QB set

30
Question 1 Which cloud service management process maintains information 2 Why should data center elements be monitored? 3 What is a primary goal of incident management? 4 Which product provides an application virtualization solution? 5 Which is a function of user access management software? 6 What should be included in a Cloud Service Termination Agreemen 7 A consumer needs to determine their scope of adoption of cloud s 8 What are key cost factors involved while using cloud services from 9 What is a characteristic of channel technology? 10 You are asked to create four VLANs on a newly installed physical 11 Which type of attack could enable the installation of a rogue hyper 12 What makes it possible to store virtual machine files on a NAS dev 13 Which cloud service model encompasses the complete cloud comp 16 Which data center management activity involves eliminating single 17 In a virtualized data center, guest operating system kernels were 18 Which statement is true about User State virtualization? 19 An organization needs to migrate all of their applications at the 20 Which Fibre Channel (FC) port type would only be used to connect 21 What is a benefit of cloud computing? 22 What is a key advantage of pointer-based virtual replication over p 23 Which parameter determines the maximum amount of CPU and me 24 Which backup solution supports only source-based data deduplicat 25 What is a best practice for selecting drives for a thin pool? 26 Which type of software is capable of creating cloud services? 27 How does a domain name server balance client traffic across a clus 28 What are the three building blocks of automated storage tiering? 29 What is a limitation of using a backup agent on a hypervisor when 30 What is enabled by N_Port ID Virtualization (NPIV)? 31 Which challenges do RAID technologies address? 32 What are primary considerations related to performance when mig 33 Which process categorizes resource pools based on performance a 34 An organization has decided to deploy desktop virtualization using 35 An administrator is concerned about Denial of Service attacks on t 36 Which report should an administrator use to know both historic and 37 What enables a virtual machine to directly access LUNs in a stora 38 How is the term Recovery Point Objective (RPO) defined? 39 What is a benefit of automated site failover capability in a data c 40 Which type of expense is most likely to increase as an organizatio 41 42 Which RAID type uses a dedicated parity disk? 43 An organization plans to migrate an application to the cloud. In w 44 Which statement is true about a Trunk link in a VLAN environment? 46 Which address is used to statically identify a physical port in a F 47 An administrator of a virtualized data center is particularly conce 48 What is a limitation of a server-based Intrusion Detection System ( 49 What is the basis for determining the size of the virtual machine sw 50 What is a benefit of data striping in RAID? Which mechanism enables a LUN with higher capacity than is phy

description

set of q

Transcript of QB set

Page 1: QB set

Question1 Which cloud service management process maintains information 2 Why should data center elements be monitored?3 What is a primary goal of incident management?4 Which product provides an application virtualization solution?5 Which is a function of user access management software?6 What should be included in a Cloud Service Termination Agreemen7 A consumer needs to determine their scope of adoption of cloud s8 What are key cost factors involved while using cloud services from 9 What is a characteristic of channel technology?10 You are asked to create four VLANs on a newly installed physical 11 Which type of attack could enable the installation of a rogue hyper12 What makes it possible to store virtual machine files on a NAS dev13 Which cloud service model encompasses the complete cloud compu16 Which data center management activity involves eliminating single 17 In a virtualized data center, guest operating system kernels were 18 Which statement is true about User State virtualization?19 An organization needs to migrate all of their applications at the 20 Which Fibre Channel (FC) port type would only be used to connect 21 What is a benefit of cloud computing?22 What is a key advantage of pointer-based virtual replication over p23 Which parameter determines the maximum amount of CPU and memo24 Which backup solution supports only source-based data deduplicat25 What is a best practice for selecting drives for a thin pool?26 Which type of software is capable of creating cloud services?27 How does a domain name server balance client traffic across a clus28 What are the three building blocks of automated storage tiering?29 What is a limitation of using a backup agent on a hypervisor when30 What is enabled by N_Port ID Virtualization (NPIV)?31 Which challenges do RAID technologies address?32 What are primary considerations related to performance when migr33 Which process categorizes resource pools based on performance a34 An organization has decided to deploy desktop virtualization using 35 An administrator is concerned about Denial of Service attacks on th36 Which report should an administrator use to know both historic and 37 What enables a virtual machine to directly access LUNs in a stora38 How is the term Recovery Point Objective (RPO) defined?39 What is a benefit of automated site failover capability in a data c40 Which type of expense is most likely to increase as an organizatio4142 Which RAID type uses a dedicated parity disk?43 An organization plans to migrate an application to the cloud. In w44 Which statement is true about a Trunk link in a VLAN environment?46 Which address is used to statically identify a physical port in a F47 An administrator of a virtualized data center is particularly conce48 What is a limitation of a server-based Intrusion Detection System (49 What is the basis for determining the size of the virtual machine sw50 What is a benefit of data striping in RAID?

