Cloud Infrastructure and Services (EMCCIS)

Size: px
Start display at page:

Download "Cloud Infrastructure and Services (EMCCIS)"

Transcription

1 Cloud Infrastructure and Services (EMCCIS) 1. What is a key benefit of virtualization technology? a. Rapid elasticity b. Flexible metering c. Policy compliance d. Capacity planning 2. Which tool helps to create Cloud services? a. Service monitoring tool b. Service planning tool c. Service management tool d. Service creation tool 3. Which technique enables making physical resources appear as logical resources? a. Utility computing b. Self provisioning c. Grid Computing d. Virtualization 4. Which is an essential characteristic of the Cloud? a. Resource planning b. Resource reservation c. Resource pooling d. Resource utilization 5. Which is a key step in building a Cloud Infrastructure? a. Automate service provisioning b. Customize services and resources c. Centralize services and resources d. Automate resource classification 6. Which is a benefit of RAID? a. Improves storage system performance b. Simplifies distribution of parity across mirrored disks c. Prevents disk failure in a RAID set d. Ensures data integrity in a RAID set 7. Which statement is true about FC SAN? a. Provides higher scalability as compared to DAS

2 b. Has limited ability to share resources c. Enables object level access to data d. Supports a maximum of 256 nodes 8. Which key requirement of a data center refers to the ability of IT to support new business initiatives dynamically? a. Manageability b. Availability c. Capacity d. Flexibility 9. Which are the key parameters that determine the performance and availability of a RAID set? a. Number of drives in a RAID set and RAID level b. Number of drives in a RAID set and the capacity of each drive c. Number of RAID controllers and type of RAID implementation d. Number of drives in a RAID set and Type of RAID implementation 10. Which key requirement of a data center is violated when an authorized storage administrator is not able to remotely login to a server in the data center? a. Scalability b. Flexibility c. Security d. Availability 11. What is stored in virtual machine log file? a. Information of virtual machine s activities b. Virtual machine s RAM contents c. Virtual machine BIOS information d. Information of virtual machine s configuration 12. Which technology enables a physical CPU to appear as two or more logical CPUs? a. Hyper-threading b. Multi-core c. Load balancing d. Ballooning 13. Which optimization technique is used to detect identical pages in the memory? a. Transparent page sharing b. Memory ballooning c. Memory swapping d. Cache flushing 14. Which is the primary function of hypervisor? a. Allows multiple operating systems to run concurrently on a physical machine b. Allows multiple operating systems to run concurrently on a virtual machine c. Allows multiple file systems to run concurrently on a virtual machine

3 d. Allows authorization to virtual machine resources to users 15. Which method enables a virtual machine to directly access a LUN on a storage array? a. File system locking b. Virtual machine clustering c. Raw device mapping d. Virtual storage mapping 16. What are the three major building blocks for automated storage tiering? a. RAID type, storage type, policies b. Storage type, storage group, policies c. Storage group, RAID group, storage type d. Storage group, RAID group, group policy 17. What is used to create secondary cache in cache tiering mechanism? a. DRAM b. FC drive c. Solid state drive d. SATA drive 18. When is thin LUN preferred over traditional LUN? a. Performance is predominant b. Security is more important c. Storage space efficiency is paramount d. High availability is predominant 19. What defines the minimum amount of physical storage allocated at a time to a thin LUN from a thin Pool? a. Thin LUN extent b. Thin LUN capacity c. Thin LUN factor d. Thin LUN set size 20. Which is a benefit of network virtualization? a. Enhanced storm control b. Increased resource acquisition c. Improved manageability d. Better policy control 21. Which network parameter sets maximum data transfer rate across a virtual machine port group without queuing or dropping frames? a. Burst size b. Peak bandwidth c. Share d. Limit

