Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which network file sharing protocol provides cloud-based file sharing through a REST API interface?

A.

S3

B.

HDFS

C.

ZFS

D.

FTP

Full Access
Question # 5

What is true about the FCIP?

A.

connects local iSCSI SANs to remote FC SANs

B.

connects local FC SANs to remote FC SANs

C.

connects local iSCSI SANs to remote iSCSI SANs

D.

connects local FC or iSCSI SANs to remote FC or iSCSI SANs

Full Access
Question # 6

How is NVMe used to connect a host to M.2 storage devices?

A.

through an embedded PCIe controller

B.

through a PCIe bus FC HBA card

C.

through a PCIe bus card

D.

through an embedded FC HBA controller

Full Access
Question # 7

An organization wants to protect data from accidental deletion, application crashes, data corruption, and disaster.

Which solution should the organization adopt?

A.

Storage tiering

B.

Thin provisioning

C.

Data archiving

D.

Data backup

Full Access
Question # 8

An organization has two data centers separated by a distance of 1600 km. They want to replicate between these data centers for disaster recovery purposes. They are concerned that this will impact application response time.

Which solution will address this concern?

A.

Asynchronous remote replication

B.

Storage-based COFW snapshot replication

C.

Synchronous remote replication

D.

Storage-based ROW snapshot replication

Full Access
Question # 9

In an SDS environment, which protocol supports the resource-oriented architecture for the development of scalable and lightweight web applications while adhering to a set of constraints?

A.

FTP

B.

NFS

C.

CIFS

D.

REST

Full Access
Question # 10

What set of components are part of a block-based storage array controller?

A.

Front-end ports

Cache

Link Control Cards

B.

Front-end ports

Cache

C.

Front-end ports

Back-end ports

Cache

D.

Front-end ports

Back-end-ports

Cache

Link Control Cards

Full Access
Question # 11

Refer to the Exhibit:

Identify the following FC Frame fields:

A.

1CRC 2:Data field 3:Frame header

B.

1:Frame header 2:Data field 3CRC

C.

1CRC 2:Frame header 3:Data field

D.

1:Frame header 2CRC 3:Data field

Full Access
Question # 12

Which backup component sends metadata and tracking information about each backup to the system that maintains this information?

A.

Backup agent

B.

Storage node

C.

Backup device

D.

Backup server

Full Access
Question # 13

What is the function of a control plane in the SDDC?

A.

Performs financial operations used to calculate CAPEX

B.

Performs processing and Input output operations

C.

Performs administrative operations and for communicating messages

D.

Performs resource provisioning and provides the programming logic and policies

Full Access
Question # 14

An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 5 occurs as follows:

Tuesday = 6 AM to 7 AM Thursday = 5 PM to 9 PM Friday = 8 AM to 9 AM

What is the MTBF of Port 5?

A.

30 hours

B.

32 hours

C.

40 hours

D.

38 hours

Full Access
Question # 15

A company finance department needs 250 GB of storage for their business applications. A LUN is created with 250 GB, and RAID 1 protection. The LUN is configured to support application I/O performance.

If storage cost is $2 per GB, what is the chargeback amount to the department for application storage?

A.

$1000

B.

$ 2000

C.

$500

D.

$250

Full Access
Question # 16

Why is it important for organizations to store protect and manage their data?

A.

To eliminate complexity in managing the data center environment

B.

To meet the requirements of legal and data governance regulations

C.

To develop and deploy modern applications for business improvement

D.

To reduce the amount of data to be replicated, migrated, and backed up

Full Access
Question # 17

Which data deduplication method would a cloud service provider use when storing back up data at their location?

A.

Source-based

B.

Target-based

C.

Application-based

D.

Agent-based

Full Access
Question # 18

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called'?

A.

Agent-based

B.

Backup as a service

C.

Local replication

D.

Image-based

Full Access
Question # 19

What is an accurate statement about governance?

A.

Creates the policies and enforces their adherence

B.

Ensures removal of data security vulnerabilities

C.

Determines strategy and operational rules by which companies are directed and managed

D.

Restricts access privileges to certain legitimate users to avoid IT managed resource conflicts

Full Access
Question # 20

Which Connectrix FC switch model supports NVMe in a 32Gb/s SAN fabric exclusively?

A.

DS-6600B

B.

MDS 9148S

C.

DS-6505B

D.

MDS-9132T

Full Access
Question # 21

What is an accurate statement regarding virtual LANs?

A.

Supports Fibre Channel network transport data security

B.

Supports one or more logical LANs operating over a single physical LAN

C.

