DRAG DROP -
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Select and Place:
Answer :
If a company has experienced a passive attack on its IT infrastructure, how is the company's security impacted?
Answer : D
A company is planning to perform a cloud-based backup. They want to send their data over a public network to a cloud backup device.
Which security control mechanism helps to protect the data from an attacker?
Answer : D
A company wants to implement a Fibre Channel (FC) SAN topology. The implementation will involve deploying four switches for localized compute and storage system connectivity. In addition, to meet their applications"™ performance requirements, they need a maximum of one ISL and redundant connections for their compute to storage traffic.
Which topology should be recommended?
Answer : A
Reference:
https://www.mycloudwiki.com/san/fc-san-topologies/
Which technology uses the concept that real-life objects can independently share and process information with minimal human interaction?
Answer : C
Reference:
https://www.i-scoop.eu/internet-of-things-guide/
DRAG DROP -
Match the virtual machine (VM) file with its description.
Select and Place:
Answer :
Reference:
https://www.vmware.com/support/ws55/doc/ws_learning_files_in_a_vm.html
Which Dell EMC product provides a software-defined platform that supports both block and file storage services?
Answer : D
Why is it important for organizations to implement a backup solution in a data center environment?
Answer : B
DRAG DROP -
What is the correct sequence of steps to authenticate an initiator and a target using one-way Challenge Handshake Authentication Protocol (CHAP) after the initiator performs a login to the target?
Select and Place:
Answer :
Reference:
https://books.google.com.pk/books?id=tPLBUi8JSogC&pg=PA357&lpg=PA357&dq=initiator+takes+the+shared+secret+and+calculates+the+value+using+a+one
+way+has+function+and+return+a+hash+value+to+the
+target&source=bl&ots=HlHg70jCh3&sig=ACfU3U19dz4gIF9nvPh_uLbkoEojyrKlsg&hl=en&sa=X&ved=2ahUKEwjMp_PPluTrAhWZA2MBHX0IBv8Q6AEwBnoEC
AoQAQ#v=onepage&q=Takes%20shared%20secret%20and%20calculates%20value%20using%20a%20oneway%20has&f=false
(figure 14-10)
What is a characteristic of the Orchestration layer in a modern data center architecture?
Answer : D
Reference:
https://www.bmc.com/blogs/it-orchestration-vs-automation-whats-the-difference/
Answer : A
Reference:
https://doc.opensuse.org/documentation/leap/virtualization/html/book-virt/cha-cachemodes.html
Which management function involves configuring LUN masking to restrict hosts from accessing a specific LUN in a data center environment?
Answer : C
Reference:
https://sites.google.com/site/testwikiforfirstciscolab/shd/14-securing-the-storage-infrastructure
What is an accurate statement about a virtual SAN (VSAN)?
Answer : D
Reference:
https://www.mycloudwiki.com/san/fc-san-virtualization/
Which Converged Network Adapter (CNA) component encapsulates Fibre Channel (FC) frames into Ethernet frames?
Answer : B
Reference:
https://www.mycloudwiki.com/san/fcoe-san-overview/
Which parameters define information availability in an IT environment?
Answer : A
Reference:
https://www.mycloudwiki.com/san/storage-infrastructure-management-overview/