Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while?
What does the area ID of the FC address identify?
Group of ports within a switch
An individual port within a fabric
Location of the name server within the fabric
Unique number provided to each switch in the fabric
An organization performs copy on first access (CoFA) replication to create a local replica of application data. To perform a successful restore, what should be considered?
Source devices must be healthy
Save location size must be larger than the size of all source devices
Save location size must be equal to the size of all source devices
All changes to the source and replica must be discarded before the restore starts
Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?
Converged network adapter
TCP Offload Engine NIC
FCIP bridging adapter
iSCSI host bus adapter
What is a function of unified management software in cloud computing?
Defining cloud service attributes
Consolidating infrastructure resources scattered across one or more data centers
Metering based on usage of resources by the consumer
Providing an interface to consumers to request cloud services
Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?
iSCSI host bus adapter
Which iSCSI name requires an organization to own a registered domain name?
Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved as it was received?
What describes a landing zone in a disk drive?
Area on which the read/write head rests
Area where the read/write head lands to access data
Area where the data is buffered before writing to platters
Area where sector-specific information is stored on the disk
What is a characteristic of unified storage?
Supports multiple protocols for data access and managed through a single management interface
Supports a common protocol for data access and managed through a unified management interface
Provides compute, storage, and network virtualization products in one solution
Stores all data in the form of objects and managed through a unified management interface
What defines the time taken to position the read/write head across the platter with a radial movement in a disk drive?
Data transfer time
What is a benefit of cloud computing over traditional computing?
Reduces the time to provision and deploy new applications
Eliminates consumer’s IT operational expenditure
Enables the use of proprietary APIs to access IT resources
Lowers migration cost and prevents vendor lock-in
Which statement describes a denial of service attack?
Prevents authorized users from accessing the resources and services
Prohibits attempts to repair the resources and services after an attack
Attempts to provide false information by impersonating someone’s identity
Prevents unauthorized users to access the resources and services
What is a key benefit of virtualization?
Improved resource utilization
Unlimited resource scaling
What is an accurate statement about the Data Center Bridging Exchange protocol?
Enables Converged Enhanced Ethernet (CEE) devices to convey and configure their features with other CEE devices
Creates virtual FCoE links over an existing Ethernet network to transport FC frames over virtual links independently
Enables an FCoE switch to send signals to other FCoE switches that need to stop or slow down their transmissions
Enables an FCoE switch to transport both TCP/IP and FC frames over a single virtual FCoE link
What is a key security consideration when a NAS device enables sharing of the same data among UNIX and Microsoft Windows users?
NAS device must map UNIX permissions to Windows and vice versa
NAS defines and maintains ownership to the objects
NIS server must separately maintain SIDs for UNIX and Windows environments
Object permissions are not defined in advance and assigned dynamically
Which cloud computing characteristic enables consumers to grow and shrink the demand for resources dynamically?
Which operation is performed while creating a VM snapshot?
Create a delta file to record changes to the virtual disk since the session is activated
Capture the configuration data of a VM to create an identical copy of the VM
Create a journal volume to update changes to the snapshot
Create a “Gold” copy of the snapshot before copying changes to the virtual disk
Which cloud computing capability enables monitoring and reporting resource usage?
In the context of protecting the FC SAN infrastructure, what is an example of infrastructure integrity?
Preventing node login to the fabric without proper authorization
Implementing iSNS discovery domains
Implementing an FSPF algorithm to create a virtual SAN
Not permitting physical segmentation of nodes
What is true about parity-based RAID?
Parity is updated each time a write is performed
Parity is read each time a read is performed
Parity is updated only when writes fill a stripe
Parity is updated each time when both reads and writes are performed
What is an accurate statement about a gateway NAS solution?
NAS head and storage are managed independently
Consolidates file-level and block-level access on a single storage platform
Provides integrated management for both NAS head and storage
Creates a single file system that runs on all NAS heads
What is prevented using RAID technology?
Host Bus Adapter failures
Which process minimizes the exposure to a loss of uncommitted cached data when there is a power failure?
What are the three elements of the risk triad from an information security perspective?
Assets, threats, and vulnerabilities
Actions, threats, and vulnerabilities
Assets, threats, and countermeasures
Assets, countermeasures, and vulnerabilities
Which cloud computing characteristic enables consumers to request resources using a service catalog through a web-based user interface?
Broad network access
What is a purpose for distributing Switch Registered State Change Notifications (SW-RSCNs) in a fabric?
Updates the name server on all switches in the fabric
Stops or slows down transmissions from other switches in the fabric
Distributes configuration values and congestion notifications across the fabric
Exchanges requests for change notifications among distributed management servers
In the Fibre Channel protocol, what are functions of the FC-1 layer?
