3.
What does the "X" represent in the graphic?
Reference
Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN
Training: Information Storage and Management: Module: Fibre Channel SAN, slide: Port Types in a Switched Fabric
6.
Based on the graphic, what does the "X" represent?
Reference
Topic: Describe TCP/IP, IP SAN, iSCSI protocol, components, connectivity, addressing, discovery domains, and VLAN
Training: Information Storage and Management: Module: IP SAN, Slide: iSCSI Connectivity
8.
If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI?
Reference
Topic: Describe the storage infrastructure management functions and processes
Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Configuration Management
9.
What is the fundamental unit of data transfer in an FC network?
Reference
Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN
Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Structure and Organization of FC Data
11.
What will enable a company to plan for the frequency of their backups?
Reference
Topic: Describe the information availability measurements and key fault tolerance techniques
Training: Information Storage and Management: Module: Introduction to Business Continuity, Slide: Key BC Concepts: RPO and RTO
12.
What is the advantage of adopting OpenID by an organization?
Reference
Topic: Explain key security controls to protect the storage infrastructure
Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: OpenID
13.
When using the erasure coding technique in an object-based storage system, data is divided into 8 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration?
Reference
Topic: Describe object-based storage device components, functions, operations, and unified storage architecture
Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide Object Protection: Erasure Coding
14.
What is an accurate statement about NAS?
Reference
Topic: xplain the NAS components and architecture, NAS file sharing methods, and file-level virtualization and tiering
Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: What is NAS?
15.
What accurately describes an NDMP-based backup in a NAS environment?
Reference
Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: NDMP-based Backup
16.
What provides users with self-service access to pre-defined storage services?
Reference
Topic: Describe software-defined storage attributes, architecture, functions of the control plane, software-defined extensibility, and software-defined networking functionalities
Training: Information Storage and Management: Module: Software-Defined Storage (SDS) and Software-Defined Networking (SDN), Slide: Resource Provisioning
17.
A company's assets are continuously under attack. To deploy a security control mechanism to protect these assets, what should be considered?
Reference
Topic: Describe the information security goals, terminologies, various security domains, and threats to a storage infrastructure
Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Security Concepts: Assets and Threats
19.
What is an accurate statement about a Converged Network Adapter (CNA)?
Reference
Topic: Explain the components and connectivity of FCIP and FCoE
Training: Information Storage and Management: Module: IP SAN, Slide: What is CNA?
22.
What is an accurate statement about cache vaulting?
Reference
Topic: Explain the components of block-based storage system, storage provisioning, and storage tiering mechanisms
Training: Information Storage and Management: Module: Block-based Storage Systems, Slide: Cache Data Protection
23.
What is an advantage of performing capacity monitoring in a storage infrastructure environment?
Reference
Topic: Describe the storage infrastructure management functions and processes
Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Capacity Monitoring
28.
What is an advantage of deploying a storage area network (SAN) in a data center environment?
Reference
Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN
Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Benefits of SAN
29.
Why do organizations prefer to adopt cloud-based archiving?
Reference
Topic: Describe data deduplication and data archiving solutions architecture
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Cloud-based Archiving
30.
Which functionality is provided by the REST API in a software-defined storage environment?
Reference
Topic: Describe software-defined storage attributes, architecture, functions of the control plane, software-defined extensibility, and software-defined networking functionalities
Training: Information Storage and Management: Module: Software-Defined Storage (SDS) and Software-Defined Networking (SDN), Slide: Software-Defined Storage Architecture
32.
Which security control allows a client to access protected resources from a resource server on behalf of a resource owner?
Reference
Topic: Explain key security controls to protect the storage infrastructure
Training: Information Storage and Management: Module: Securing the Storage Infrastructure. Slide: OAuth
33.
What is the correct sequence of steps to perform a scale-up NAS I/O operation?
Reference
Topic: Explain the NAS components and architecture, NAS file sharing methods, and file-level virtualization and tiering
Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: Scale-Up NAS I/O Operation
34.
What is a recommendation for a virtual machine (VM) snapshot?
Reference
Topic: Describe replication uses, and replication and migration techniques
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Local Replication: VM Snapshot
35.
An organization is evaluating a cloud deployment solution that allows them to select various cloud service providers. They want to avoid vendor lock-in issues while optimizing performance and cost. Which recommended cloud deployment model will meet their requirements?
Reference
Topic: Explain the cloud characteristics, cloud service models, and cloud deployment models
Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: Evolution of Hybrid Cloud - Multi-cloud
36.