Provides hardware level connectivity and maintains physical LAN transport paths

D.

Provides software level connectivity and maintains physical LAN transport paths

Full Access
Question # 22

What is the effect of implementing link aggregation in an FC SAN environment?

A.

Distributes network traffic over ISLs that ensures even ISL utilization

B.

Yields higher throughput by combing two parallel ISLs into a single physical ISL

C.

Saves bandwidth by restricting traffic to a specific potentially congested ISL

D.

Improves ISL utilization by increasing network traffic on a specific ISL

Full Access
Question # 23

What is true about a software defined data center?

A.

IT resource components are virtualized except commodity hardware used to create resource pools

B.

Management operations are dependent of underlying hardware configuration

C.

Services listed in the service portal are updated automatically using orchestration tool

D.

Management functions are moved to an external software controller

Full Access
Question # 24

Which layer of the OSI reference model provides logical end-to-end connections, sequencing, and integrity?

A.

Transport

B.

Presentation

C.

Session

D.

Data Link

Full Access
Question # 25

in a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?

A.

Common Internet File System (CIFS)

B.

New Technology File System (NTFS)

C.

Network File System (NFS)

D.

Hadoop Distributed File System (HDFS)

Full Access
Question # 26

Match the Fibre Channel (FC) layers with their respective features.

Full Access
Question # 27

What triggers an appropriate workflow upon receiving a service provisioning or management request?

A.

Alerts

B.

Orchestrated operations

C.

Recovery time objective

D.

Infrastructure discovery

Full Access
Question # 28

What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?

A.

Utilizes preconfigured preinstalled and prepackaged vendor ready solutions

B.

Combines the datacenter components into a single standalone computing platform managed by software

C.

Utilizes products and services from the vendors that provide specific functions with more configuration options

D.

Combines datacenter components into a distributed infrastructure platform managed by software

Full Access
Question # 29

What occurs during a Shared Technology Vulnerability threat?

A.

An attacker gains access to an administrator's, user's or system account.

B.

An attacker avoids applications that are already approved by an IT organization.

C.

An attacker exploits the weaknesses of tools used to enable multi-tenancy.

D.

An attacker exhausts network bandwidth or CPU cycles.

Full Access
Question # 30

Which Dell EMC product is a software-defined storage platform that abstracts, pools, and automates a data center’s physical storage infrastructure?

A.

XtremIO

B.

ViPR Controller

C.

VxFlex OS

D.

PowerMax

Full Access
Question # 31

Refer to the Exhibit:

What is the name of the selected backup architecture component?

A.

Backup Device

B.

Storage Node

C.

Backup Client

D.

Backup Server

Full Access
Question # 32

What is a feature of 5G technology?

A.

Higher LAN bandwidth

B.

Higher connectivity density

C.

Higher WAN bandwidth

D.

Higher transmission distances

Full Access
Question # 33

What is the purpose of data archiving?

A.

Transfers fixed content that is actively accessed to archive storage

B.

Transfers dynamic content that is no longer actively accessed to archive storage

C.

Transfers dynamic content that is actively accessed to archive storage

D.

Transfers fixed content that is no longer actively accessed to archive storage

Full Access
Question # 34

What is a function of the metadata service in an object-based storage device (OSD)?

A.

Generates the file system namespace from the file contents.

B.

Manages both physical and logical disks on which the user data is stored.

C.

Manages the storage space for all remote clients.

D.

Maintains the object IDs and file system namespace mappings.

Full Access
Question # 35

What is a benefit of using an existing Ethernet network infrastructure for storage connectivity?

A.

Provides a dedicated network for storage

B.

Ensures security by allowing only localized data movement

C.

Ensures lossless transmission of FC traffic

D.

Reduces overall cost of the network infrastructure

Full Access
Question # 36

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

A.

Intrusion-based

B.

Policy-based

C.

Anomaly- Based

D.

Signature-based

Full Access
Question # 37

Why is it important for organizations lo deploy business continuity solutions in their data center environment?

A.

Avoid security risks that destroy the business data

B.

Employ compliance requirements for data protection

C.

Eliminate the time required for maintenance of IT resources in the data center

D.

Reduce the cost of protecting data within and outside data centers

Full Access
Question # 38

What functionality does the control layer provide in a software-defined networking architecture?

A.

Forwards data packets based on application layer requirements

B.

Defines network behavior through physical network device policies

C.

Establishes communication between the infrastructure and interface layers

D.

Extracts network information from the data plane and sends it to the application layer

Full Access
Question # 39

An Ethernet switch has eight ports and all ports must be operational for 24 hours from Monday through Friday. However, failures of Port 6 occur within the week as follows:

Tuesday = 6 AM to 8 AM

Thursday = 5 PM to 10 PM

Friday = 7 AM to 9 AM

What is the MTBF of Port 6?

A.

32 hours

B.

37 hours

C.

30 hours

D.

40 hours

Full Access
Question # 40

In a data archiving environment, which component scans primary storage to find the files that are required to archive?

A.

Archive stub file

B.

Archive agent

C.

Archive storage

D.

Archive database server

Full Access
Question # 41

What type of network connectivity is illustrated in the image below?

A.

Compute to storage connectivity

B.

Data center to data center connectivity

C.

Storage to hybrid cloud connectivity

D.

Compute to hybrid cloud connectivity

Full Access
Question # 42

A Fibre Channel switch has eight ports and all ports must be operational 24 hours 7 days. However, a failure of Port 5 occurs on a particular week as follows:

Monday = 11 AM to 3 PM -

Thursday = 6 AM to 11 AM -

Saturday = 11 AM to 4 PM -

What is the availability of Port 5 in that week?

A.

91.6%

B.

94.6%

C.

95%

D.

90%

Full Access
Question # 43

Which data deduplication method increases the probability of identifying duplicate data even when there is only a minor difference between two documents?

A.

Variable-length segment

B.

Single-instance

C.

File-level

D.

Object-level

Full Access
Question # 44

The Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port 4 occurs as follows:

Monday = 8 PM to 11 PM -

Wednesday = 7 PM to 10 PM -

Thursday = 6 AM to 12 PM -

What is the MTTR of Port 4?

A.

28 hours

B.

2 hours

C.

38 hours

D.

4 hours

Full Access
Question # 45

Which statement is true regarding virtual provisioning?

A.

Shared and Thin LUNS can be expanded rapidly with only minor disruptions

B.

Multiple shared storage pools can be created while each pool must be allocated to a unique thin LUN

C.

Virtual provisioning enables more efficient allocation of storage to compute systems

D.

Virtual provisioning prevents issues that arise from oversubscription

Full Access
Question # 46

Which block storage volume allocates all of the physical storage specified at the time it is created?

A.

Thick provisioned LUN

B.

Thin provisioned LUN

C.

Thin provisioned RAID

D.

Thick provisioned RAID

Full Access
Question # 47

What occurs when a company’s IT infrastructure security is breached by a passive attack?

A.

data is altered by an unauthorized user

B.

unauthorized system access is obtained

C.

access to services is denied

D.

availability of data is affected

Full Access
Question # 48

Under the PaaS model, which elements are managed by the consumer?

A.

Applications and Data

B.

OS and Runtime

C.

Middleware and Networking

D.

OS and Virtualization

Full Access
Question # 49

Which components comprise a Fibre Channel SAN?

A.

TOE HBA

Gateways

CAT6 cables

B.

FC HBA

Switches

Fiber optic cables

C.

FC HBA

Gateways

Fiber optic cables

D.

TOE HBA

Switches

CAT6 cables

Full Access
Question # 50

Which modern technology enables data to be securely collected and processed at point of creation to create new value?

A.

Private cloud

B.

Edge Computing

C.

Big Data

D.

AI/ML

Full Access
Question # 51

Which is a characteristic of RAID 6?

A.

Double parity

B.

Single parity

C.

All parity stored on a single disk

D.

Parity not used

Full Access
Question # 52

Which Dell EMC product is designed to host both file and object data?

A.

PowerEdge

B.

PowerScale

C.

PowerVault

D.

Cloud Tiering Appliance

Full Access
Question # 53

What is a goal of cyber recovery?

A.

Evaluate systems, networks, and applications to find vulnerabilities

B.

Determine persistence access of system, networks, and applications

C.

Abstract the physical compute hardware from the operating system and applications

D.

lsolate copies of critical data to ensure that an uncompromised copy always exists

Full Access
Question # 54

Which storage management function ensures that the services and service levels are delivered per SLAs?

A.

Infrastructure discovery management

B.

Portfolio management

C.

Financial management

D.

Operation management

Full Access
Question # 55

What is a function of the metadata service in an OSD storage system?

A.

Generates an object ID from the data to be stored

B.

Manages the file system storage space for all remote clients

C.

Generates the file system namespace from the data to be stored

D.

Manages physical OSD containers on which data is stored

Full Access
Question # 56

Match the functionality of a security goal with its description.

Full Access