4 22. As an organization leverages more resources from Cloud service providers, which expense of the organization would be expected to grow larger? a. Power and energy b. Management c. Infrastructure d. Operational 23. Which technique allows traffic from multiple VLANs to traverse over a single network connection? a. NIC Teaming b. Multipathing c. Port group d. Trunking 24. What is enabled by using NIC teaming? a. Balance traffic across physical servers b. Allocate bandwidth to traffic based on priority c. Failover to another available physical NIC in the event of a physical NIC failure d. Transfer data to a LUN on a FC storage system using multiple network links 25. What best describes the "metered service" characteristic of Cloud computing? a. Consumers are billed based on resource usage. b. Services are provisioned based on their deman c. Metering services are created when required from the resource pools. d. Metering services can scale up and down based on resource usage. 26. Which correctly describes N_Port ID Virtualization technology? a. Single physical FC HBA port functions as multiple virtual N_ports b. Single physical FC HBA port functions as multiple virtual E_ports c. Single virtual FC HBA port functions as multiple physical N_ports d. Single virtual FC HBA port functions as multiple physical E_ports 27. What correctly describes application virtualization? a. Encapsulates operating system resources and the application b. Increases application and CPU utilization c. Provides interoperability between different application versions d. Breaks dependencies between application interface and processing logic 28. What is true about application encapsulation? a. Requires a locally installed agent on the client machine b. Requires a built-in agent at the remote server c. Does not rely on software installation or underlying OS d. Requires a locally installed agent on the client machine and a built in agent 29. What is true about application streaming? a. Requires no agent at client machine

5 b. Requires a locally installed agent on the client machine and a built in agent on the application c. Requires a locally installed agent on the client machine d. All the data is delivered to the client after application starts 30. When is a connection broker a mandatory component of Virtual Desktop Infrastructure architecture? a. Desktop VMs are assigned from VM pool b. High-end graphic applications are used c. Additional security is required d. Dedicated desktop VM is assigned to each user 31. In which Cloud deployment model would an organization see operational expenditures grow in proportion to capital expenditures? a. On-premise Private Cloud b. External Private Cloud c. Public Cloud d. Hybrid Cloud 32. What is the Cloud service model offered by EMC Mozy? a. Software-as-a-Service b. Platform-as-a-Service c. Infrastructure-as-a-Service d. Virtualization-as-a-Service 33. What is true about virtual desktop infrastructure (VDI)? a. Involves hosting desktop which runs as hypervisor on the server b. Requires hypervisor based VDI agent support c. Each desktop has its own OS and applications in a VM on server d. Each desktop has its own OS and applications installed on client machine 34. What is an advantage of image based backup approach? a. Single pass information collection b. Reduced RPO c. Eliminate site failures d. Reduced VM failures 35. Which is true about virtual machine (VM) fault tolerance mechanism? a. Both primary and secondary VMs share same virtual disks b. Both primary and secondary VMs have separate virtual disks c. Only primary VM can access the shared virtual disk d. Only secondary VM can access the shared virtual disk

6 36. What occurs to the guest OS configuration when a virtual machine is reverted from its snapshot? a. Guest OS configurations are reverted to the point-in-time of snapshot creation b. Current guest OS configurations are preserved c. Reference VM Settings are used to configure guest OS d. Settings are lost and need manual configuration 37. What is the Cloud service model offered by Cloud Foundry? a. Software-as-a-Service b. Platform-as-a-Service c. Infrastructure-as-a-Service d. Virtualization-as-a-Service 38. What correctly describes the state of virtual disks of a virtual machine after an array-to-array migration is performed? a. Virtual disks are maintained at both source and target arrays b. Virtual disks are only maintained at the source array c. Virtual disks are deleted from the source array after they are copied to the target array d. Virtual disks are deleted from both source and target arrays 39. Which is used as a master copy to create and provision a new virtual machine (VM)? a. VM template b. VM snapshot c. VM clone d. VM backup 40. Which resource may be hired in infrastructure-as-a-service model? a. Operating system b. Storage space c. Middleware d. Database 41. What is the Cloud service model offered by EMC Syncplicity? a. Software-as-a-Service b. Platform-as-a-Service c. Infrastructure-as-a-Service d. Virtualization-as-a-Service 42. Which is an example of platform-as-a-service? a. EMC Atmos online b. Salesforce.com c. Google App Engine d. EMC Mozy