Why is it important for organizations to accelerate their digital transformation efforts?
Reference
Topic: Describe the data classification, elements of a data center, key characteristics of a data center, and key technologies driving digital transformation
Training: Information Storage and Management: Module: Introduction to Information Storage, Slide: Digital Transformation
37.
Which task is performed during authentication using Challenge Handshake Authentication Protocol (CHAP) control?
Reference
Topic: Explain key security controls to protect the storage infrastructure
Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Challenge Handshake Authentication Protocol
39.
What is an example of an Availability Management task in storage infrastructure management?
Reference
Topic: Describe the storage infrastructure management functions and processes
Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Availability Management
40.
What happens when a write request to a valid page is received in a solid-state drive?
Reference
Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures
Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: Solid-state Drive-Page State
42.
Why do organizations need a malware protection software?
Reference
Topic: Explain key security controls to protect the storage infrastructure
Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Malware Protection
43.
What accurately describes an image-based backup?
Reference
Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Image-Based Backup
44.
A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?
Reference
Topic: Describe a compute system, storage, connectivity in a data center, application, and options to build a modern data center
Training: Information Storage and Management: Module: Modern Data Center Infrastructure, Slide: What is Desktop Virtualization
45.
What is an accurate statement about unstructured data?
Reference
Topic: Describe the data classification, elements of a data center, key characteristics of a data center, and key technologies driving digital transformation
Training: Information Storage and Management: Module: Introduction to Information Storage, Slide: What is information?
48.
In a backup operation, what is the correct sequence of steps after the backup server initiates the scheduled backup process?
Reference
Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Backup Operation
50.
Which factors affect the recovery point objective (RPO) in a storage system-based asynchronous remote replication?
Reference
Topic: Describe replication uses, and replication and migration techniques
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Remote Replication: Asynchronous
51.
What is the stripe size of a 5-disk RAID 5 group with a strip size of 32 KB?
Reference
Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures
Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: RAID 5
52.
Why do organizations prefer to adopt Disaster Recovery as a Service (DRaaS)?
Reference
Topic: Describe replication uses, and replication and migration techniques
Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Disaster Recovery as a Service (DRaaS)
53.
What is an advantage of sub-LUN tiering?
Reference
Topic: Explain the components of block-based storage system, storage provisioning, and storage tiering mechanisms
Training: Information Storage and Management: Module: Block-based Storage Systems, Slide: LUN and FAST VP Tiering
54.
What happens when a disk fails in a RAID 5 array configured with a hot spare?
Reference
Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures
Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: RAID 5, Dynamic Disk Sparing
55.
What is an accurate statement about a TCP offload engine (TOE) NIC with a software iSCSI adapter?
Reference
Topic: Describe TCP/IP, IP SAN, iSCSI protocol, components, connectivity, addressing, discovery domains, and VLAN
Training: Information Storage and Management: Module: IP SAN, Slide: Types of iSCSI Initiator
56.
What is an advantage of using a single-switch topology for a Fibre Channel (FC) SAN deployment?
Reference
Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN
Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Single-switch Topology
57.
An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 2 occurs as follows:
Monday = 5 PM to 9 PM
Wednesday = 4 PM to 9 PM
Friday = 6 AM to 9 AM
Sunday = 9 AM to 1 PM
What is the MTBF of Port 2?
Reference
Topic: Describe the information availability measurements and key fault tolerance techniques
Training: Information Storage and Management: Module: Introduction to Business Continuity, Slide: Exercise: MTBF and MTTR
59.
Which product delivers both Infrastructure as a Service and Platform as a Service to provide a consistent experience on-premise and in the public cloud?
Reference
Topic: Explain the cloud characteristics, cloud service models, and cloud deployment models
Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: Concepts in Practices
60.
Which hypervisor component is responsible for assigning system resources to a virtual machine?
Reference
Topic: Describe the building blocks of a modern data center
Training: Information Storage and Management: Module: Modern Data Center Infrastructure, Slide: What is Hypervisor?
61.
What is the function of MapReduce in big data analytics?
Reference
Topic: Explain the key characteristics of big data, components of a big data analytics solution, Internet of Things, machine learning, and artificial intelligence
Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: MapReduce
62.
What is an accurate statement about Zoning?
Reference
Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN
Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Zoning
63.
Which object-based storage system feature provides self-configuring and self-healing capabilities to reduce complexity and downtime?
Reference
Topic: Describe object-based storage device components, functions, operations, and unified storage architecture
Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: Key Features of OSD
|