Information Storage and Management v4 exam v1.0 (DEA-1TT4)

Page:    1 / 8   
Total 126 questions

DRAG DROP -
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Select and Place:




Answer :

If a company has experienced a passive attack on its IT infrastructure, how is the company's security impacted?

  • A. Access to services is denied.
  • B. Availability of data is affected.
  • C. Information privacy is compromised.
  • D. Data is altered by an unauthorized user.


Answer : D

A company is planning to perform a cloud-based backup. They want to send their data over a public network to a cloud backup device.
Which security control mechanism helps to protect the data from an attacker?

  • A. Multi-factor authentication
  • B. Demilitarized zone
  • C. Data shredding
  • D. Encryption


Answer : D

A company wants to implement a Fibre Channel (FC) SAN topology. The implementation will involve deploying four switches for localized compute and storage system connectivity. In addition, to meet their applications"™ performance requirements, they need a maximum of one ISL and redundant connections for their compute to storage traffic.
Which topology should be recommended?

  • A. Full mesh topology
  • B. Bus topology
  • C. Partial mesh topology
  • D. Single-switch topology


Answer : A

Reference:
https://www.mycloudwiki.com/san/fc-san-topologies/

Which technology uses the concept that real-life objects can independently share and process information with minimal human interaction?

  • A. Deep Learning
  • B. Cloud computing
  • C. Internet of Things
  • D. Artificial Intelligence


Answer : C

Reference:
https://www.i-scoop.eu/internet-of-things-guide/

DRAG DROP -
Match the virtual machine (VM) file with its description.
Select and Place:




Answer :

Reference:
https://www.vmware.com/support/ws55/doc/ws_learning_files_in_a_vm.html

Which Dell EMC product provides a software-defined platform that supports both block and file storage services?

  • A. XtremIO
  • B. PowerMax
  • C. FAST VP
  • D. VPLEX


Answer : D

Why is it important for organizations to implement a backup solution in a data center environment?

  • A. Improve the integrity of critical data
  • B. Ensure the availability of production data
  • C. Minimize the cost of data protection
  • D. Reduce redundant data in a production environment


Answer : B

DRAG DROP -
What is the correct sequence of steps to authenticate an initiator and a target using one-way Challenge Handshake Authentication Protocol (CHAP) after the initiator performs a login to the target?
Select and Place:




Answer :

Reference:
https://books.google.com.pk/books?id=tPLBUi8JSogC&pg=PA357&lpg=PA357&dq=initiator+takes+the+shared+secret+and+calculates+the+value+using+a+one
+way+has+function+and+return+a+hash+value+to+the
+target&source=bl&ots=HlHg70jCh3&sig=ACfU3U19dz4gIF9nvPh_uLbkoEojyrKlsg&hl=en&sa=X&ved=2ahUKEwjMp_PPluTrAhWZA2MBHX0IBv8Q6AEwBnoEC
AoQAQ#v=onepage&q=Takes%20shared%20secret%20and%20calculates%20value%20using%20a%20oneway%20has&f=false
(figure 14-10)

What is a characteristic of the Orchestration layer in a modern data center architecture?

  • A. Interacts directly with physical components across layers to begin provisioning tasks
  • B. Enables automatic updates of offerings listed in the service catalog with pre-defined workflows
  • C. Allows centralized, automated, and policy-driven management of heterogeneous resources
  • D. Enables automated arrangement, coordination, and management of resource provisioning tasks


Answer : D

Reference:
https://www.bmc.com/blogs/it-orchestration-vs-automation-whats-the-difference/


Which operation is represented in the exhibit?

  • A. Write-back Cache
  • B. Read Cache Miss
  • C. Write-through Cache
  • D. Read Cache Hit


Answer : A

Reference:
https://doc.opensuse.org/documentation/leap/virtualization/html/book-virt/cha-cachemodes.html

Which management function involves configuring LUN masking to restrict hosts from accessing a specific LUN in a data center environment?

  • A. Performance Management
  • B. Change Management
  • C. Security Management
  • D. Configuration Management


Answer : C

Reference:
https://sites.google.com/site/testwikiforfirstciscolab/shd/14-securing-the-storage-infrastructure

What is an accurate statement about a virtual SAN (VSAN)?

  • A. Events causing traffic disruptions in one VSAN are propagated to other VSANs
  • B. Nodes that are present in different VSANs should not have the same FC address
  • C. Every VSAN created on a physical SAN must have the same fabric configuration
  • D. Each VSAN has its own fabric services, configuration, and set of FC addresses


Answer : D

Reference:
https://www.mycloudwiki.com/san/fc-san-virtualization/

Which Converged Network Adapter (CNA) component encapsulates Fibre Channel (FC) frames into Ethernet frames?

  • A. PCIe Bus
  • B. Fibre Channel HBA
  • C. Fibre Channel Forwarder
  • D. FCoE ASIC


Answer : B

Reference:
https://www.mycloudwiki.com/san/fcoe-san-overview/

Which parameters define information availability in an IT environment?

  • A. Capacity, Availability, and Performance
  • B. Reliability, Integrity, and Performance
  • C. Confidentiality, Integrity, and Availability
  • D. Reliability, Accessibility, and Timeliness


Answer : A

Reference:
https://www.mycloudwiki.com/san/storage-infrastructure-management-overview/

Page:    1 / 8   
Total 126 questions