E20-002 Cloud Infrastructure and Services Practice Exam Set 2

Which security aspect ensures that unauthorized changes to data are prevented?


Options are :

  • Integrity
  • Authenticity
  • Availability
  • Integrity

Answer : Integrity

Which security process defines the scope of the access rights for a resource?


Options are :

  • Authorization
  • Authentication
  • Auditing
  • Encryption

Answer : Authorization

Which security mechanism removes the need for services to provide their own identity system and allows users to consolidate their digital identities?


Options are :

  • OpenID
  • One-time passwords
  • Federated Identity Management
  • Shared LDAP directory

Answer : OpenID

E20-011 Storage Networking Design Management Practice Exam Set 1

Consider the following actions: 1. Exhausting resources such as CPU cycles or network bandwidth 2. Exploiting weaknesses in communication protocols 3. Hijacking of user identities 4. Intercepting communications traffic Which of these actions are involved in a Denial of Service (DoS) attack?


Options are :

  • 1 and 3
  • 2 and 4
  • 1 and 2
  • 2 and 3

Answer : 1 and 2

Which Governance, Risk and Compliance (GRC) aspect may limit adoption of public Clouds for applications handling sensitive data?


Options are :

  • Information Flow Regulations
  • SAN Security Regulations
  • Lack of robust data encryption standards
  • Inadequate anti-virus protection

Answer : Information Flow Regulations

Which product provides a solution for one-time password based authentication?


Options are :

  • RSA BSAFE
  • RSA Envision
  • RSA SecurID
  • RSA Archer eGRC

Answer : RSA SecurID

E20-011 Storage Networking Design Management Practice Exam Set 1

Review the following considerations: 1. A contingency plan for handling data in the Cloud 2. A process for migrating the data back into the organization or to another Cloud 3. Whether or not data can be moved over the network in a reasonable amount of time 4. Cost of transferring ownership of the infrastructure back to the client Which considerations should apply before terminating a Cloud service agreement?


Options are :

  • 2, 3, and 4
  • 2 and 4 only
  • 1 and 4
  • 1, 2, and 3

Answer : 1, 2, and 3

A Cloud service provider decides to close its business due to legal litigation. Which Governance, Risk and Compliance (GRC) document would safeguard the interests of its clients?


Options are :

  • Business Continuity Agreement
  • Service Implementation Guide
  • Termination Agreement
  • Service Level Agreement

Answer : Termination Agreement

What statement related to a Virtual Demilitarized Zone (DMZ) is true?


Options are :

  • Trusted nodes in the DMZ are not accessible from outside networks.
  • DMZ virtual machines should be in separate sub-networks.
  • A virtual DMZ can support multiple trust zones.
  • Virtual DMZ subnets do not use a firewall to protect traffic.

Answer : A virtual DMZ can support multiple trust zones.

E10-110 Enterprise Content Management Certify Practice Exam Set 6

From which level should a Distributed Denial of Service attack be prevented?


Options are :

  • Compute
  • Perimeter
  • Network
  • Access control

Answer : Network

What is the key function of the balloon driver in the memory ballooning technique?


Options are :

  • To demand memory from guest OS and later relinquish it under the control of the hypervisor
  • To demand memory from the hypervisor and later relinquish it under the control of the virtual machine
  • To extend memory using a swap file under the control of the virtual machine
  • To extend memory using a swap file under the control of the hypervisor

Answer : To demand memory from guest OS and later relinquish it under the control of the hypervisor

E20-011 Storage Networking Design Management Practice Exam Set 1

Which is a benefit provided by Hyper-threading in a virtualized server environment?


Options are :

  • Logical CPU load balancing
  • Improved virtual machine security
  • Improved CPU utilization
  • Improved memory utilization

Answer : Improved CPU utilization

How does a virtual machine appear to a hypervisor?


Options are :

  • As a file system
  • As a remote server
  • As a physical machine
  • As a discrete set of files

Answer : As a discrete set of files

What is a key advantage of pointer-based, full volume replication in Copy on First Access (COFA) mode compared to Full Volume mirroring?


Options are :

  • The replica device size is smaller than the original.
  • The replica is immediately accessible.
  • The source device is not required for restore.
  • The replica only holds pointers to the source data.

