A fibre Channel switch has eights ports and all ports must be operational 24 X However, a failure of Port occurs on a particular week as follows


NAS system converts the I/O request into block-level I/O and performs the operation



Download 460.47 Kb.
Page3/6
Date02.06.2021
Size460.47 Kb.
1   2   3   4   5   6
NAS system converts the I/O request into block-level I/O and performs the operation



Client packages an I/O request into TCP/IP and forwards it through the network stack



NAS system packages the response into TCP/IP again and forwards it to the client through the network



NAS system receives the I/O request from the network



NAS system receives the data from storage and processes the data into an appropriate file protocol response



34.

What is a recommendation for a virtual machine (VM) snapshot?



Both parent VMs' virtual disk file and the snapshot’s child virtual disk file should have the same number of files

Both parent VMs' virtual disk file and the snapshot’s child virtual disk file should be the same size

Parent VM must be healthy in order to use the snapshot for a rollback operation

Always create small snapshots from a parent VM to improve the utilization of the storage system



35.

An organization is evaluating a cloud deployment solution that allows them to select various cloud service providers. They want to avoid vendor lock-in issues while optimizing performance and cost. Which recommended cloud deployment model will meet their requirements?



Community cloud

Public cloud

Multi-cloud

Private cloud


36.

Why is it important for organizations to accelerate their digital transformation efforts?



Adopt modern digital products to significantly reduce CAPEX and OPEX

Avoid virtualizing the IT resources across data centers to minimize the utilization

Maintain a competitive advantage in a digital environment

Develop and deploy modern applications using only public cloud resources



37.

Which task is performed during authentication using Challenge Handshake Authentication Protocol (CHAP) control?



Uses a hash function to convert the secret code into a hash value that is shared between initiator and target

Authenticates client-server applications over the network by using shared-key cryptography

Enables an organization to use authentication services from an identity provider

Allows a client to access protected resources from a resource server on behalf of a resource owner



38.

What accurately describes modern applications?



Single structured and the modules are interdependent

Designed to be distributed and developed using multiple programming languages

Built using a single programming language and framework

Single structured and used by multiple programming languages



39.

What is an example of an Availability Management task in storage infrastructure management?



Tracking configuration changes to storage components

Specifying storage space quotas for internal users

Performing trend analysis of storage space consumption

Designing a new replication solution for data redundancy



40.

What happens when a write request to a valid page is received in a solid-state drive?



Requested page is marked invalid and the write continues with an available empty page

Write request is queued until the requested page is erased

Requested page is overwritten by the new page

Requested page is electrically erased and the write continues with the erased page



41.

Which task is performed during infrastructure discovery?



Gathers issues and tracking movement of data and services across the infrastructure

Creates a list of infrastructure components and their related information

Classifies, organizes, and analyzes all infrastructure management best practices stored in data lakes

Standardizes on-going infrastructure management activities to maintain the storage infrastructure using automation



42.

Why do organizations need a malware protection software?



Secure critical applications by using strong credentials

Protect applications and the OS against trojan horse programs

Prevent authorized modification of OS-sensitive areas

Prevent eavesdropping and tampering of application data


43.

What accurately describes an image-based backup?



Agent is required inside the virtual machine to perform the backup

Recovery at both virtual machine and file levels is supported

External deduplication software is not required

Unique virtual machine images must be backed up from storage

44.

A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?



Network as a Service

Desktop as a Service

Database as a Service

Storage as a Service


45.

What is an accurate statement about unstructured data?



Created using only a specific tool and needs a relational database to store the data

Organized in rows and columns within named tables to efficiently store and manage data

Difficult to extract information from data using traditional applications and requires considerable resources

Created using only specific client devices and consumes large volumes of storage space


46.

What accurately describes an FCIP tunnel?



Consists of a unified connection between two FCIP ports on FC switches on both sides of an FC network

Consists of one or more independent connections between two FCIP ports on gateways

Consists of a single trunk link connection between two FCIP ports on gateways

Consists of one or more independent connections between two FC ports on both sides of an FC network


47.

What does a domain ID represent in Fibre Channel (FC) addressing?



Unique number provided to each switch in the fabric

Unique number provided to each port within a switch

Unique number provided to a group of switches

Unique number provided to a group of switch ports



48.

In a backup operation, what is the correct sequence of steps after the backup server initiates the scheduled backup process?






Download 460.47 Kb.

Share with your friends:
1   2   3   4   5   6




The database is protected by copyright ©ininet.org 2020
send message

    Main page