What accurately describes the function of the policy engine in a file-level storage tiering environment?
A. Facilitates moving data from primary storage to secondary storage based on pre-defined policies
B. Creates a stub file in secondary storage pointing to data on the primary storage
C. Ensures that primary and secondary storage have identical data for compliance
D. Runs the backup agent and determines the files to be copied to the secondary storage
Which operation is performed by a scale-out NAS cluster when clients send data to the cluster?
A. Data is divided and stored on multiple nodes in parallel
B. Data is consolidated into a block and then stored on the NAS head
C. Data is evenly distributed to every file system in the cluster
D. NAS file system and cluster grow dynamically to store the data
What is an accurate statement about Software as a Service?
A. Consumer has limited control over user-specific application configuration settings
B. Consumer has control over the operating systems and deployed applications
C. Consumer has control over the configuration settings of the application-hosting environment
D. Consumer has limited control over select networking components, such as host firewalls
What is an accurate statement about Platform as a Service?
A. Consumer has control over the deployed applications
B. Consumer has control over the operating system and database management system
C. Consumer has control over the programming languages and tools
D. Consumer has control over the operating system and storage
Which data center characteristic ensures that adequate resources are provided to efficiently store and process data?
A. Capacity
B. Availability
C. Scalability
D. Performance
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
A. Fabric controller
B. Fabric login server
C. Name server
D. Fabric management server
Which product provides an integrated IT infrastructure solution for data center deployment by combining IT resources into a single package?
A. VCE Vblock
B. EMC VPLEX
C. EMC ViPR
D. VMware vCloud
What is an accurate statement about the function of an archiving server?
A. Enables the ability to configure policies for archiving data
B. Installs agents on the archiving storage device
C. Scans the data that can be archived on application servers
D. Creates stub files on an archiving storage device
What is an accurate statement about full volume replication?
A. Target device is at least as large as the source device
B. Target device requires only a fraction of the space used by the source device
C. Target device is accessible only after the replication session starts
D. Target and source devices should be on different storage arrays
What refers to an IT infrastructure's ability to function based on business expectations during its specified time of operations?
A. Information availability
B. Disaster recovery
C. Compliance adherence
D. Business agility
What is an accurate statement about a virtual tape library?
A. Legacy backup software can be used without additional modules or changes
B. Portability of physical tapes to offsite locations is supported
C. Only sequential data access for both backup and recovery is supported
D. Regular maintenance tasks associated with a physical tape drive are required
What is a characteristic of a scale-out NAS?
A. File system grows dynamically as nodes are added in the cluster
B. Up to four file systems can be created across the cluster
C. Distinct file systems are created on each node in the cluster
D. Different file systems can be mixed on each node in a single cluster
Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false website?
A. Phishing
B. Man-in-the-middle
C. Denial-of-service
D. Repudiation
An organization performs a full back up every Sunday and incremental back ups on the remaining days at
9:00 AM. However, at 10 PM on Friday, a data corruption occurs that requires a data restoration from the backup copies.
How many backup copies are required to perform this restoration?
A. 2
B. 4
C. 5
D. 6
What is determined based on the recovery point objective in an asynchronous remote replication?
A. Size of the buffer
B. Size of the replica
C. Response time
D. Location of the source