In addition to validation of discovered storage infrastructure against design best practices and the EMC Support Matrix for compliance, what features does the Storage Compliance SolutionPack provide?
A. Generates compliance breach reports and automated breach alert notifications
B. Generates compliance breach reports, automated breach alert notifications and "what if" change modeling
C. Validation against regulatory policies for compliance, generates compliance breach reports, and automated breach alert notifications
D. Validation of the discovered storage infrastructure against regulatory policies for compliance, generates compliance breach reports, automated breach alert notifications, and "what if" change modeling
When deploying the VMAX SolutionPack with a Remote Solutions Enabler what must be entered exactly as it appears in the netcnfg file?
A. SYMAPI Connection Name
B. Hostname of the Collector Host
C. IP Address of the Backend Host
D. Solutions Enabler bin directory path
What is the best option available for Brocade discovery using ViPR SRM?
A. Use SMI-S to discover Switch Topology, Performance Metrics, and zoning details
B. Use SNMP to discover Switch Topology and zoning and Performance Metrics through SMI-S
C. Discover Switch Topology through SMI-S and Performance Metrics and zoning through SNMP
D. Simultaneously use SMI-S and SNMP to discover Switch Topology, Performance Metrics, and zoning
What methods are used to discover physical hosts in ViPR SRM?
A. Agentless, passive discovery, and EMC host interface
B. SNMP, agentless, and importing a CSV file with host credentials
C. Agentless, Discovery Center, and SSH/WMI
D. EMC host interface, SNMP, and passive discovery
What prerequisite software is needed to discover and monitor capacity and all performance with the VMAX SolutionPack?
A. Solutions Enabler, EMC SMI-S Provider and Unisphere for VMAX with Performance
B. Solutions Enabler and Unisphere for VMAX with Performance
C. EMC SMI-S Provider and Unisphere for VMAX
D. Unisphere for VMAX
Which default port does the Centralized Management Module use to communicate remote commands to the WebService Gateway?
A. 48443
B. 58080
C. 443
D. 8443
For how many days is the ViPR SRM trial license valid?
A. 30
B. 45
C. 60
D. 90
Since Topology provides end-to-end views of Host to Storage, then what are the Topology services?
A. Topology Mapping Service, Topology Service, Maps Service
B. Topology Mapping Service, Topology Service, Topology database
C. Data Collectors, Topology Mapping Service, Topology database
D. Maps Service, Topology Database, Topology Service
You are preparing two reports. The first report lists VMs assigned to customers. The second report is a complement of the first report. What would be an appropriate filter expression for the second report?
A. devtype is "VirtualMachine" and customer is not present
B. devtype is "VirtualMachine" or customer is not present
C. devtype is "VirtualMachine" and customer is present
D. devtype is "VirtualMachine" and customer is not ([list customer names in extension])
Which default ViPR SRM user role will allow the user to use SNMP tools?
A. Network Administrator Users
B. NOC Operator Users
C. Storage Administrator Users
D. Web Service Role
What is the base retention policy for 1-day aggregate data?
A. 365 days
B. 7 years
C. 61 days
D. 2 years
What types of matching rules apply to key property values?
A. Range, wildcard, string, regex
B. Value, regex, tag, category
C. Sequence, case, value, template
D. Location, order, extension, range
A user that is authenticated through Active Directory cannot save any user preferences. What is the cause?
A. The user does not have a ViPR SRM user account
B. The authenticated User Profile does not have save privilege
C. The user was unauthenticated
D. Active Directory users cannot save user preferences.
In ViPR SRM, what is the module name used to manage SNMP devices?
A. SNMP Device Discovery
B. MIB Browser
C. Generic-SNMP Collector
D. SNMP Collector
What comparison types can be used to evaluate key property values?
A. String, regex, wildcard, and range
B. String, regex, wildcard, and numeric
C. Regex, wildcard, range, and numeric
D. Regex, wildcard, range, and literal