NAS system converts the I/O request into block-level I/O and performs the operation
|
Client packages an I/O request into TCP/IP and forwards it through the network stack
|
|
NAS system packages the response into TCP/IP again and forwards it to the client through the network
|
|
NAS system receives the I/O request from the network
|
|
NAS system receives the data from storage and processes the data into an appropriate file protocol response
|
34.
What is a recommendation for a virtual machine (VM) snapshot?
Both parent VMs' virtual disk file and the snapshot’s child virtual disk file should have the same number of files
|
Both parent VMs' virtual disk file and the snapshot’s child virtual disk file should be the same size
|
Parent VM must be healthy in order to use the snapshot for a rollback operation
|
Always create small snapshots from a parent VM to improve the utilization of the storage system
|
35.
An organization is evaluating a cloud deployment solution that allows them to select various cloud service providers. They want to avoid vendor lock-in issues while optimizing performance and cost. Which recommended cloud deployment model will meet their requirements?
Community cloud
|
Public cloud
|
Multi-cloud
|
Private cloud
|
36.
Why is it important for organizations to accelerate their digital transformation efforts?
Adopt modern digital products to significantly reduce CAPEX and OPEX
|
Avoid virtualizing the IT resources across data centers to minimize the utilization
|
Maintain a competitive advantage in a digital environment
|
Develop and deploy modern applications using only public cloud resources
|
37.
Which task is performed during authentication using Challenge Handshake Authentication Protocol (CHAP) control?
Uses a hash function to convert the secret code into a hash value that is shared between initiator and target
|
Authenticates client-server applications over the network by using shared-key cryptography
|
Enables an organization to use authentication services from an identity provider
|
Allows a client to access protected resources from a resource server on behalf of a resource owner
|
38.
What accurately describes modern applications?
Single structured and the modules are interdependent
|
Designed to be distributed and developed using multiple programming languages
|
Built using a single programming language and framework
|
Single structured and used by multiple programming languages
|
39.
What is an example of an Availability Management task in storage infrastructure management?
Tracking configuration changes to storage components
|
Specifying storage space quotas for internal users
|
Performing trend analysis of storage space consumption
|
Designing a new replication solution for data redundancy
|
40.
What happens when a write request to a valid page is received in a solid-state drive?
Requested page is marked invalid and the write continues with an available empty page
|
Write request is queued until the requested page is erased
|
Requested page is overwritten by the new page
|
Requested page is electrically erased and the write continues with the erased page
|
41.
Which task is performed during infrastructure discovery?
Gathers issues and tracking movement of data and services across the infrastructure
|
Creates a list of infrastructure components and their related information
|
Classifies, organizes, and analyzes all infrastructure management best practices stored in data lakes
|
Standardizes on-going infrastructure management activities to maintain the storage infrastructure using automation
|
42.
Why do organizations need a malware protection software?
Secure critical applications by using strong credentials
|
Protect applications and the OS against trojan horse programs
|
Prevent authorized modification of OS-sensitive areas
|
Prevent eavesdropping and tampering of application data
|
43.
What accurately describes an image-based backup?
Agent is required inside the virtual machine to perform the backup
|
Recovery at both virtual machine and file levels is supported
|
External deduplication software is not required
|
Unique virtual machine images must be backed up from storage
|
44.
A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?
Network as a Service
|
Desktop as a Service
|
Database as a Service
|
Storage as a Service
|
45.
What is an accurate statement about unstructured data?
Created using only a specific tool and needs a relational database to store the data
|
Organized in rows and columns within named tables to efficiently store and manage data
|
Difficult to extract information from data using traditional applications and requires considerable resources
|
Created using only specific client devices and consumes large volumes of storage space
|
46.
What accurately describes an FCIP tunnel?
Consists of a unified connection between two FCIP ports on FC switches on both sides of an FC network
|
Consists of one or more independent connections between two FCIP ports on gateways
|
Consists of a single trunk link connection between two FCIP ports on gateways
|
Consists of one or more independent connections between two FC ports on both sides of an FC network
|
47.
What does a domain ID represent in Fibre Channel (FC) addressing?
Unique number provided to each switch in the fabric
|
Unique number provided to each port within a switch
|
Unique number provided to a group of switches
|
Unique number provided to a group of switch ports
|
48.
In a backup operation, what is the correct sequence of steps after the backup server initiates the scheduled backup process?
Share with your friends: |