This action might not be possible to undo. Are you sure you want to continue?
To provide a logical connection between array ports and host HBAs To isolate switch ports into separate logical SANs To provide a logical connection between LUNs on two storage arrays To provide a logical connection from LUNs on a storage array to different HBAs Which EMC ControlCenter component gathers the information about Managed Objects? Agent Repository Store Server Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target? Log shipping Asynchronous Logical Volume Manager Synchronous What is a characteristic of an integrated NAS system? Pooled and centralized storage Allows host to connect directly to the storage array Offers multiple connectivity options with the back-end Allows access to under-utilized SAN storage
What is true about virtual machines? Created on the concatenated server Created on server with only internal storage Created on the same physical server Created on the same logical server Which statement applies to integrated NAS systems? NAS components and storage arrays are both managed by array management software NAS components are managed by NAS software and storage arrays are managed by array software NAS components and storage arrays are managed by NAS software Integrated NAS systems require an external storage array connection In a 5 disk RAID 5 implementation, what is the storage capacity overhead? 80% 20% 100% 25% Which SAN management activity includes volume provisioning? Formatting Storage allocation Concatenation Partitioning
How can you recover from a loss of confidentiality? Confidentiality cannot be recovered Combine detective and preventive controls to prevent the loss Implement backup and restore processes Deterrent controls are sufficient to prevent the loss Which cache flushing technique has the highest impact on the host I/O processing? Forced flushing Low watermark flushing High watermark flushing Idle flushing What is a basic feature of a CAS implementation? Object name resolution using DNS Distributed object management Object transport via Fibre Channel Globally unique identifier for every data object In an EMC CLARiiON remote replication solution, what is the relationship between the sizes of the primary and secondary MirrorView/A LUNs? The primary must be smaller than or equal to the secondary The primary must be smaller than the secondary The primary must be larger than or equal to the secondary The primary must be the same size as the secondary What is the correct sequence of operations for data object retrieval in CAS? 1. Retrieval request is sent to the CAS via CAS API over IP 2. Application finds Content Address of object to be retrieved 3. CAS authenticates the request and delivers the object 4. Object is needed by an application 3-1-2-4 4-2-1-3 1-4-3-2 1-3-2-4
What is a purpose of iSNS? To translate iQN-format names into EUI-format names To assist with discovery of iSCSI targets To implement TCP offload for better bandwidth To translate EUI-format names into iQN-format names You are backing up two file systems from two servers over the LAN: • Backup client A with 10 files, 100 MB each and • Backup client B with 1000 files, 1 MB each. What will happen under identical backup infrastructures? B will generate more catalog entries A will generate more catalog entries A and B will take the same time to complete A will take more time to complete What does a push operation in SAN based remote replication indicates? Data is pushed from one control array to another control control array Data is pushed from control array to remote array Data is pushed from one remote array to another control remote array Data is pushed from remote array to control array By spoofing the identity of a remote storage site, which two security objectives can be violated? Availability and integrity Confidentiality and integrity Confidentiality and availability Confidentiality and authenticity Which component of an intelligent storage system provides host connectivity? Cache Back-end Front-end Physical disks
In a backup and recovery environment, what is a benefit of sending multiple streams versus a single stream of backup data to tape? Improved recovery time objective Improved media utilization Reduced recovery time Improved write performance How is “auditing” defined in the context of storage security? Writing an audit record for each transaction involving storage Reading and analyzing logs to show that a security policy is being enforced Verifying integrity of all data blocks Recording login activities on all servers accessing storage How does EMC Invista appear to the host and storage? Virtual initiator and Virtual target Target and Initiator Initiator and Target Virtual target and Virtual initiator Which cache algorithm will optimize a storage array’s I/O response time if sequential access is detected? Read Ahead Write-back Flushing Write-through Which four activities are included in the process of developing an ILM strategy? Analyzing, Implementing, Testing, Managing Planning, Analyzing, Implementing, Testing Classifying, Implementing, Managing, Organizing Designing, Planning, Classifying, Managing
If the communication link between a mirror's primary image and its secondary image fails during an EMC CLARiiON MirrorView/A remote replication, what is the state of the secondary image? Synchronizing Inconsistent Independent Fractured Who can be member of a zone? NIC Cards Nodes within SAN ISL Trunks ToE cards Which statement describes Content Address (CA)? An identifier that uniquely addresses the content of a file but not its location An identifier that uniquely addresses the content, quality, condition, and other characteristics of data An identifier that uniquely addresses the name and location of a file An address that enables communication between CAS objects What is a disadvantage of a Fibre Channel hub when compared to a Fibre Channel switch? Larger footprint Limited interoperability Limited performance Higher cost What is the role of virtualization technology? Physical view of logical resources while preserving the usage interfaces Physical view of logical resources with appropriate modifications of the usage interfaces Logical view of physical resources while preserving the usage interfaces Logical view of physical resources with appropriate modifications of the usage interfaces
Which component of the EMC ControlCenter displays information about managed objects? Console Repository Server Store What is true about a file in the file system? Can span multiple file system blocks It is a smallest container of physical disk space It must be mounted before use Is always a contiguous area on physical disk Which key requirement for data center elements can be achieved through automation of common tasks? Availability Scalability Manageability Data integrity What is Meta-LUN? LUN that stores mirroring information LUN that stores meta-data Formed by aggregating other LUNs Formed by partitioning other LUNs What happens when the EMC TimeFinder/Mirror split operation is performed? All data from the BCV is copied to the standard volume All data from the standard volume is copied to the BCV Data is copied incrementally from the standard volume to the BCV The BCV is made independently accessible
On what basis is information moved from one storage tier to another in a tiered storage approach? Size of the tier Cost of the tier Value of information Size of information Which kind of replication requires ongoing involvement from the host to manage the replication? Asynchronous Disk buffered Log shipping Synchronous What does the Rainfinity appliance use to provide data virtualization? Control path cluster VSAN Infiniband Global namespace manager To ensure a consistent copy, when should application I/O be held? Just before writing to storage array cache Just prior to creating a point in time replica Just after creating a point in time replica Just after writing to storage array cache Which metrics should be used to determine bandwidth requirements for asynchronous remote replication? Peak Writes Average Reads Average Writes Peak Reads
What is a benefit of a NAS solution? Offers improved network bandwidth Enables access to data with unique object IDs Provides improved application block level I/O performance Enables data sharing across host platforms In a SAN-based backup environment, how does metadata travel? Over SAN Over LAN Over both SAN and LAN Over the same path as the data What is an advantage of synchronous remote replication compared to asynchronous replication? Less expensive Lower data loss in the event of a disaster Lower network bandwidth requirement Usable over long distances What is an accurate statement about a disk drive function? Rotation speed of a spindle is varied to keep the head flying height constant Rotation speed of a spindle depends on the disk zone being accessed A spindle rotates at a constant speed Individual platters on a spindle may rotate at different speeds To ensure a consistent copy, when should application I/O be held? Just prior to creating a point in time replica Just before writing to storage array cache Just after writing to storage array cache Just after creating a point in time replica
Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target? Logical Volume Manager Asynchronous Synchronous Log shipping What does a push operation in SAN based remote replication indicates? Data is pushed from remote array to control array Data is pushed from one control array to another control control array Data is pushed from one remote array to another control remote array Data is pushed from control array to remote array In the context of security vulnerability management, what is the effect of increasing the work factor? Decreases the number of steps in an attack vector Increases the likelihood that the exploit will be discovered Increases the time necessary to perform the exploit Decreases the attack surface of the component in question When is data copied from the source to the target using Copy on First Access replica technology? All writes are issued to a location on the source All reads are issued to a location on the source A read is issued for the first time to a location on the source A write is issued for the first time to a location on the source An organization performs a full backup on 1st of every month. It takes a cumulative backup every Sunday and incremental backup everyday. On last Monday of the month, at 8:00 A.M. the file system gets corrupted. How many backups will be needed to recover the file system? 31 29 5 2
What is a purpose of zoning? To provide a logical connection between LUNs on two storage arrays To isolate switch ports into separate logical SANs To provide a logical connection from LUNs on a storage array to different HBAs To provide a logical connection between array ports and host HBAs Which SAN connectivity option offers the greatest degree of scalability? Core-Edge Full Mesh Switched Fabric Arbitrated Loop What happens when the EMC TimeFinder/Mirror split operation is performed? The BCV is made independently accessible All data from the BCV is copied to the standard volume Data is copied incrementally from the standard volume to the BCV All data from the standard volume is copied to the BCV A company has a Recovery Point Objective (RPO) of four hours. What does this RPO mean in the event of a disaster? Production must be resumed within four hours A restartable copy of data must be obtained within four hours Restore from backup must occur within four hours No more than four hours of production data can be lost Which cache flushing technique has the highest impact on the host I/O processing? Idle flushing Low watermark flushing High watermark flushing Forced flushing
For which remote replication technology is host involvement an absolute requirement? Asynchronous Synchronous Disk buffered consistent point in time copies Logical volume manager mirroring What provides a layer of abstraction between the operating systems and the underlying hardware? Virtual memory Virtual storage Virtual servers Virtual networks
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.