Encoding and decoding
Routing and flow control
Interface mapping and flow control
Transmission of raw bits and encoding
What is a security implementation in NAS environments?
In an FC SAN environment, what is a benefit of zoning?
Restricts RSCN traffic
Isolates fabric services
Enables online volume expansion
Provides non-disruptive data migration
What is the RAID 5 write penalty for random, small write I/Os?
Which EMC block-level storage virtualization product enables hosts from two different data centers to access a single copy of data?
Which EMC product enables VNX array-based remote replication from a primary volume to a secondary volume residing on a different VNX storage system?
A customer has a requirement to perform a backup each night. However, the customer has a limited amount of time for backups to run on week nights, Monday through Friday evenings.
Which backup granularity type is recommended to meet the backup window for those nights?
What is a characteristic of a scale-out NAS?
Up to four file systems can be created across the cluster
File system grows dynamically as nodes are added in the cluster
Distinct file systems are created on each node in the cluster
Different file systems can be mixed on each node in a single cluster
In a Microsoft Windows file sharing environment, what is a function of system access control lists (SACL)?
Determines object access information that needs to be audited
Provides information on system access troubleshooting
Uniquely identifies objects, users, and user groups
Provides path name to access both inbound and outbound traffic
What is an advantage of synchronous remote replication compared to other remote replication methods?
Near zero RTO
Near zero RPO
No distance limitation
Faster response time
What is an advantage of sub-LUN tiering?
Enhanced reliability and availability
Dynamic expansion of storage capacity
Faster provisioning of thin LUNs
Which fabric service is responsible for managing and distributing Registered State Change Notifications (RSCNs) to attached node ports?
Fabric login server
Which SAN security mechanism will prevent a switch port from being enabled even after a switch reboot?
Persistent Port Disable
Persistent Switch Disable
What does a block map contain in a file system snapshot?
Original data when a write is issued to the target for the first time
Blocks that have changed since the creation of the snapshot
Address from which data is to be read when accessing the snapshot
Blocks that have been modified in either the source or the target
What describes a full mesh topology?
All switches are directly connected to each other
Consists of core and edge switch tiers
Requires four switches
Requires two ISL hops for host to storage traffic
What is a characteristic of pointer-based virtual replication?
Replica device is at least as large as the source device
Replica is immediately available after activation of a replication session
Replica is available only after detachment from the source
Source does not need to be healthy for the restore
When using the image-based backup approach to backup a virtual machine, where does the backup client run?
Which NAS implementation consolidates file-based and block-based access on a single storage platform?
Which data deduplication method increases the chance of identifying duplicate data even when there is only a minor difference between two documents?
Which operation is performed by an FCoE switch when it receives a frame with an FCoE Ethertype?
Switch recognizes that the frame contains an FC payload and forwards it to the FC Forwarder
Switch recognizes the frame as Ethernet and forwards it to the Ethernet bridge
Switch recognizes the frame as FCoE and forwards it to the Ethernet bridge
Switch recognizes that the frame contains an Ethernet payload and forwards it to the FC Forwarder
What is a key advantage of data striping across multiple disks as compared to a single disk?
Which EMC product is a disk-based backup and recovery solution and provides source-based data deduplication?
When a service is described as “three 9s available”, what is the approximate amount of downtime allowed per week?
What is a characteristic of an FC-SW implementation?
Provides a dedicated path between nodes
Nodes arbitrate to gain control of the data path to transfer data
Only one node can perform an I/O operation at a time
Supports up to 126 nodes
Which functionality is offered by user access management software?
Enables a user to create VMs and allocate them to CPU, memory, and storage capacity
Provides a user interface to browse the service catalog and request cloud services
Provides a user interface to view a consolidated view of existing physical and virtual infrastructures across data centers
Allows a user to monitor performance, capacity, and availability of physical and virtual resources centrally
What are the key components of an intelligent storage system?
Front-end, cache, back-end, and physical disks
Host, connectivity, back-end, and storage array
Switch, ports, back-end, and physical disks
Host, LUNs, cache, and physical disks
A customer requires additional storage capacity. The storage expansion must be fast and performance is not a constraint. What is the most appropriate LUN expansion method?
Which iSCSI discovery mechanism requires manual configuration of the initiator with the target’s network portal?
iSCSI service location discovery
Internet Storage Name Service
iSCSI domain name discovery
What is a characteristic of asynchronous remote replication?
Writes are committed to the target before being committed to the source
Only the last update is transmitted if there are multiple writes to the same location in the buffer
Reads are always serviced from the target replica
Distance between the two sites is restricted to less than 200 km
What is a characteristic of Big Data?
Structured and unstructured data generated by multiple sources
Structured data generated by a single source
Only unstructured data generated by multiple sources
Structured and unstructured data generated by a single source
A stripe depth of 64 KB has been assigned to a five-disk RAID 0 set. What is the stripe size?
A user tries to update the content of a file stored on a CAS system. What is the result of this operation?
CAS generates a new address for the altered content and stores it as a new object
CAS uses the same content address for the altered content and the original content
CAS overwrites the original content and generates a new content address
CAS overwrites the original content but the content address is preserved
Which EMC product provides target-based deduplication?
What are the two mechanisms that can be employed to address threats of user identity spoofing?
Access Control Lists (ACLs) and access control to storage objects
User authentication and user authorization
Access control to storage objects and auditing
User authentication and Information Rights Management (IRM)
What is the function of enhanced transmission selection in an FCoE environment?
Provides available bandwidth to other classes of traffic when a particular class of traffic does not use its allocated bandwidth
Provides the capability to independently pause transmission of FCoE frames over each virtual link
Enables an FCoE switch to send a signal to other FCoE switches that need to stop or slow down their transmissions
Allows an FCoE switch to distribute configuration parameters to the converged network adapters
Which benefit is provided by EMC PowerPath?
Dynamic load balancing
Deduplication of network traffic
Multiplexing host traffic
Segmentation of fabric to create VSANs
In a CAS environment, what is used to generate a content address?
Binaries of the data
Combination of data and metadata of the object
Location of the object
Which iSCSI naming feature uses a 16-character hexadecimal string?
What describes a repudiation attack?
An attempt to compromise accountability goals of the security
Stealing a private key to decrypt the data-in-transit
Unauthorized access to information to compromise confidentiality
A series of repetitive attacks to the physical information infrastructure
A department within an organization requires 200 GB of storage for their business application. The production LUN is RAID 1+0 protected and has a local and remote replica. The local replica is on a RAID 1 LUN and the remote replica is on a five-disk RAID 5 LUN.
If the cost per GB of storage is $2.00, what is the chargeback cost to the department for application storage?
What is a characteristic of an FC-AL implementation?
Reserves one address for connecting an FC-SW port
Supports connectivity up to 15 million nodes
Devices can be added and removed dynamically without any impact
Requires at least one connectivity device
Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?
NIC with software-based iSCSI initiator
TCP offload engine
Converged Network Adapter
What is a characteristic of an enterprise flash drive?
Uses semiconductor-based solid state media
Performs data search and retrieval sequentially
Performs rotational speed at more than 30000 rpm
Writes once and reads many
What defines the time taken to position the sector on the platter under the read/write head?
Data transfer rate
What is true about cache dirty page?
Data that has changed but is not yet written to disk
Data read from disk but not accessed by the host
Data that has changed and has been written to disk
Data requested by the host but not yet fetched
As your organization’s SAN environment grows, you realize there is a greater need to manage SAN security. Which mechanism is required to prevent unauthorized activity on the FC fabric for management operations?
Role-based access control
Access control lists
Which operation is performed by a scale-out NAS when it receives a large write I/O from its clients?
I/O is striped across multiple nodes for processing
I/O is sent to the high performance node in the cluster for processing
A new node is dynamically added to the cluster to process the I/O
I/O is sent to the high storage capacity node in the cluster for processing
When developing a disaster recovery plan, what is the result of choosing a particular recovery time objective for a system?
Determines the type and location of the backup media
Determines how often to take a backup of the system
Determines how long to retain backup copies
Determines how many transaction logs should be backed up
Which operation writes data in cache, and immediately to disk, before sending an acknowledgement to the host?
Write aside cache
Write cache vaulting
What is a benefit of WWN zoning over port zoning?
A server, after being moved to another switch port in the fabric, maintains connectivity to its zone partners without the need to modify the zoning configuration
A server, after replacement of its HBAs, maintains connectivity to its zone partners without the need to modify the zoning configuration.
A server, after replacement of its HBAs, does not require performing a fabric login to maintain connectivity to its zone partners.
A server, after being moved to another fabric, maintains connectivity to its zone partners without the need to modify the zoning configuration.
A department conducts business, Monday through Saturday from 9 A.M. to 5 P.M. each day. The department takes in revenue on an average of $500,000 per week. Employee salaries are approximately $5,000 per week. The department requires the use of a computer system with an RPO of 2 hours and an RTO of 4 hours.
To determine the business impact of downtime, what is the average cost of downtime per hour of the business
In Kerberos authentication, what is a role of the Active Directory?
Verifies the user’s login information
Implements the Authentication service and Ticket Granting service
Verifies the session ID when the client-server session is established
Maintains the access control list in a keytab file
A finance department wants to secure its data while the data traverses over the FC SAN. Currently the SAN is also used by other departments in the organization.
Which implementation should be recommended to isolate other department traffic from the finance department traffic?
Which data center characteristic refers to the capability to grow resources without impacting business operations?
What is an advantage of reporting on storage arrays?
Planning for capacity
Monitoring the number of arrays
Monitoring the number of disks in a RAID group
Planning for storage groups
A customer wants to connect iSCSI-enabled hosts to an existing Fibre Channel (FC) storage array. Which networking device enables the connectivity between the host and the storage array?
What is a benefit of virtual storage provisioning over traditional provisioning?
Enables more efficient allocation of storage to hosts
Can be used for applications that require predictable performance
Provides full control for precise data placement
Does not enable oversubscription
Cloud infrastructure package
Block-based storage device
Virtual tape library
Which report provides information about the allocation and utilization of storage infrastructure components by various departments or user groups?
Configuration and Asset Management
Which component of an archiving solution is responsible for scanning data that can be archived based on a policy?
Archiving policy server
Archiving storage device
What describes a hybrid cloud?
Combination of two distinct cloud infrastructures (on-premise and externally-hosted) that are managed together
Composed of distinct clouds that are bound together by standardized or proprietary technology
Composed of two or more distinct data centers that enable data and application portability
Combination of a private cloud and a public cloud that are owned, managed, and operated by a single organization
What is a requirement for a native iSCSI implementation?
Host with an iSCSI HBA and an array with an iSCSI port
Host with a NIC and an array with an FCoE port
Host with iSCSI initiator software and an array with an FCIP port
Host with an iSCSI HBA and an array with an FC port
In addition to applications and databases, what are the other core elements of a data center infrastructure?
JBOD, networks, and storage arrays
Servers/operating systems, DAS, and NAS
Servers/operating systems, networks, and storage arrays
Servers/operating systems, SAN, and JBOD
Why does a restore operation need to communicate with the backup server?
Locate the data to be restored using the backup catalog
Determine the RTO of the backup save set
Run the restore automatically according to a schedule
Determine the RPO of the backup save set
Which data protection technology provides the highest degree of protection against logical corruption and a near-zero RPO?
Snapshots with CoFW
Which remote replication solution has the highest bandwidth requirements?
Array-based disk buffered
Host-based asynchronous LVM mirroring
Log shipping over IP networks
In a Fibre Channel (FC) SAN, which protocol implementation is used?
SCSI over FC
SCSI over FCoE
FC over iSCSI
FC over SCSI
Which NAS backup environment transfers data to be backed up over a private backup network?
Which three subject areas, taken together, define storage security?
Information, networking, and storage
Access control, storage, and encryption
Access control, information, and networking
Application, management, and backup
If a disk drive’s rotational speed is 10000 revolutions per minute, what is its average rotational latency?
In the context of information security, which attribute other than individual identity and group membership can be used to restrict unauthorized access?
World Wide Name
Host network address
What is a characteristic of an active/passive storage array configuration?
Host can perform I/Os to its LUNs through any of the available controllers
Read and write I/Os are performed only through the controller that manages the LUN
Read and write I/Os are performed only through active cache
Passive array is used for backup; active array is used for production data
An eight-disk RAID 6 set has a stripe size of 192 KB. What is the stripe depth?
What is a key benefit of RAID 5 compared to RAID 1+0 for small, random I/Os?
Improved storage space utilization
Improved write performance
Faster rebuild times after failure
A near-zero RPO disaster recovery solution
Write must be committed at the target before being acknowledged as complete
Deployed only for distances within 200 km between two sites
Replica will be behind the source by at least the size of the buffer
What is a characteristic of triangle/multitarget replication?
Failover can occur to either of the two remote sites
Distance between all sites must be less than 125 km
Bunker site must be in sync with the remote site at all times
Only the production site is available during normal operations
What is a characteristic of cloud-optimized storage?
Single access mechanism
What is the name of the drive sub-assembly which contains the platters and read/write heads?
Which two mechanisms address threats of elevating user privileges in the application access domain?
Access control to storage objects and Access Control Lists (ACLs)
Authentication and authorization
A customer has an existing SAN environment. The customer wants to add NAS to share the storage space. Which solution is most appropriate?