Which mechanism  enables a LUN with higher capacity than is physically allocated to be presented to a compute system?

Page 2: QB set

51 Which remote replication mode provides a near-zero recovery point52 Which EMC backup and recovery product provides source-based da53 Which EMC product offers CDP functionality?54 Which type of zoning does Zone 3 represent in the graphic?55 Which iSCSI topology does the graphic represent?56 Which data deduplication technique reduces storage capacity and 57 Which EMC product provides a unified storage platform?58 Which type of storage system does the graphic represent?59 Which hypervisor component is responsible for performing binary tr60 Which cloud computing characteristic enables consumers to get c61 Which cloud characteristic enables the consumers to use cloud serv62 Which cloud deployment model enables to provisioning the cloud in63 Which component(s) of a cloud infrastructure framework helps aut64 In which circumstance is a converter boot CD used for a P2V conve65 What is a benefit of NIC teaming?66 What can be backed up if a backup agent is installed on a VM?67 What best describes the VM snapshot?68 What is a feature of Virtual Machine File System (VMFS)?69 What best describes a VM template?70 An organization requires that each user needs to access their own 71 Which statement is true about application encapsulation?72 Three types of network traffic -VM, IP storage, and management -73 Which technology enables configuring virtual HBAs?74 Which statement is true about Remote Desktop Services (RDS)?75 Which cloud service management process monitors and reports on al76 What is updated when attributes of a cloud service change?77 Which product provides cloud user access management capability78 What should an organization consider before migrating its applicat79 What is considered during the optimization phase for cloud adopti80 What is explored during the proof of concept phase for cloud adop81 What is an example of cloud vendor lock-in?82 An attacker has carried out a denial-of-service attack in a cloud e83 What best describes VM isolation??84 What is a feature of multi-factor authentication85 What is true about the Trusted Computing Base in information secu8687 Which RAID technique does the graphic represent?88 Which type of data access method does the graphic represent89 Which statement best describes the function of a hypervisor90 What enables a virtual machine to be portable across physical ma91 Why is a bare-metal hypervisor more efficient than a hosted hyper92 What is a feature of a linked clone?93 Which technique can be used to cluster a virtual machine with a p94 What is a feature of DNS server load balancing?95 What is a component of VM network96 What is determined during the compliance assessment for cloud a97 An administrator wants to use a single management interface to in98 Which software allows an administrator to create and publish a ser

What is the impact on RAID set performance when   higher revolutions per minute (RPM) drives are mixed with lower RPM drives?

Page 3: QB set

99 What is a key activity in problem management?100 What does integrity ensure in an information system?111 In which storage array-based replication technique is the target LU112 What is a function of a backup server?113 Which type of port does label A in the graphic represent?114 Which component of an FCoE network performs the function of bo115 An administrator wants to install a guest OS on a newly created vi116 What is a storage group in automated storage tiering?117 What is a feature of a VSAN?118 Which cloud deployment model is typically preferred by an individu119 Which security mechanism enables organizations to authenticate th120 Which management activity ensures adequate availability of resour121 Which statement is true about VM-to-VM affinity?122 What best describes a thin LUN extent?123 What is a benefit of a VLAN?124 An organization is planning to migrate a tightly coupled applicati125 Which storage array-based security mechanism helps restricting u126 The graphic shows three thin LUNs with their allocated and reporte127 Which networking component does the label X represent in the gra128 What best describes the authorization process in information secur129 The slower data transfer rate between a compute cluster and a st130 What best describes a VM theft?

Page 4: QB set

B C DCapacity Management Availability ManagemService Catalog and Configuration MTo ensure that no data is lTo eliminate threats t To ensure that the IT support staff perTo analyze incident histoTo report incidents to To identify the root cause of recurriVMware View VMware Server VMware WorkstationIt provides configuration It enables users to coIt provides a consolidated view of exisService performance leveTime required for the Cost of transferring the ownership of iBusiness continuity ass Disaster recovery as Application hardening assessmentManagement, compliancService deployment, Infrastructure, managementLong distance transmissiLoose coupling Dynamic connection establishmentAdd four VLAN IDs to theConfigure a trunk portActivate VLAN trunking and tagging onVM theft Side channel attack VM escapeVirtual machine monitor Guest operating syst Virtual Machine File SystemInfrastructure-as-a-Servi Platform-as-a-ServiceIT-as-a-ServiceCapacity management Performance manageSecurity managementFull virtualization Hardware assisted virtSoftware assisted virtualizationCommon User States are uTemplates are used toUser States are preserved as temporarHybrid Vendor-specified ProprietaryN_port F_port G_portSimplification of regulat Reduced operational Transparent Provider-to-Provider migraThe replica device is immThe replica device ca The source device is not required for Reservation Share ThresholdEMC Data Domain EMC NetWorker EMC SourceOneDrive speed should be 1 The pool should contaDrives should be supplied by the samCapacity management User access managemPlatform managementBy mapping the domain naBy sending client traffiBy translating the domain name to theStorage type, storage grStorage pool, storage It is not possible to bac Backing up a LUN thatBacking up data residing on a Virtual A physical NIC port can fA virtual N_port can f A virtual N_port can function as multipLoss of data due to disk dPerformance issues, sData corruption, slow data backupInfrastructure performanNetwork latency, clie Infrastructure security, application pResource Bundling Resource Cataloging Resource DistributionApplication deployment IT management Client devicesDeploy role-based accessInstall encryption sof Perform regular hypervisor updatesChargeback report Performance report Routine reportVirtual Machine File Sys Thin provisioning Block-level virtualizationThe period of time needeThe period of time th The number of mission critical applicaReduced Recovery Point Elimination of site fai Elimination of Virtual Machine File SysManagement costs Capital expenditures Infrastructure costsAutomated storage tierinRaw Device Mapping Global namespace mappingRAID 5 RAID 6 RAID 1+0Assessment Automation OptimizationIt transfers untagged Et It links two virtual s It is a dedicated link for transferring MAC IP Fibre ChannelVLAN tagging Port grouping NIC trunkingIt cannot detect encrypteIt works only when neIt cannot access logs written by priviThe sum of the virtual The physical machineThe difference between the amount ofSecurity is improved by cData is available in thRandom reads and writes are allocated

Storage pool,  storage group, policy

Page 5: QB set

Synchronous replication Database log shippin Differential replicationHomeBase Avamar UnisphereMirrorView RecoverPoint SnapViewPort Mixed DomainNative Combined IsolatedDisk-based deduplicationAppliance-based deduSource-based deduplicationVNX Atmos IsilonBlock-based storage File-based storage Object-based storageVirtual machine Kernel Virtual machine monitorMeasured service Rapid elasticity On-demand self-serviceResource pooling Broad network accessRapid elasticityPublic cloud Hybrid cloud Community cloudPhysical infrastructure Virtual infrastructure Application and platform softwarePerform a cold P2V convePerform a hot P2V co Perform a hot P2V conversion in the cIncreases switch port avaiProvides fault toleranAvoids physical NIC failureVM configuration files VM image Virtual machine file systemCreates a child VM from tReverts the configuratCreates a master copy of a powered-oManaged only by a NAS Maps the logical path Maps the file metadata to the object IA point-in-time replica ofA protected copy of aAn online VM with a hardened guest Application EncapsulatioRemote Desktop ServiApplication StreamingApplication requires localEncapsulated applicatiApplication requires a local installatioShare Burst size Average bandwidthZoning RDM TrunkingEach RDS session has itsA user has full contro Resources of the client system is consCapacity management Service catalogue m Performance managementProblem resolution docu Configuration management databaseEMC Unisphere VMware vCloud DirectorEnsure the provider has tEnsure the provider cEnsure the provider stores the data in

Cost of the existing s Optimum effort needed to migrate appEnsure the provider has tEnsure the provider cEnsure the provider stores the data inA software vendor does noOrganization cannot moOn-disk locking prevents simultaneouConfigure reservation forEncrypt all the data Reduce network bandwidth for storage Configuring a guest OS ruPreventing a compromChanging the default configuration of Multiple specified factorsA single credential is Enables multiple clients to be serviceDefines the boundary betwDefines the boundary Defines the policies of authenticationImproves the overall pe No impact on the overProvides overall performance equivaleMirroring Striping Nested

Network-levelAllows applications to ruCreates a virtualizat Provides hardware resources to VMsStandardized virtual ma Virtual machine monitHardware assisted virtualization techAllows binary translation Provides direct access to the hardwarUses the network identityCopies changes made Contains a symbolic link that enablesFile-level virtualization Storage Tiering Block-level virtualizationIP addresses of applicat Domain names of appliIP addresses of the clients are mappedVirtual SCSI controller Virtual switch Virtual machine monitorCompatibility of consumerContractual obligationsCost of the in-house infrastructure andUser access managemenVirtual infrastructur Element managementUser access managemenVirtual infrastructur Element management

Chargeback report  VMware Service Manager  

Option to relinquish tightly coupled  applications

Block-level   Object-level  

Allows binary translation to be performed directly by a guest OS  

Page 6: QB set

Prioritizes incidents ba Documents the incidentAnalyzes the incident history and idenOnly authorized users haAuthorized users haveSpecific access rights to data is givenPointer-based full volumePointer-based virtual rPointer-based full volume virtual repliSends backup data to th Sends backup data to Stores deduplicated dataNL_port E_port N_portEnhanced Ethernet AdapFibre Channel ForwardEthernet ForwarderVirtual machine console Virtual machine templVirtual machine managerPhysical collection of RA Logical collection of Physical collection of storage drives oEach VSAN has its own faEach VSAN has its ownVSAN ID must be unique for each trunPrivate Community HybridOne-time passwords Open virtualization f Directory servicesPerformance Capacity SecuritySelected VMs should run Selected VMs should VMs running a different guest OS shoCollection of physical dr Maximum amount of stoTotal amount of physical storage allocIncreases security level Reduced OPEXDifferential Forklift Multi-stepSandboxing Intrusion detection s Demilitarized zone750 GB 900 GB 1050 GBVirtual NIC Physical HBA Virtual HBAA process to give a user A process to ensure thA process to ensure that only legitimaService asset and confi Performance manageCompliance managementAn attacker installs a ro An attacker installs u An attacker copies or moves a VM in

Standardized networking   

Page 7: QB set

Answer set1 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 1

Page 8: QB set

2 13 13 13 11 14 12 11 14 14 13 14 11 12 13 11 11 11 11 11 11 11 11 11 11 14 14 41 11 11 11 11 13 11 12 11 12 11 14 12 14 11 11 12 13 13 11 12 1

Page 9: QB set

4 11 11 11 13 11 12 11 12 11 11 13 13 11 12 13 11 14 11 12 13 14 1

Page 10: QB set

123456789

1011121316171819202122232425262728293031323334353637383940414243444647484950

Page 11: QB set

51525354555657585960616263646566676869707172737475767778798081

82

83848586878889909192939495969798

Page 12: QB set

99100111112113114115116117118119120121122123124125126127128129130

NULL

Page 13: QB set

QUESTIONWhich cloud service management process maintains information in the Configuration Management Database (CMDB)?Why should data center elements be monitored?What is a primary goal of incident management?Which product provides an application virtualization solution?Which is a function of user access management software?What should be included in a Cloud Service Termination Agreement?A consumer needs to determine their scope of adoption of cloud services. Which Governance, Risk and Compliance process should they perform for this purpose?What are key cost factors involved while using cloud services from a service provider?What is a characteristic of channel technology?You are asked to create four VLANs on a newly installed physical Ethernet switch. How should you configure the VLANs?Which type of attack could enable the installation of a rogue hypervisor and take control of underlying server resources?What makes it possible to store virtual machine files on a NAS device?Which cloud service model encompasses the complete cloud computing stack?Which data center management activity involves eliminating single points of failure to ensure business continuity?In a virtualized data center, guest operating system kernels were modified to eliminate the need for binary translation. Which compute virtualization technique was used?Which statement is true about User State virtualization?An organization needs to migrate all of their applications at the same time. Which migration strategy should the organization use?Which Fibre Channel (FC) port type would only be used to connect an FC switch to another switch?What is a benefit of cloud computing?What is a key advantage of pointer-based virtual replication over pointer-based full volume replication?Which parameter determines the maximum amount of CPU and memory resources that can be consumed by a child resource pool?Which backup solution supports only source-based data deduplication?What is a best practice for selecting drives for a thin pool?Which type of software is capable of creating cloud services?How does a domain name server balance client traffic across a cluster of servers?What are the three building blocks of automated storage tiering?What is a limitation of using a backup agent on a hypervisor when backing up virtual machine (VM) data?What is enabled by N_Port ID Virtualization (NPIV)?Which challenges do RAID technologies address?What are primary considerations related to performance when migrating operations to the cloud?Which process categorizes resource pools based on performance and capacity?An organization has decided to deploy desktop virtualization using the Virtual Desktop Infrastructure technique. Which cost component to the organization will most likely increase due to this decision?An administrator is concerned about Denial of Service attacks on their virtual machines (VMs). What is an effective method to reduce the risk of this type of attack?Which report should an administrator use to know both historic and current utilization of storage in a data center?What enables a virtual machine to directly access LUNs in a storage system?How is the term Recovery Point Objective (RPO) defined?What is a benefit of automated site failover capability in a data center environment?Which type of expense is most likely to increase as an organization increases the consumption of cloud resources from a service provider?

Which RAID type uses a dedicated parity disk?An organization plans to migrate an application to the cloud. In which phase of the migration process should they ensure that the application behaves as expected in the cloud?Which statement is true about a Trunk link in a VLAN environment?Which address is used to statically identify a physical port in a Fibre Channel SAN environment?An administrator of a virtualized data center is particularly concerned about NIC failure. What should the administrator configure to address this concern?What is a limitation of a server-based Intrusion Detection System (IDS)?What is the basis for determining the size of the virtual machine swap file?What is a benefit of data striping in RAID?

Which mechanism  enables a LUN with higher capacity than is physically allocated to be presented to a compute system?

Page 14: QB set

Which remote replication mode provides a near-zero recovery point objective (RPO)?Which EMC backup and recovery product provides source-based data deduplication?Which EMC product offers CDP functionality?Which type of zoning does Zone 3 represent in the graphic?Which iSCSI topology does the graphic represent?Which data deduplication technique reduces storage capacity and network bandwidth requirements, but increases the overhead on the backup client?Which EMC product provides a unified storage platform?Which type of storage system does the graphic represent?Which hypervisor component is responsible for performing binary translation of instructions that can NOT be virtualized?Which cloud computing characteristic enables consumers to get computing resources without any human intervention?Which cloud characteristic enables the consumers to use cloud services from a wide range of client platforms?Which cloud deployment model enables to provisioning the cloud infrastructure for exclusive use by organizations that have shared concerns?Which component(s) of a cloud infrastructure framework helps automating the creation and delivery of computing resources to the consumers?In which circumstance is a converter boot CD used for a P2V conversion?What is a benefit of NIC teaming?What can be backed up if a backup agent is installed on a VM?What best describes the VM snapshot?What is a feature of Virtual Machine File System (VMFS)?What best describes a VM template?An organization requires that each user needs to access their own copy of OS and applications installed on a centralized location. Which virtualization solution will you recommend?Which statement is true about application encapsulation?Three types of network traffic -VM, IP storage, and management - sharea total bandwidth of 300 Mbps of a NIC team. The management traffic should not be allowed to use more than 50 Mbps of the NIC teams bandwidth.Which technology enables configuring virtual HBAs?Which statement is true about Remote Desktop Services (RDS)?Which cloud service management process monitors and reports on allocation and utilization of resources by consumers in order to generate a chargeback report?What is updated when attributes of a cloud service change?Which product provides cloud user access management capability?What should an organization consider before migrating its applications and operating system to the public cloud to prevent vendor lock-in?What is considered during the optimization phase for cloud adoption?What is explored during the proof of concept phase for cloud adoption?What is an example of cloud vendor lock-in?

An attacker has carried out a denial-of-service attack in a cloud environment. In this attack, the attacker causes several virtual machines to consume a large amount of network bandwidth. This has resulted in unavailability of bandwidth for storage and virtual machine migration traffic.

What best describes VM isolation??What is a feature of multi-factor authenticationWhat is true about the Trusted Computing Base in information security?

Which RAID technique does the graphic represent?Which type of data access method does the graphic representWhich statement best describes the function of a hypervisorWhat enables a virtual machine to be portable across physical machines running the same hypervisor?Why is a bare-metal hypervisor more efficient than a hosted hypervisorWhat is a feature of a linked clone?Which technique can be used to cluster a virtual machine with a physical machine?What is a feature of DNS server load balancing?What is a component of VM networkWhat is determined during the compliance assessment for cloud adoption?An administrator wants to use a single management interface to interact with all standalone virtual infrastructure components for creating virtual pools. These components include compute, network, and storage devices from multiple vendors.Which software allows an administrator to create and publish a service catalogue?

What is the impact on RAID set performance when   higher revolutions per minute (RPM) drives are mixed with lower RPM drives?

Page 15: QB set

What is a key activity in problem management?What does integrity ensure in an information system?In which storage array-based replication technique is the target LUN unavailable to the secondary host during replication?What is a function of a backup server?Which type of port does label A in the graphic represent?Which component of an FCoE network performs the function of both a NIC and an FC HBA?An administrator wants to install a guest OS on a newly created virtual machine. What enables the administrator to perform the installation?What is a storage group in automated storage tiering?What is a feature of a VSAN?Which cloud deployment model is typically preferred by an individual who is least concerned about the security or availability risks and most concerned about reducing cost?Which security mechanism enables organizations to authenticate their users of cloud services using a chosen provider?Which management activity ensures adequate availability of resources based on a service level objective?Which statement is true about VM-to-VM affinity?What best describes a thin LUN extent?What is a benefit of a VLAN?An organization is planning to migrate a tightly coupled application to the cloud. Which migration strategy is recommended?Which storage array-based security mechanism helps restricting unauthorized host access to storage volumes?The graphic shows three thin LUNs with their allocated and reported capacities. The total usable capacity of the storage system is 1500 GB.Which networking component does the label X represent in the graphic?What best describes the authorization process in information security?The slower data transfer rate between a compute cluster and a storage array has been adversely impacting multiple cloud services. Which service management process helps to mitigate this impact?What best describes a VM theft?NULL

Page 16: QB set

AService Asset and Configuration ManagementTo determine whether components are functioning properlyTo restore cloud services to consumers as quickly as possibleVMware ThinAppIt enables the creation and publication of a service catalogData migration planRisk assessmentData migration, operationsLow protocol overheadDefine four VLAN IDs on the switch, then assign each VLAN ID to one or more switch portsHyperjackingNetwork File SystemSoftware-as-a-ServiceAvailability managementParavirtualizationOperating system refreshes and migrations are easier to deployForkliftE_portFast provisioning of resources through a self-service portalLess space is required for the replica deviceLimitEMC AvamarDrives should run at the same rpmUnified managementBy mapping the domain name to the IP address of each server in round-robin fashionStorage type, storage group, policyIt is not possible to back up a LUN that is directly attached to a VM using Raw Device MappingA physical FC HBA port can function as multiple virtual N_portsLoss of data due to disk drive failures, performance issuesInfrastructure performance, network latencyResource GradingCompute infrastructureLimit the resource consumption of the VMsCapacity planning reportRaw Device MappingThe amount of data loss due to an outage that a business can tolerateReduced Recovery Time ObjectiveOperational expendituresVirtual provisioningRAID 3Proof of ConceptIt is a single network connection that carries multiple VLAN trafficWWPNNIC teamingIt runs on the same system as malicious softwareThe difference between the virtual machine memory limit and the reserved memoryIndependent disks allow multiple reads and writes to take place simultaneously

Page 17: QB set

Asynchronous replicationPowerPath/VETimeFinderWWNBridgedTarget-based deduplicationSymmetrix VMAXUnified storageGuest OSBroad network accessOn-demand self serviceExternally-hosted private cloudService management toolsPerform a hot P2V conversion within a data centerImproves network securityData stored on virtual diskPreserves the state and data of a VM at a specific point-in-timeEnables multiple compute systems to access a shared volumeA reusable image created from a VMVirtual Desktop InfrastructureApplication package contains built-in agentsLimitNPIVRDS provides individual OS sessions to the client systemsFinancial management

Ensure the provider supports the open virtual machine formatUsage pattern of consumed resourcesEnsure the provider supports the open virtual machine formatApplication built on a PaaS model cannot be moved to an IaaS model

Configure limit for the virtual machine traffic

Deploying VMs from templates with up-to-date security updatesAccess is granted only when all the specified factors are validatedDefines the policies of confidentiality, integrity, and availability of an information systemLowers the overall performanceParityFile-levelEncapsulates VMs inside applicationsGuest OS running on a virtual machineAllows applications to run directly on physical hardwareShares the virtual disk with its parent VMRaw Device MappingIP addresses of the load balancers are mapped to a virtual IP addressVirtual IDE ControllerIssues related to performance of the cloud infrastructureUnified managementUnified management

Incident history log file  EMC Unified Infrastructure Manager  

Page 18: QB set

Transfers error correction activity to incident managementOnly authorized changes to data are allowedFull volume mirroringManages backup operationsN_portConverged Network AdapterVirtual machine monitorLogical collection of LUNs that are managed togetherMultiple VSANs can be members of a zonePublicFederated Identity ManagementAvailabilityVMs running the same guest OS should always run on different hypervisorsMinimum amount of storage allocated at a time to a thin LUN from a thin PoolIncreased broadcast activityHybridLUN masking300 GBPhysical NICA process to ensure that a users credentials are genuineService catalogue managementAn attacker controls the interaction between a VM and the applicationNULL

Page 19: QB set

BCapacity ManagementTo ensure that no data is lost if there is a disasterTo analyze incident history and identify impending service failuresVMware ViewIt provides configuration of, and relationships among, physical resourcesService performance levelsBusiness continuity assessmentManagement, complianceLong distance transmissionAdd four VLAN IDs to the hypervisors VLAN ID pool, then assign each VLAN ID to one or more switch portsVM theftVirtual machine monitorInfrastructure-as-a-ServiceCapacity managementFull virtualizationCommon User States are used for all the desktopsHybridN_portSimplification of regulatory complianceThe replica device is immediately accessibleReservationEMC Data DomainDrive speed should be 15,000 rpm or higherCapacity managementBy mapping the domain name to the IP address of a load balancing deviceStorage type, storage group, storage poolIt is not possible to back up data residing on a Virtual Machine File SystemA physical NIC port can function as multiple virtual N_portsLoss of data due to disk drive failures, data corruptionInfrastructure performance, security complianceResource BundlingApplication deploymentDeploy role-based access control on the VMsChargeback reportVirtual Machine File SystemThe period of time needed to detect a fault and determine its causeReduced Recovery Point ObjectiveManagement costsAutomated storage tieringRAID 5AssessmentIt transfers untagged Ethernet frames from different VLANsMACVLAN taggingIt cannot detect encrypted trafficThe sum of the virtual machine memory limit and the reserved memorySecurity is improved by creating multiple, identical copies of data

Page 20: QB set

Synchronous replicationHomeBaseMirrorViewPortNativeDisk-based deduplicationVNXBlock-based storageVirtual machineMeasured serviceResource poolingPublic cloudPhysical infrastructurePerform a cold P2V conversionIncreases switch port availabilityVM configuration filesCreates a child VM from the configuration file of its parent VMManaged only by a NAS systemAS systemA point-in-time replica of VM log fileApplication EncapsulationApplication requires locally-installed agents for executionShareZoningEach RDS session has its own OS and applications installedCapacity managementProblem resolution documentEMC UnisphereEnsure the provider has the capability to meet the service level objectives

Ensure the provider has the capability to meet the service level objectivesA software vendor does not offer its software as a service

Configure reservation for the virtual machine traffic

Configuring a guest OS running critical applications in TCB modeMultiple specified factors enable elimination of attackers even if one factor failsDefines the boundary between security-critical and non-critical parts of an information systemImproves the overall performanceMirroring

Allows applications to run directly on physical hardware resourcesStandardized virtual machine hardwareAllows binary translation to be performed by applicationsUses the network identity of its parent VMFile-level virtualizationIP addresses of application servers are mapped to a domain nameVirtual SCSI controllerCompatibility of consumer applications with the cloud infrastructureUser access managementUser access management

Option to relinquish tightly coupled  applications

Block-level  

Page 21: QB set

Prioritizes incidents based on the timestampOnly authorized users have access to dataPointer-based full volume replicationSends backup data to the storage nodeNL_portEnhanced Ethernet AdapterVirtual machine consolePhysical collection of RAID-protected storage drivesEach VSAN has its own fabric servicesPrivateOne-time passwordsPerformanceSelected VMs should run on different hypervisorsCollection of physical drives that provide the actual physical storage used by thin LUNsIncreases security levelDifferentialSandboxing750 GBVirtual NICA process to give a user specific access rights to resourcesService asset and configuration managementAn attacker installs a rogue Virtual Machine Monitor to take control of cloud resourcesNULL

Page 22: QB set

CAvailability ManagementTo eliminate threats to storage infrastructure securityTo report incidents to the cloud service providerVMware ServerIt enables users to configure pools and virtual resourcesTime required for the server provider to restart operationsDisaster recovery assessmentService deployment, backup managementLoose couplingConfigure a trunk port on the switch, then assign four VLAN IDs to the trunk portSide channel attackGuest operating systemPlatform-as-a-ServicePerformance managementHardware assisted virtualizationTemplates are used to create User StatesVendor-specifiedF_portReduced operational expenditures (OPEX)The replica device can be used even when the source device has failedShareEMC NetWorkerThe pool should contain an equal number of FC, SATA, and Flash drivesUser access managementBy sending client traffic to each server that uses a driver to filter client trafficStorage pool, storage type, policyBacking up a LUN that is directly attached to a VM using Raw Device Mapping is very slowA virtual N_port can function as multiple physical HBA portsPerformance issues, slow data backupNetwork latency, client device performanceResource CatalogingIT managementInstall encryption software on hypervisorsPerformance reportThin provisioningThe period of time that a business can tolerate an outageElimination of site failuresCapital expendituresRaw Device MappingRAID 6AutomationIt links two virtual switches that carry tagged Ethernet framesIPPort groupingIt works only when network-based IDS is enabledThe physical machine memory size onlyData is available in the event of a disk drive failure

Page 23: QB set

Database log shippingAvamarRecoverPointMixedCombinedAppliance-based deduplicationAtmosFile-based storageKernelRapid elasticityBroad network accessHybrid cloudVirtual infrastructurePerform a hot P2V conversion between two data centersProvides fault toleranceVM imageReverts the configurations of a VM to a later point-in-timeMaps the logical path of a file to the physical path nameA protected copy of a VM snapshotRemote Desktop ServicesEncapsulated application overwrites the already existing applicationBurst sizeRDMA user has full control to the resources of the virtualized desktopService catalogue management

Ensure the provider can provide the RPOCost of the existing software licensesEnsure the provider can provide the RPOOrganization cannot move its existing licensed software into the cloud

Encrypt all the data transmitted over the network

Preventing a compromised guest OS from impacting other VMsA single credential is used to provide access to multiple servicesDefines the boundary between internal and external networks in an organizationNo impact on the overall performanceStriping

Creates a virtualization layer between applications and VMsVirtual machine monitor

Copies changes made to its parent VMStorage TieringDomain names of application servers are mapped to the IP address of the load balancerVirtual switchContractual obligations to store data in specific jurisdictionsVirtual infrastructure managementVirtual infrastructure management

