IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

EMC E10-001 (Information Storage and Management Exam Version 2) 덤프자료

Pass4Test의  EMC E10-001 (Information Storage and Management Exam Version 2) 덤프는 고객님의 IT인증자격증을 취득하는 소원을들어줍니다. IT업계에 금방 종사한 분은 자격증을 많이 취득하여 자신만의 가치를 업그레이드할수 있습니다. Pass4Test의  EMC E10-001 (Information Storage and Man agement Exam Version 2) 덤프는 실제 시험문제에 대비하여 연구제작된 퍼펙트한 시험전 공부자료로서 시험이 더는 어렵지 않게 느끼도록 편하게 도와드립니다.

 

 

NO.1 What is a characteristic of unified storage?

A. Supports multiple protocols for data access and managed through a single management interface

B. Supports a common protocol for data access and managed through a unified management interface

C. Provides compute, storage, and network virtualization products in one solution

D. Stores all data in the form of objects and managed through a unified management interface

Answer: A

 

NO.2 What defines the time taken to position the read/write head across the platter with a radial movement

in a disk drive?

A. Seek time

B. Rotational latency

C. Data transfer time

D. Service time

Answer: A

 

NO.3 Which EMC product provides the capability to recover data up to any point-in-time?

A. RecoverPoint

B. NetWorker

C. Avamar

D. Data Domain

Answer: A

 

NO.4 What is needed to perform a non-disruptive migration of virtual machines (VMs) between hypervisors?

A. Hypervisors must have access to the same storage volume

B. Physical machines running hypervisors must have the same configuration

C. Hypervisors must be running within the same physical machine

D. Both hypervisors must have the same IP address

Answer: A

 

NO.5 What does the area ID of the FC address identify.?

A. Group of ports within a switch

B. An individual port within a fabric

C. Location of the name server within the fabric

D. Unique number provided to each switch in the fabric

Answer: A

 

NO.6 Which host component eliminates the need to deploy separate adapters for FC and Ethernet

communications?

A. Converged network adapter

B. TCP Offload Engine NIC

C. FCIP bridging adapter

D. iSCSI host bus adapter

Answer: A

 

NO.7 What is a key security consideration when a NAS device enables sharing of the same data among

UNIX and Microsoft Windows users?

A. NAS device must map UNIX permissions to Windows and vice versa

B. NAS defines and maintains ownership to the objects

C. NIS server must separately maintain SIDs for UNIX and Windows environments

D. Object permissions are not defined in advance and assigned dynamically

Answer: A

 

NO.8 What is a function of unified management software in cloud computing?

A. Defining cloud service attributes

B. Consolidating infrastructure resources scattered across one or more data centers

C. Metering based on usage of resources by the consumer

D. Providing an interface to consumers to request cloud services

Answer: A

 

NO.9 Which cloud computing characteristic enables consumers to grow and shrink the demand for

resources dynamically?

A. Rapid elasticity

B. Resource pooling

C. Measured service

D. On-demand self-service

Answer: A

 

NO.10 Which cloud computing capability enables monitoring and reporting resource usage?

A. Metering

B. Pooling

C. Self-service requesting

D. Publishing

Answer: A

 

NO.11 An organization performs copy on first access (CoFA) replication to create a local replica of application

data. To perform a successful restore, what should be considered?

A. Source devices must be healthy

B. Save location size must be larger than the size of all source devices

C. Save location size must be equal to the size of all source devices

D. All changes to the source and replica must be discarded before the restore starts

Answer: A

 

NO.12 Which iSCSI name requires an organization to own a registered domain name?

A. IQN

B. EUI

C. WWNN

D. WWPN

Answer: A

 

NO.13 What is a key benefit of virtualization?

A. Improved resource utilization

B. Improved performance

C. Enhanced interoperability

D. Unlimited resource scaling

Answer: A

 

NO.14 What describes a landing zone in a disk drive?

A. Area on which the read/write head rests

B. Area where the read/write head lands to access data

C. Area where the data is buffered before writing to platters

D. Area where sector-specific information is stored on the disk

Answer: A

 

NO.15 Which operation is performed while creating a VM snapshot?

A. Create a delta file to record changes to the virtual disk since the session is activated

B. Capture the configuration data of a VM to create an identical copy of the VM

C. Create a journal volume to update changes to the snapshot

D. Create a Gold

copy of the snapshot before copying changes to the virtual disk

Answer: A

 

NO.16 What is a benefit of cloud computing over traditional computing?

A. Reduces the time to provision and deploy new applications

B. Eliminates consumer's IT operational expenditure

C. Enables the use of proprietary APIs to access IT resources

D. Lowers migration cost and prevents vendor lock-in

Answer: A

 

NO.17 Which cache management algorithm is based on the assumption that data will not be requested by the

host when it has not been accessed for a while?

A. LRU

B. HWM

C. LWM

D. MRU

Answer: A

 

NO.18 What is an accurate statement about the Data Center Bridging Exchange protocol?

A. Enables Converged Enhanced Ethernet (CEE) devices to convey and configure their features with

other CEE devices

B. Creates virtual FCoE links over an existing Ethernet network to transport FC frames over virtual links

independently

C. Enables an FCoE switch to send signals to other FCoE switches that need to stop or slow down their

transmissions

D. Enables an FCoE switch to transport both TCP/IP and FC frames over a single virtual FCoE link

Answer: A

 

NO.19 Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved

as it was received?

A. Integrity

B. Availability

C. Security

D. Performance

Answer: A

 

NO.20 Which statement describes a denial of service attack?

A. Prevents authorized users from accessing the resources and services

B. Prohibits attempts to repair the resources and services after an attack

C. Attempts to provide false information by impersonating someone s identity

D. Prevents unauthorized users to access the resources and services

Answer: A

 

 

 
Posted 2013/6/13 6:14:29  |  Category: 미분류  |  Tag: