes to data are allowed


) Only authorized users have access to data
) Authorized users have reliable access to data
) Specific access rights to data is given to authorized users

Answer: Only authorized changes to data are allowed

33) What is a feature of multi-factor authentication?


( ) Access is granted only when all the specified factors are validated
( ) Multiple specified factors enable elimination of attackers even if one factor fails
( ) A single credential is used to provide access to multiple services
( ) Enables multiple clients to be serviced by the same set of resources

Answer: Access is granted only when all the specified factors are validated
34) What best describes the authorization process in information security?
( ) A process to give a user specific access rights to resources
( ) A process to ensure that a users credentials are genuine
( ) A process to ensure that users have reliable and timely access to data
( ) A process to ensure that only legitimate users have access to data

Answer: A process to give a user specific access rights to resources


35) Which security mechanism enables organizations to authenticate their users of cloud
services using a chosen provider?
(
(
(
(

) Federated Identity Management


) One-time passwords
) Open virtualization format
) Directory services

Answer: Federated Identity Management

36) Which remote replication mode provides a near-zero recovery point objective (RPO)?
( ) Asynchronous replication
( ) Synchronous replication
( ) Database log shipping
( )Differential replication

Answer: Synchronous replication


37) Which management activity ensures adequate availability of resources based on a service
level objective?
(
(
(
(

) Capacity
) Availability
) Performance
) Security

Answer: Capacity
38) What is a function of a backup server?
( ) Manages backup operations
( ) Sends backup data to the storage node
( ) Sends backup data to the storage device
( ) Stores deduplicated data
Answer: Manages backup operations
39) In which circumstance is a converter boot CD used for a P2V conversion?
(
(
(
(

) Perform a hot P2V conversion within a data center


) Perform a cold P2V conversion
) Perform a hot P2V conversion between two data centers
) Perform a hot P2V conversion in the cloud

Answer: Perform a cold P2V conversion


40) Which statement is true about VM-to-VM affinity?
( ) VMs running the same guest OS should always run on different hypervisors
( ) Selected VMs should run on different hypervisors
( ) Selected VMs should run on the same hypervisor
( ) VMs running a different guest OS should always run on the same hypervisors

Answer: Selected VMs should run on the same hypervisor


41) Which cloud characteristic enables the consumers to use cloud services from a wide range
of client platforms?
(
(
(
(

) On-demand self service


) Resource pooling
) Broad network access
) Rapid elasticity

Answer: Broad network access


42) What is a feature of a linked clone?
(
(
(
(

) Shares the virtual disk with its parent VM


) Uses the network identity of its parent VM
) Copies changes made to its parent VM
) Contains a symbolic link that enables raw device mapping

Answer: Shares the virtual disk with its parent VM


43) What best describes the VM snapshot?
( ) Preserves the state and data of a VM at a specific point-in-time
( ) Creates a child VM from the configuration file of its parent VM
( ) Reverts the configurations of a VM to a later point- in-time
( ) Creates a master copy of a powered-off VM
Answer: Preserves the state and data of a VM at a specific point-in-time
44) What best describes a VM template?
( ) A reusable image created from a VM
( ) A point-in-time replica of VM log file
( ) A protected copy of a VM snapshot
( ) an online VM with a hardened guest OS

Answer: A reusable image created from a VM


45) What is a feature of DNS server load balancing?
( ) IP addresses of application servers are mapped to a domain name
( ) IP addresses of the load balancers are mapped to a virtual IP address
( ) Domain names of application servers are mapped to the IP address of the load balancer
( ) IP addresses of the clients are mapped to the IP addresses of the application servers

Answer: IP addresses of application servers are mapped to a domain name

46) Three types of network traffic -VM, IP storage, and management share a total bandwidth
of 300 Mbps of a NIC team. The management traffic should not be allowed to use more than 50
Mbps of the NIC teams bandwidth. Which parameter helps in controlling the bandwidth for the
management traffic?
(
(
(
(

) Limit
) Share
) Burst size
) Average bandwidth

Answer: Limit
47) Which statement is true about Remote Desktop Services (RDS)?
( ) RDS provides individual OS sessions to the client systems
( ) Each RDS session has its own OS and applications installed
( ) A user has full control to the resources of the virtualized desktop
( ) Resources of the client system is consumed to run applications on the virtual desktop

Answer: RDS provides individual OS sessions to the client systems

48) An organization is planning to migrate a tightly coupled application to the cloud. Which
migration strategy is recommended?

(
(
(
(

) Forklift
) Hybrid
) Differential
) Multi-step

Answer: Forklift
49) What is considered during the optimization phase for cloud adoption?
(
(
(
(

) Usage pattern of consumed resources


) Option to relinquish tightly coupled applications
) Cost of the existing software licenses
) Optimum effort needed to migrate applications

Answer: Usage pattern of consumed resources


50) What is considered during the optimization phase for cloud adoption?
(
(
(
(

) Usage pattern of consumed resources


) Option to relinquish tightly coupled applications
) Cost of the existing software licenses
) Optimum effort needed to migrate applications

Answer: Usage pattern of consumed resources


51) What is determined during the compliance assessment for cloud adoption?
( ) Contractual obligations to store data in specific jurisdictions
( ) Cost of the in-house infrastructure and using the cloud infrastructure
( ) Issues related to performance of the cloud infrastructure
( ) Compatibility of consumer applications with the cloud infrastructure
Answer: Contractual obligations to store data in specific jurisdictions

52) What should an organization consider before migrating its applications and operating
system to the public cloud to prevent vendor lock-in?
( ) Ensure the provider supports the open virtual machine format
( ) Ensure the provider has the capability to meet the service level objectives
( ) Ensure the provider can provide the RPO
( ) Ensure the provider stores the data in a geographic location that the organization chooses
Answer: Ensure the provider supports the open virtual machine format
53) Which storage array-based security mechanism helps restricting unauthorized host access
to storage volumes?
(X) LUN masking
( ) Sandboxing
( ) Intrusion detection system
( ) Demilitarized zone

Answer: LUN masking

54) What best describes a VM theft?


( ) An attacker copies or moves a VM in an unauthorized manner
( ) An attacker installs a rogue Virtual Machine Monitor to take control of cloud resources
( ) An attacker installs unauthorized applications on the guest OS of a VM
( ) An attacker controls the interaction between a VM and the application

Answer: An attacker copies or moves a VM in an unauthorized manner

55) An attacker has carried out a denial-of-service attack in a cloud environment. In this attack,
the attacker causes several virtual machines to consume a large amount of network bandwidth.
This has resulted in unavailability of bandwidth for storage and virtual machine migration
traffic.
What will you recommend to minimize the impact due to this attack?

(
(
(
(

) Configure limit for the virtual machine traffic


) Configure reservation for the virtual machine traffic
) Encrypt all the data transfer mitted over the network
) Reduce network bandwidth for storage and migration traffic

Answer: Configure limit for the virtual machine traffic

56) Which management activity ensures adequate availability of resources based on a service
level objective?
(
(
(
(

) Capacity
) Availability
) Performance
) Security

Answer: Capacity

57) What is the impact on RAID set performance when higher revolutions per minute (RPM)
drives are mixed with lower RPM drives?
(
(
(
(

) Lowers the overall performance


) Improves the overall performance
) No impact on the overall performance
) Provides overall performance equivalent to the highest RPM drive

Answer: Lowers the overall performance


58) Which cloud characteristic enables the consumers to use cloud services from a wide range
of client platforms?
(
(
(
(

) On-demand self service


) Resource pooling
) Broad network access
) Rapid elasticity

Answer: Broad network access


59) Which component(s) of a cloud infrastructure framework helps automating the creation
and delivery of computing resources to the consumers?
(
(
(
(

) Service management tools


) Physical infrastructure
) Virtual infrastructure
) Application and platform software

Answer: Service management tools


60) In which circumstance is a converter boot CD used for a P2V conversion?
(
(
(
(

) Perform a hot P2V conversion within a data center


) Perform a cold P2V conversion
) Perform a hot P2V conversion between two data centers
) Perform a hot P2V conversion in the cloud

Answer: Perform a cold P2V conversion

61) What is a feature of Virtual Machine File System (VMFS)?


( ) Enables multiple compute systems to access a shared volume
( ) Managed only by a NAS system
( ) Maps the logical path of a file to the physical path name
( ) Maps the file metadata to the object ID

Answer: Enables multiple compute systems to access a shared volume

62) What is a feature of a linked clone?


( ) Shares the virtual disk with its parent VM
( ) Uses the network identity of its parent VM

( ) Copies changes made to its parent VM


( ) Contains a symbolic link that enables raw device mapping
Answer: Shares the virtual disk with its parent VM
63) What can be backed up if a backup agent is installed on a VM?
(
(
(
(

) Data stored on virtual disk


) VM configuration files
) VM image
) Virtual machine file system

Answer: Data stored on virtual disk


64) What is a feature of DNS server load balancing?
( ) IP addresses of application servers are mapped to a domain name
( ) IP addresses of the load balancers are mapped to a virtual IP address
( ) Domain names of application servers are mapped to the IP address of the load balancer
( ) IP addresses of the clients are mapped to the IP addresses of the application servers

Answer: IP addresses of application servers are mapped to a domain name


65) Which statement is true about application encapsulation?
( ) Application package contains built-in agents
( ) Application requires locally-installed agents for execution
( ) Encapsulated application overwrites the already existing application
( ) Application requires a local installation

Answer: Application package contains built-in agents


66) Which cloud service management process monitors and reports on allocation and utilization
of resources by consumers in order to generate a chargeback report?
( ) Financial management
( ) Capacity management
( ) Service catalogue management

( ) Performance management

Answer: Financial management

67) Which software allows an administrator to create and publish a service catalogue?
( ) Unified management
( ) User access management
( ) Virtual infrastructure management
( ) Element management

Answer: User access management


68) What is an example of cloud vendor lock-in?
( ) Application built on a PaaS model cannot be moved to an IaaS model
( ) A software vendor does not offer its software as a service
( ) Organization cannot move its existing licensed software into the cloud
( ) On-disk locking prevents simultaneous powering on of the same VM
Answer: Application built on a PaaS model cannot be moved to an IaaS model
69) What is true about the Trusted Computing Base in information security?
( ) Defines the boundary between security-critical and non-critical parts of an information
system.
( ) Defines the policies of confidentiality, integrity, and availability of an information system
( ) Defines the boundary between internal and external networks in an organization
( ) Defines the policies of authentication, authorization, and auditing of an information system
Answer: Defines the boundary between security-critical and non-critical parts of an information
system
70) Which storage array-based security mechanism helps restricting unauthorized host access
to storage volumes?

( ) LUN masking
( ) Sandboxing
( ) Intrusion detection system
( ) Demilitarized zone

Answer: LUN masking

Вам также может понравиться