Answer : The replica is immediately accessible.

E10-110 Enterprise Content Management Certify Practice Exam Set 2

What is the correct sequence of steps for performing cold conversion from a physical machine to a virtual machine (VM)?


Options are :

  • The converter application creates a new VM on the destination physical machine.
  • Boot the source machine from the converter boot CD and use converter software to define conversion parameters.
  • The converter application installs the required drivers to allow the OS to boot from the VM and personalizes the VM.
  • The converter application copies volumes from the source machine to the destination machine.

Answer : Boot the source machine from the converter boot CD and use converter software to define conversion parameters.

Which is a key benefit of implementing an ILM strategy?


Options are :

  • Lower total cost of ownership
  • Lower recovery time
  • High performance
  • High security

Answer : Lower total cost of ownership

Which metric can be used for monitoring performance bottlenecks?


Options are :

  • Number of I/Os to the disk
  • Number of used and free ports on a switch
  • Number of login failures
  • Number of replication task failures

Answer : Number of I/Os to the disk

E20-011 Storage Networking Design Management Practice Exam Set 3

What does the Recovery Time Objective (RTO) define?


Options are :

  • Number of applications that are mission critical for a business to recover after an outage
  • Period of time needed to detect a fault and determine its cause prior to recovery
  • Amount of data loss that a business can endure between an outage and recovery
  • Period of time by which systems and applications must be recovered after an outage

Answer : Period of time by which systems and applications must be recovered after an outage

A storage administrator receives an alert message that a disk has failed. Based on severity, how should this alert be classified?


Options are :

  • Information
  • Normal
  • Warning
  • Fatal

Answer : Fatal

An administrator wants to perform replication between heterogeneous storage arrays over a WAN. Which technology should you recommend to the administrator?


Options are :

  • SAN-based replication
  • Silvering
  • Array-based replication
  • Three site replication

Answer : SAN-based replication

E20-011 Storage Networking Design Management Practice Exam Set 4

Which enables distributed FC SAN islands to interconnect over a WAN?


Options are :

  • FCIP
  • CEE
  • ISCSI
  • FCoE

Answer : FCIP

Transparent page sharing is employed in a compute system. What occurs if a write to a shared page is attempted?


Options are :

  • Data is overwritten on the page.
  • A shared copy of the page is created.
  • The shared page size is extended.
  • A private copy of the page is created.

Answer : A private copy of the page is created.

A storage administrator receives an alert message that a new LUN has been created. Based on severity, how should this alert be classified?


Options are :

  • Information
  • Norma
  • Fatal
  • Warning

Answer : Information

E10-110 Enterprise Content Management Certify Practice Exam Set 2

Which data center management activity ensures business continuity by eliminating single points of failure?


Options are :

  • Security management
  • Availability management
  • Performance management
  • Capacity management

Answer : Availability management

Which type of hypervisor is recommended if the organizationís primary concern is performance of virtual machines?


Options are :

  • Bare-metal
  • Built-in
  • Encapsulated
  • Hosted

Answer : Bare-metal

What is required to convert a physical machine to a virtual machine when using cold mode?


Options are :

  • Converter agent
  • Converter server
  • Converter switch
  • Converter Boot CD

Answer : Converter Boot CD

E20-002 Cloud Infrastructure and Services Practice Exam Set 1

Which FC port type is located on the compute system's HBA?


Options are :

  • G_port
  • F_port
  • E_port
  • N_port

Answer : N_port

Which port type should be designated to allow an FC switch port to automatically determine its functionality during initialization?


Options are :

  • N_port
  • F_port
  • E_port
  • G_por

Answer : G_por

What happens to a swap file if the associated virtual machine is powered off?


Options are :

  • The swap file is emptied.
  • The content of the swap file is preserved.
  • The swap file is deleted.
  • The swap file remains open for use by the hypervisor

Answer : The swap file is deleted.

E10-110 Enterprise Content Management Certify Practice Exam Set 3

Which statement is true about a virtual machine (VM) swap file?


Options are :

  • It exists only when the VM is running
  • It is used for troubleshooting VMs.
  • It stores configuration information of VMs.
  • It stores the state of the VM BIOS

Answer : It exists only when the VM is running

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions