emc 2

Is this your test? Login to manage it. If not, you can make an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What defines the time taken to position the sector on the platter under the read/write head?
2.
1 point
What is true about cache dirty page?
3.
1 point
As your organizations SAN enviornment grows, you realize that there is a greater need to manage SAN security. Which mechanism is required to prevent unauthorized activity on the FC fabric for management operations?
4.
1 point
Which operation is performed by a scale out NAs when it recieves a large write I/O from its clients?
5.
1 point
When developing a disaster recovery plan, what is the result of choosing a particular recovery time objective for a system?
6.
1 point
Which operation writes data in cache and immediately to disk, before sending an acknowledgement to the host?
7.
1 point
What is a benefit of WWN zoning over port zoning?
8.
1 point
To determine the business impact of downtime, what is the average cost of downtime per hour of the business?
9.
1 point
In Kerberos authentication, what is a role of the active directory
10.
1 point
A finance department wants to secure its data while the data traverses over the FC SAN. Currently the SAN is also used by other deparments in the organization. Which implementation should be recommended to isolate other department traffic from the finance department traffic?
11.
1 point
Which data center characteristic refers to the capability to grow resources without impacting business operations?
12.
1 point
What is an advantage of reporting on storage arrays?
13.
1 point
A customer wants to connect iSCSI-enabled hosts to an existing Fibre Channel (FC) storage array. Which networking device enables the connectivity between the host and the storage array?
14.
1 point
What is a benefit of virtual storage provisioning over traditional provisioning?
15.
1 point
What accurately describes a Vblock?
16.
1 point
Which report provides information about the allocation and utilization of storage infrastructure components by various departments or user groups?
17.
1 point
Which component of an archiving solution is responsible for scanning data that can be archived based on a policy?
18.
1 point
What describes a hybrid cloud?
19.
1 point
What is a requirement for a native iSCSI implementation?
20.
1 point
In addition to applications and databases what are other core elements of a data infrastructure?
21.
1 point
Why does a restore operation need to communicate with the backup server?
22.
1 point
Which data protection technology provides the highest degree of protection against logical corruption and a near-zero RPO?
23.
1 point
Which remote replication solution has the highest bandwidth requirements?
24.
1 point
In a Fibre Channel (FC) SAN, which protocol implementation is used?
25.
1 point
Which NAS backup enviornment transfers data to be backed up over a private backup network?
26.
1 point
Which three subject areas, taken together, define storage security?
27.
1 point
If a disks drive rotational speed is 10000 revolutions per minute, what is its average rotational latency?
28.
1 point
In the context of information security, which atribute other than individual identity and group membership can be used to restrict unauthorized access?
29.
1 point
What is a characteristic of an active/passive storage array configuration?
30.
1 point
An eight-disk RAID 6 set has a stripe size of 192 KB. What is the stripe depth
31.
1 point
What is a key benefit of RAID 5 compared to RAID 1+0 for small, random I/Os?
32.
1 point
What is a characteristic of asynchronous remote replication?
33.
1 point
What is a characteristic of triangle/multitarget replication?
34.
1 point
What is a characteristic of cloud-optimized storage?
35.
1 point
In what way does an integrated NAS solution differ from a Gateway NAS solution?
36.
1 point
What is the name of the drive sub-assembly which contains the platters and read/write heads?
37.
1 point
Why would an iSCSI solution be implemented?
38.
1 point
How many disks are required to meet both capacity and performance requirements?
39.
1 point
Which two mechanisms address threats of elevating user privileges in the application access domain?
40.
1 point
A customer has an existing SAN enviornment. The customer wants to add NAS to share the storage space. Which solution is most appropriate?
41.
1 point
What is a characteristic of a virtual tape library?
42.
1 point
What type of cloud deployment model is represented in the exhibit?
43.
1 point
Which zone(s) represent port zoning?
44.
1 point
Which zone(s) represent mixed zoning?
45.
1 point
What type of relication is represented in the exhibit?
46.
1 point
What is the process of continuously gathering information on various elements and services in a data center?
47.
1 point
How is the internal transfer rate of disk drives defined?
48.
1 point
Which process defines the writing of physical address information to a disk?
49.
1 point
How many disks are required to meet both the applications capacity and performance requirements?
50.
1 point
Where does a host-based volume manager map a file system block?