Chargeback report  VMware Service Manager  

Object-level  

Allows binary translation to be performed directly by a guest OS  

Page 24: QB set

Documents the incident history or all servicesAuthorized users have reliable access to dataPointer-based virtual replicationSends backup data to the storage deviceE_portFibre Channel ForwarderVirtual machine templateLogical collection of LUNs created only from storage drives of the same typeEach VSAN has its own, dedicated trunk linkCommunityOpen virtualization formatCapacitySelected VMs should run on the same hypervisorMaximum amount of storage that can be allocated at a time to dynamically expand a thin LUN

ForkliftIntrusion detection system900 GBPhysical HBAA process to ensure that users have reliable and timely access to dataPerformance managementAn attacker installs unauthorized applications on the guest OS of a VMNULL

Standardized networking   

Page 25: QB set

DService Catalog and Configuration ManagementTo ensure that the IT support staff performs efficientlyTo identify the root cause of recurring incidents that exhibit common symptomsVMware WorkstationIt provides a consolidated view of existing virtual resourcesCost of transferring the ownership of infrastructure back to the clientApplication hardening assessmentInfrastructure, managementDynamic connection establishmentActivate VLAN trunking and tagging on the switch, then define four VLAN IDs on the switchVM escapeVirtual Machine File SystemIT-as-a-ServiceSecurity managementSoftware assisted virtualizationUser States are preserved as temporary filesProprietaryG_portTransparent Provider-to-Provider migrationsThe source device is not required for the restore operationThresholdEMC SourceOneDrives should be supplied by the same vendorPlatform managementBy translating the domain name to the IP address of higher throughput servers

Backing up data residing on a Virtual Machine File System is very slowA virtual N_port can function as multiple physical NIC portsData corruption, slow data backupInfrastructure security, application performanceResource DistributionClient devicesPerform regular hypervisor updatesRoutine reportBlock-level virtualizationThe number of mission critical applications that a business must restore after an outageElimination of Virtual Machine File System failuresInfrastructure costsGlobal namespace mappingRAID 1+0OptimizationIt is a dedicated link for transferring traffic belonging to a single VLANFibre ChannelNIC trunkingIt cannot access logs written by privileged processesThe difference between the amount of physical machine memory and the virtual machine memory limitRandom reads and writes are allocated more efficiently

Storage pool,  storage group, policy

Page 26: QB set

Differential replicationUnisphereSnapViewDomainIsolatedSource-based deduplicationIsilonObject-based storageVirtual machine monitorOn-demand self-serviceRapid elasticityCommunity cloudApplication and platform softwarePerform a hot P2V conversion in the cloudAvoids physical NIC failureVirtual machine file systemCreates a master copy of a powered-off VMMaps the file metadata to the object IDAn online VM with a hardened guest OSApplication StreamingApplication requires a local installationAverage bandwidthTrunkingResources of the client system is consumed to run applications on the virtual desktopPerformance managementConfiguration management databaseVMware vCloud DirectorEnsure the provider stores the data in a geographic location that the organization choosesOptimum effort needed to migrate applicationsEnsure the provider stores the data in a geographic location that the organization choosesOn-disk locking prevents simultaneous powering-on of the same VM

Reduce network bandwidth for storage and migration traffic

Changing the default configuration of a VM to achieve securityEnables multiple clients to be serviced by the same set of resourcesDefines the policies of authentication, authorization, and auditing of an information systemProvides overall performance equivalent to the highest RPM driveNestedNetwork-levelProvides hardware resources to VMsHardware assisted virtualization techniqueProvides direct access to the hardware resourcesContains a symbolic link that enables raw device MappingBlock-level virtualizationIP addresses of the clients are mapped to the IP addresses of the application serversVirtual machine monitorCost of the in-house infrastructure and using the cloud infrastructureElement managementElement management

Page 27: QB set

Analyzes the incident history and identifies the impending service failuresSpecific access rights to data is given to authorized usersPointer-based full volume virtual replicationStores deduplicated dataN_portEthernet ForwarderVirtual machine managerPhysical collection of storage drives over which data is uniformly distributedVSAN ID must be unique for each trunk portHybridDirectory servicesSecurityVMs running a different guest OS should always run on the same hypervisorsTotal amount of physical storage allocated to the thin LUN from the thin poolReduced OPEXMulti-stepDemilitarized zone1050 GBVirtual HBAA process to ensure that only legitimate users have access to dataCompliance managementAn attacker copies or moves a VM in an unauthorized mannerNULL

Page 28: QB set

ANS SET1 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 11 1

Page 29: QB set

2 13 13 13 11 14 12 11 14 14 13 14 11 12 13 11 11 11 11 11 11 11 11 11 11 14 14 41 11 11 11 1

1 1

3 11 12 11 12 11 14 12 14 11 11 12 13 13 11 12 1

Page 30: QB set

4 11 11 11 13 11 12 11 12 11 11 13 13 11 12 13 11 14 11 12 13 14 1

NULL NULL