cis-dumbs
TRANSCRIPT
-
A
1) Which iSCSI topology does the graphic represent?
( ) Bridged
( ) Native
( ) Combined
( ) Isolated
Answer: Bridged
2) Which EMC backup and recovery product provides source-based data deduplication?
( ) Avamar
( ) PowerPath/VE
( ) HomeBase
( ) Unisphere
Answer: Avamar
3) Which type of port does label A in the graphic represent?
( ) E_port
( ) N_port
( ) F_port
( ) NL_port
Answer: E_port
-
4) Which type of storage system does the graphic represent?
( ) Unified storage
( ) Block-based storage
( ) File-based storage
( ) Object-based storage
Answer: Unified storage
5) Which component of an FCoE network performs the function of both a NIC and an FC HBA?
( ) Converged Network Adapter
( ) Enhanced Ethernet Adapter
( ) Fibre Channel Forwarder
( ) Ethernet Forwarder
Answer: Converged Network Adapter
6) Which EMC product offers CDP functionality?
( ) RecoverPoint
( ) TimeFinder
( ) MirrorView
( ) SnapView
Answer: RecoverPoint
-
7) Which type of zoning does Zone 3 represent in the graphic?
( ) WWN
( ) Port
( ) Mixed
( ) Domain
Answer: Mixed
8) Which RAID technique does the graphic represent?
( ) Parity
( ) Mirroring
( ) Striping
( ) Nested
Answer: Mirroring
9) Why is a bare-metal hypervisor more efficient than a hosted hypervisor?
( ) Allows applications to run directly on physical hardware
( ) Allows binary translation to be performed by applications
( ) Allows binary translation to be performed directly by a guest OS
( ) Provides direct access to the hardware resources
-
Answer: Provides direct access to the hardware resources
10) Which hypervisor component is responsible for performing binary translation of
instructions that can NOT be virtualized?
( ) Guest OS
( ) Virtual machine
( ) Kernel
( ) Virtual machine monitor
Answer: Virtual machine monitor
11) An administrator wants to install a guest OS on a newly created virtual machine. What
enables the administrator to perform the installation?
( ) Virtual machine monitor
( ) Virtual machine console
( ) Virtual machine template
( ) Virtual machine manager
Answer: Virtual machine console
12) Which statement best describes the function of a hypervisor?
( ) Encapsulates VMs inside applications
( ) Allows applications to run directly on physical hardware resources
( ) Creates a virtualization layer between applications and VMs
( ) Provides hardware resources to VMs
Answer: Provides hardware resources to VMs
13) What enables a virtual machine to be portable across physical machines running the same
hypervisor?
( ) Guest OS running on a virtual machine
( ) Standardized virtual machine hardware
( ) Virtual machine monitor
( ) Hardware assisted virtualization technique
-
Answer: Standardized virtual machine hardware
14) Which cloud computing characteristic enables consumers to get computing resources
without any human intervention?
( ) Broad network access
( ) Measured service
( ) Rapid elasticity
( ) On-demand self-service
Answer: On-demand self-service
15) Which technique can be used to cluster a virtual machine with a physical machine?
( ) Raw Device Mapping
( ) File-level virtualization
( ) Storage Tiering
( ) Block-level virtualization
Answer: Raw Device Mapping
16) The graphic shows three thin LUNs with their allocated and reported capacities. The total
usable capacity of the storage system is 1500 GB. What is the available capacity of the storage
system?
( ) 300 GB
( ) 750 GB
( ) 900 GB
( ) 1050 GB
Answer: 1050 GB
17) What is a storage group in automated storage tiering?
( ) Logical collection of LUNs that are managed together
( ) Physical collection of RAID-protected storage drives
-
( ) Logical collection of LUNs created only from storage drives of the same type
( ) Physical collection of storage drives over which data is uniformly distributed
Answer: Logical collection of LUNs that are managed together
18) What best describes a thin LUN extent?
( ) Minimum amount of storage allocated at a time to a thin LUN from a thin Pool
( ) Collection of physical drives that provide the actual physical storage used by thin LUNs
( ) Maximum amount of storage that can be allocated at a time to dynamically expand a thin
LUN
( ) Total amount of physical storage allocated to the thin LUN from the thin pool
Answer: Minimum amount of storage allocated at a time to a thin LUN from a thin Pool
19) What is a benefit of NIC teaming?
( ) Improves network security
( ) Increases switch port availability
( ) Provides fault tolerance
( ) Avoids physical NIC failure
Answer: Provides fault tolerance
20) What is a component of VM network?
( ) Virtual switch
( ) Virtual IDE Controller
( ) Virtual machine monitor
( ) Virtual SCSI controller
Answer: Virtual switch
21) Which networking component does the label X represent in the graphic?
( ) Physical NIC
( ) Virtual NIC
-
( ) Physical HBA
( ) Virtual HBA
Answer: Physical NIC
22) What is a feature of a VSAN?
( ) Each VSAN has its own fabric services
( ) Multiple VSAN can be members of a zone
( ) Each VSAN has its own, dedicated trunk link
( ) VSAN ID must be unique for each trunk port
Answer: Each VSAN has its own fabric services
23) What is a benefit of a VLAN?
( ) Increases security level
( ) Standardized networking
( ) Reduced OPEX
( ) Increased broadcast activity
Answer: Increases security level
24) An organization requires that each user needs to access their own copy of OS and
applications installed on a centralized location. Which virtualization solution will you
recommend?
( ) Virtual Desktop Infrastructure
( ) Application Encapsulation
( ) Remote Desktop Services
( ) Application Streaming
Answer: Virtual Desktop Infrastructure
25) What is explored during the proof of concept phase for cloud adoption?
( ) Ensure the provider supports the open virtual machine format
( ) Ensure the provider has the capability to meet the service level objectives
-
( ) Ensure the provider can provide the RPO
( ) Ensure the provider stores the data in a geographic location that the organization chooses
Answer: Ensure the provider supports the open virtual machine format
26) What is updated when attributes of a cloud service change?
( ) Incident history log file
( ) Problem resolution document
( ) Chargeback report
( ) Configuration management database
Answer: Configuration management database
27) Which cloud deployment model is typically preferred by an individual who is least
concerned about the security or availability risks and most concerned about reducing cost?
( ) Public
( ) Private
( ) Community
( ) Hybrid
Answer: Public
28) The slower data transfer rate between a compute cluster and a storage array has been
adversely impacting multiple cl oud services. Which service management process helps to
mitigate this impact?
( ) Service catalogue management
( ) Service asset and configuration management
( ) Performance management
( ) Compliance management
Answer: Performance management
29) Which product provides cloud user access management capability?
( ) EMC Unified Infrastructure Manager
( ) EMC Unisphere
-
( ) VMware Service Manager
( ) VMware vCloud Director
Answer: VMware vCloud Director
30) An administrator wants to use a single management interface to interact with all
standalone virtual infrastructure components for creating virtual pools. These components
include compute, network, and storage devices from multiple vendors.
Which software will you recommend to the administrator?
( ) Unified management
( ) User access management
( ) Virtual infrastructure management
( ) Element management
Answer: Unified management
31) What is a key activity in problem management?
( ) Transfers error correction activity to incident management
( ) Prioritizes incidents based on the timestamp
( ) Documents the incident history or all services
( ) Analyzes the incident history and identifies the impending service failures
Answer: Analyzes the incident history and identifies the impending service failures
32) What does integrity ensure in an information system?
( ) Only authorized changes to data are allowed
( ) Only authorized users have access to data
( ) Authorized users have reliable access to data
( ) Specific access rights to data is given to authorized users
Answer: Only authorized changes to data are allowed
-
33) What is a feature of multi-factor authentication?
( ) Access is granted only when all the specified factors are validated
( ) Multiple specified factors enable elimination of attackers even if one factor fails
( ) A single credential is used to provide access to multiple services
( ) Enables multiple clients to be serviced by the same set of resources
Answer: Access is granted only when all the specified factors are validated
34) What best describes the authorization process in information security?
( ) A process to give a user specific access rights to resources
( ) A process to ensure that a users credentials are genuine
( ) A process to ensure that users have reliable and timely access to data
( ) A process to ensure that only legitimate users have access to data
Answer: A process to give a user specific access rights to resources
35) Which security mechanism enables organizations to authenticate their users of cloud
services using a chosen provider?
( ) Federated Identity Management
( ) One-time passwords
( ) Open virtualization format
( ) Directory services
Answer: Federated Identity Management
36) Which remote replication mode provides a near-zero recovery point objective (RPO)?
( ) Asynchronous replication
( ) Synchronous replication
( ) Database log shipping
( )Differential replication
-
Answer: Synchronous replication
37) Which management activity ensures adequate availability of resources based on a service
level objective?
( ) Capacity
( ) Availability
( ) Performance
( ) Security
Answer: Capacity
38) What is a function of a backup server?
( ) Manages backup operations
( ) Sends backup data to the storage node
( ) Sends backup data to the storage device
( ) Stores deduplicated data
Answer: Manages backup operations
39) In which circumstance is a converter boot CD used for a P2V conversion?
( ) Perform a hot P2V conversion within a data center
( ) Perform a cold P2V conversion
( ) Perform a hot P2V conversion between two data centers
( ) Perform a hot P2V conversion in the cloud
Answer: Perform a cold P2V conversion
40) Which statement is true about VM-to-VM affinity?
( ) VMs running the same guest OS should always run on different hypervisors
( ) Selected VMs should run on different hypervisors
( ) Selected VMs should run on the same hypervisor
( ) VMs running a different guest OS should always run on the same hypervisors
-
Answer: Selected VMs should run on the same hypervisor
41) Which cloud characteristic enables the consumers to use cloud services from a wide range
of client platforms?
( ) On-demand self service
( ) Resource pooling
( ) Broad network access
( ) Rapid elasticity
Answer: Broad network access
42) What is a feature of a linked clone?
( ) Shares the virtual disk with its parent VM
( ) Uses the network identity of its parent VM
( ) Copies changes made to its parent VM
( ) Contains a symbolic link that enables raw device mapping
Answer: Shares the virtual disk with its parent VM
43) What best describes the VM snapshot?
( ) Preserves the state and data of a VM at a specific point-in-time
( ) Creates a child VM from the configuration file of its parent VM
( ) Reverts the configurations of a VM to a later point- in-time
( ) Creates a master copy of a powered-off VM
Answer: Preserves the state and data of a VM at a specific point-in-time
44) What best describes a VM template?
( ) A reusable image created from a VM
( ) A point-in-time replica of VM log file
( ) A protected copy of a VM snapshot
( ) an online VM with a hardened guest OS
-
Answer: A reusable image created from a VM
45) What is a feature of DNS server load balancing?
( ) IP addresses of application servers are mapped to a domain name
( ) IP addresses of the load balancers are mapped to a virtual IP address
( ) Domain names of application servers are mapped to the IP address of the load balancer
( ) IP addresses of the clients are mapped to the IP addresses of the application servers
Answer: IP addresses of application servers are mapped to a domain name
46) Three types of network traffic -VM, IP storage, and management share a total bandwidth
of 300 Mbps of a NIC team. The management traffic should not be allowed to use more than 50
Mbps of the NIC teams bandwidth. Which parameter helps in controlling the bandwidth for the
management traffic?
( ) Limit
( ) Share
( ) Burst size
( ) Average bandwidth
Answer: Limit
47) Which statement is true about Remote Desktop Services (RDS)?
( ) RDS provides individual OS sessions to the client systems
( ) Each RDS session has its own OS and applications installed
( ) A user has full control to the resources of the virtualized desktop
( ) Resources of the client system is consumed to run applications on the virtual desktop
Answer: RDS provides individual OS sessions to the client systems
48) An organization is planning to migrate a tightly coupled application to the cloud. Which
migration strategy is recommended?
-
( ) Forklift
( ) Hybrid
( ) Differential
( ) Multi-step
Answer: Forklift
49) What is considered during the optimization phase for cloud adoption?
( ) Usage pattern of consumed resources
( ) Option to relinquish tightly coupled applications
( ) Cost of the existing software licenses
( ) Optimum effort needed to migrate applications
Answer: Usage pattern of consumed resources
50) What is considered during the optimization phase for cloud adoption?
( ) Usage pattern of consumed resources
( ) Option to relinquish tightly coupled applications
( ) Cost of the existing software licenses
( ) Optimum effort needed to migrate applications
Answer: Usage pattern of consumed resources
51) What is determined during the compliance assessment for cloud adoption?
( ) Contractual obligations to store data in specific jurisdictions
( ) Cost of the in-house infrastructure and using the cloud infrastructure
( ) Issues related to performance of the cloud infrastructure
( ) Compatibility of consumer applications with the cloud infrastructure
Answer: Contractual obligations to store data in specific jurisdictions
-
52) What should an organization consider before migrating its applications and operating
system to the public cloud to prevent vendor lock-in?
( ) Ensure the provider supports the open virtual machine format
( ) Ensure the provider has the capability to meet the service level objectives
( ) Ensure the provider can provide the RPO
( ) Ensure the provider stores the data in a geographic location that the organization chooses
Answer: Ensure the provider supports the open virtual machine format
53) Which storage array-based security mechanism helps restricting unauthorized host access
to storage volumes?
(X) LUN masking
( ) Sandboxing
( ) Intrusion detection system
( ) Demilitarized zone
Answer: LUN masking
54) What best describes a VM theft?
( ) An attacker copies or moves a VM in an unauthorized manner
( ) An attacker installs a rogue Virtual Machine Monitor to take control of cloud resources
( ) An attacker installs unauthorized applications on the guest OS of a VM
( ) An attacker controls the interaction between a VM and the application
Answer: An attacker copies or moves a VM in an unauthorized manner
55) An attacker has carried out a denial-of-service attack in a cloud environment. In this attack,
the attacker causes several virtual machines to consume a large amount of network bandwidth.
This has resulted in unavailability of bandwidth for storage and virtual machine migration
traffic.
What will you recommend to minimize the impact due to this attack?
-
( ) Configure limit for the virtual machine traffic
( ) Configure reservation for the virtual machine traffic
( ) Encrypt all the data transfer mitted over the network
( ) Reduce network bandwidth for storage and migration traffic
Answer: Configure limit for the virtual machine traffic
56) Which management activity ensures adequate availability of resources based on a service
level objective?
( ) Capacity
( ) Availability
( ) Performance
( ) Security
Answer: Capacity
57) What is the impact on RAID set performance when higher revolutions per minute (RPM)
drives are mixed with lower RPM drives?
( ) Lowers the overall performance
( ) Improves the overall performance
( ) No impact on the overall performance
( ) Provides overall performance equivalent to the highest RPM drive
Answer: Lowers the overall performance
58) Which cloud characteristic enables the consumers to use cloud services from a wide range
of client platforms?
( ) On-demand self service
( ) Resource pooling
( ) Broad network access
( ) Rapid elasticity
-
Answer: Broad network access
59) Which component(s) of a cloud infrastructure framework helps automating the creation
and delivery of computing resources to the consumers?
( ) Service management tools
( ) Physical infrastructure
( ) Virtual infrastructure
( ) Application and platform software
Answer: Service management tools
60) In which circumstance is a converter boot CD used for a P2V conversion?
( ) Perform a hot P2V conversion within a data center
( ) Perform a cold P2V conversion
( ) Perform a hot P2V conversion between two data centers
( ) Perform a hot P2V conversion in the cloud
Answer: Perform a cold P2V conversion
61) What is a feature of Virtual Machine File System (VMFS)?
( ) Enables multiple compute systems to access a shared volume
( ) Managed only by a NAS system
( ) Maps the logical path of a file to the physical path name
( ) Maps the file metadata to the object ID
Answer: Enables multiple compute systems to access a shared volume
62) What is a feature of a linked clone?
( ) Shares the virtual disk with its parent VM
( ) Uses the network identity of its parent VM
-
( ) Copies changes made to its parent VM
( ) Contains a symbolic link that enables raw device mapping
Answer: Shares the virtual disk with its parent VM
63) What can be backed up if a backup agent is installed on a VM?
( ) Data stored on virtual disk
( ) VM configuration files
( ) VM image
( ) Virtual machine file system
Answer: Data stored on virtual disk
64) What is a feature of DNS server load balancing?
( ) IP addresses of application servers are mapped to a domain name
( ) IP addresses of the load balancers are mapped to a virtual IP address
( ) Domain names of application servers are mapped to the IP address of the load balancer
( ) IP addresses of the clients are mapped to the IP addresses of the application servers
Answer: IP addresses of application servers are mapped to a domain name
65) Which statement is true about application encapsulation?
( ) Application package contains built-in agents
( ) Application requires locally-installed agents for execution
( ) Encapsulated application overwrites the already existing application
( ) Application requires a local installation
Answer: Application package contains built-in agents
66) Which cloud service management process monitors and reports on allocation and utilization
of resources by consumers in order to generate a chargeback report?
( ) Financial management
( ) Capacity management
( ) Service catalogue management
-
( ) Performance management
Answer: Financial management
67) Which software allows an administrator to create and publish a service catalogue?
( ) Unified management
( ) User access management
( ) Virtual infrastructure management
( ) Element management
Answer: User access management
68) What is an example of cloud vendor lock-in?
( ) Application built on a PaaS model cannot be moved to an IaaS model
( ) A software vendor does not offer its software as a service
( ) Organization cannot move its existing licensed software into the cloud
( ) On-disk locking prevents simultaneous powering on of the same VM
Answer: Application built on a PaaS model cannot be moved to an IaaS model
69) What is true about the Trusted Computing Base in information security?
( ) Defines the boundary between security-critical and non-critical parts of an information
system.
( ) Defines the policies of confidentiality, integrity, and availability of an information system
( ) Defines the boundary between internal and external networks in an organization
( ) Defines the policies of authentication, authorization, and auditing of an information system
Answer: Defines the boundary between security-critical and non-critical parts of an information
system
70) Which storage array-based security mechanism helps restricting unauthorized host access
to storage volumes?
-
( ) LUN masking
( ) Sandboxing
( ) Intrusion detection system
( ) Demilitarized zone
Answer: LUN masking