Information Storage and Management Version 3 Exam v6.0 (E05-001)

Page:    1 / 12   
Total 171 questions

The exhibit represents an FCIP tunnel configuration that merges the two FC SANs at either end of the tunnel. Which types of ports do the labels "X" and "Y" represent on the FCIP gateway shown in the exhibit?


  • A. X = E_Port and Y = VE_Port
  • B. X = F_Port and Y = VN_Port
  • C. X = VF_Port and Y = E_Port
  • D. X = VN_Port and Y = VE_Port


Answer : A

Which component of a software-defined storage (SDS) environment manages and provisions storage?

  • A. SDS controller
  • B. REST API
  • C. SDS web service
  • D. Storage agent


Answer : A

What is an accurate statement about remote desktop services?

  • A. Operating system and applications hosted on a remote compute system are shared by multiple users
  • B. Users are provided dedicated virtual machines running operating system and applications, and hosted on a client system
  • C. Users have the flexibility to install applications and modify operating system settings on the remote compute system
  • D. Users' interface of the remote desktop is transmitted to the client without the use of a remote display protocol


Answer : A

What is a function of the orchestration layer in a data center infrastructure?

  • A. Provides workflows for automated execution of management tasks
  • B. Aggregates physical infrastructurecomponents into resource pools
  • C. Measures the consumption of IT resources byvarious services
  • D. Decouples an operating environment from the underlying hardware


Answer : A

What accurately describes an attack vector in an IT infrastructure?

  • A. Series of steps that must be followed in order to complete an attack
  • B. Various entry points that can be used to launch an attack
  • C. Amount of effort required to exploit vulnerabilities in the infrastructure
  • D. Process of identifying the system components under attack


Answer : A

What is a benefit of deploying a Defense in Depth strategy?

  • A. Provides additional time for organizations to detect and respond to an attack
  • B. Eliminates the attack vector from the IT infrastructure
  • C. Eliminates the attack surface from the IT infrastructure
  • D. Enables organizations to deploy a unified security solution


Answer : A

What is an example of an active attack on an IT infrastructure?

  • A. Attempt to modify information for malicious purposes
  • B. Attempt to copy the data from the storage system
  • C. Attempt to gain unauthorized access into the system
  • D. Attempt to gain access to the data in transit


Answer : A

What refers to an IT infrastructure's ability to function based on business expectations during its specified time of operations?

  • A. Information availability
  • B. Disaster recovery
  • C. Compliance adherence
  • D. Business agility


Answer : A

What is an accurate statement about an integrated NAS controller?

  • A. Contains a specialized operating system dedicated to file serving
  • B. Stripes data across multiple NAS systems for data protection
  • C. Abstracts and pools NAS controllers across multiple NAS systems
  • D. Contains an FC Forwarder that is optimized for file sharing functions


Answer : A

What is an accurate statement about a software RAID implementation?

  • A. Uses CPU cycles of a compute system to perform RAID calculations
  • B. Supports the upgrade of RAID software on incompatible O/S
  • C. Uses a specialized hardware controller to perform RAID calculations
  • D. Supports all RAID levels


Answer : A

In which stage of the business continuity planning lifecycle does an organization identify critical business processes and assign recovery priorities?

  • A. Analyzing
  • B. Establishing objectives
  • C. Designing and developing
  • D. Implementing


Answer : A

Which benefit does the measured service characteristic provide to a cloud service provider?

  • A. Enables control and optimization of resource use
  • B. Enables cloud services to communicate with each other
  • C. Enables availability of specific resources depending on policy
  • D. Enables the reduction and/or elimination of upfront IT expenditure


Answer : A

What is an accurate statement about infrastructure discovery?

  • A. Creates an inventory of infrastructure components and provides information about the components
  • B. Standardizes on-going infrastructure management activities andassesses potential risks of the activities
  • C. Classifies, organizes, and analyzes all infrastructure management bestpractices stored in data lakes
  • D. Detects potential security attacks on a storage infrastructure and deploys specialized tools to eliminate the attacks


Answer : A

What determines how far back the recovery points can go in a continuous data protection
(CDP) solution?

  • A. Amount of space that is configured for the journal
  • B. Size of the CDP appliance used for replication
  • C. Size of the source and replica volumes
  • D. Type of write splitter used for replication


Answer : A

Which solid state drive component performs write coalescing?

  • A. Controller
  • B. I/O interface
  • C. Non-volatile memory
  • D. Cache


Answer : A

Page:    1 / 12   
Total 171 questions