ISMv2-part2

Is this your test? Login to manage it. If not, you can make a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which operation is performed by a scale-out NAS when it receives a large write I/O from its clients?
2.
1 point
In the context of information security, which attribute other than individual identity and group membership can be used to restrict unauthorized access?
3.
1 point
Which operation writes data in cache, and immediately to disk, before sending an acknowledgement to the host?
4.
1 point
Which functionality is offered by user access management software?
5.
1 point
What describes a repudiation attack?
6.
1 point
What is an advantage of reporting on storage arrays?
7.
1 point
Which data center characteristic refers to the capability to grow resources without impacting business operations?
8.
1 point
When developing a disaster recovery plan, what is the result of choosing a particular recovery time objective for a system?
9.
1 point
Which iSCSI host connectivity option is recommended in a CPU-intensive application environment?
10.
1 point
A finance department wants to secure its data while the data traverses over the FC SAN. Currently the SAN is also used by other departments in the organization.
Which implementation should be recommended to isolate other department traffic from the finance department traffic?
11.
1 point
What is true about cache dirty page?
12.
1 point
Which component of an archiving solution is responsible for scanning data that can be archived based on a policy?
13.
1 point
Which benefit is provided by EMC PowerPath?
14.
1 point
In a Fibre Channel (FC) SAN, which protocol implementation is used?
15.
1 point
A stripe depth of 64 KB has been assigned to a five-disk RAID 0 set. What is the stripe size?
16.
1 point
What is a characteristic of an FC-AL implementation?
17.
1 point
What accurately describes a Vblock?
18.
1 point
What is a characteristic of asynchronous remote replication?
19.
1 point
Which NAS backup environment transfers data to be backed up over a private backup network?
20.
1 point
In Kerberos authentication, what is a role of the Active Directory?
21.
1 point
A department within an organization requires 200 GB of storage for their business application. The production LUN is RAID 1+0 protected and has a local and remote replica. The local replica is on a RAID 1 LUN and the remote replica is on a five-disk RAID 5 LUN.

If the cost per GB of storage is $2.00, what is the chargeback cost to the department for application storage?
22.
1 point
What is a requirement for a native iSCSI implementation?
23.
1 point
Which data protection technology provides the highest degree of protection against logical corruption and a near-zero RPO?
24.
1 point
Why does a restore operation need to communicate with the backup server?
25.
1 point
A customer requires additional storage capacity. The storage expansion must be fast and performance is not a constraint. What is the most appropriate LUN expansion method?
26.
1 point
A user tries to update the content of a file stored on a CAS system. What is the result of this operation?
27.
1 point
What are the key components of an intelligent storage system?
28.
1 point
Which three subject areas, taken together, define storage security?
29.
1 point
What defines the time taken to position the sector on the platter under the read/write head?
30.
1 point
Which EMC product provides target-based deduplication?
31.
1 point
Which iSCSI naming feature uses a 16-character hexadecimal string?
32.
1 point
In addition to applications and databases, what are the other core elements of a data center infrastructure?
33.
1 point
As your organization’s SAN environment grows, you realize there is a greater need to manage SAN security. Which mechanism is required to prevent unauthorized activity on the FC fabric for management operations?
34.
1 point
What are the two mechanisms that can be employed to address threats of user identity spoofing?
35.
1 point
What describes a hybrid cloud?
36.
1 point
Which iSCSI discovery mechanism requires manual configuration of the initiator with the target’s network portal?
37.
1 point
What is a characteristic of an active/passive storage array configuration?
38.
1 point
What is a characteristic of an enterprise flash drive?
39.
1 point
What is a benefit of virtual storage provisioning over traditional provisioning?
40.
1 point
A customer wants to connect iSCSI-enabled hosts to an existing Fibre Channel (FC) storage array. Which networking device enables the connectivity between the host and the storage array?
41.
1 point
What is a characteristic of Big Data?
42.
1 point
If a disk drive’s rotational speed is 10000 revolutions per minute, what is its average rotational latency?
43.
1 point
What is a benefit of WWN zoning over port zoning?
44.
1 point
When a service is described as “three 9s available”, what is the approximate amount of downtime allowed per week?
45.
1 point
What is the function of enhanced transmission selection in an FCoE environment?
46.
1 point
Which report provides information about the allocation and utilization of storage infrastructure components by various departments or user groups?
47.
1 point
In a CAS environment, what is used to generate a content address?
48.
1 point
A department conducts business, Monday through Saturday from 9 A.M. to 5 P.M. each day. The department takes in revenue on an average of $500,000 per week. Employee salaries are approximately $5,000 per week. The department requires the use of a computer system with an RPO of 2 hours and an RTO of 4 hours.
To determine the business impact of downtime, what is the average cost of downtime per hour of the business?
49.
1 point
What is a characteristic of an FC-SW implementation?
50.
1 point
Which remote replication solution has the highest bandwidth requirements?