7 43. Which is an example of infrastructure-as-a-service offering? a. Amazon Elastic Compute Cloud b. Google App Engine c. Salesforce.com d. EMC Mozy 44. Which is an example of software-as-a-service offering? a. Amazon Elastic Compute Cloud b. Google App Engine c. Microsoft Azure d. EMC Mozy 45. Which is the Cloud deployment model that will be a suitable choice for a group of organizations with shared concerns? a. Private Cloud b. Hybrid Cloud c. Public Cloud d. Community Cloud 46. Which is a component of virtual infrastructure in Cloud? a. Management software b. Storage array c. Network identity pool d. Service catalog 47. Which option best describes resource bundling in Cloud service creation procedure? a. Bundling application, platform software, and migration tools b. Integrating virtual machine, virtual network, and virtual volume c. Bundling graded compute, network, and application services d. Integrating graded compute, network, and storage pools 48. Which is a key activity in problem management? a. Rectifying error to return Cloud services as quickly as possible b. Analyzing incident history to identify impending service failures c. Checking veracity of problem records in CMDB d. Transferring problem history to incident management 49. Which Cloud service management process is responsible for optimizing utilization of IT resources? a. Service asset and configuration management b. Financial management c. Compliance management d. Capacity management 50. Which functionality is offered by unified management software in the Cloud?

8 a. Provides consolidated view of existing physical and virtual infrastructure across data centers b. Create VMs and allocate them CPU, memory, and storage capacity c. Create zone sets and include nodes into zones d. Create virtual machines and allocate them specified resources 51. Which security mechanism provides an effective control for data confidentiality and integrity? a. Copy and move restrictions b. Authorization c. Trusted computing base d. Encryption 52. What is the primary goal of a security audit? a. Evaluate effectiveness of security enforcement b. Evaluate effectiveness of data confidentiality c. Evaluate effectiveness of data integrity d. Evaluate effectiveness of data availability 53. Which security goal is achieved by data shredding technique? a. Preventing data loss b. Preventing data manipulation c. Ensuring data confidentiality d. Enabling data encryption 54. Which GRC process determines scope of adoption of Cloud services? a. Anti-virus protection measures in Cloud b. Business Continuity c. Risk Assessment d. Disaster management 55. How is intrusion detection implemented under software-as-a-service model? a. Implemented by the Cloud Consumer b. Implemented by the Cloud Service Provider c. Implemented by the Cloud Service Provider and Consumer together d. Implemented by a 3rd party provider 56. Which Cloud model is best suited for small and medium businesses? a. Public b. Private c. Hybrid d. Community 57. Which Cloud adoption phase enables consumer to explore the geographic location to store their data? a. Assessment b. Proof of concept c. Migration

9 d. Optimization 58. Which Cloud migration strategy is recommended for tightly coupled applications? a. Hybrid b. Forklift c. Private d. Public 59. Which application is perceived as a good candidate for migrating to the public Cloud? a. Proprietary and mission-critical application b. Non-proprietary and non-mission critical application c. Mission critical and I/O intensive application d. Mission critical and security sensitive application 60. What factor could lead to Cloud vendor lock-in for consumers? a. Lack of open standards in Cloud operations b. Lack of security compliance c. Mission critical nature of the applications d. Performance sensitivity of the business operations 61. What is the process of grouping several smaller physical drives and presenting them to the host as one logical drive? a. Partitioning b. LUN creation c. LUN masking d. Concatenation 62. A company plans to hosts a video streaming application and you are asked to recommend a RAID level that can be used for this application. Which RAID level should you recommend? a. 1 b. 3 c. 5 d Which data access pattern has the most significant impact on performance due to slow seek times? a. Random, large reads b. Random, small writes c. Sequential, large writes d. Sequential, small reads 64. What is the stripe width for a six disk RAID 6 LUN?

10 a. 3 b. 4 c. 5 d Which storage array mechanism prevents two hosts from accessing the same LUN? a. Virtual provisioning b. Partitioning c. Zoning d. LUN masking 66. Which statement applies to NAS? a. General purpose server for block and content addressed data b. General purpose server for block and file level access c. Specialized server for block and content addressed data d. Specialized server for the file level data access 67. What is a benefit of VLAN? a. Eliminates collisions within the collision domain b. Provides higher network bandwidth c. Enhances security by restricting user access d. Enables transmission of broadcast traffic from one VLAN to another 68. Which best describes business continuity? a. Operating the infrastructure in a degraded mode after a failure occurs b. Securing the storage infrastructure from internal and external attacks c. Recovering the systems, data, and infrastructure after a disaster that adversely affects business operations d. Preparing for, responding to, and recovering from an application outage that adversely affects business operations 69. Which Cloud service model includes the complete stack provided as a service, including all the layers of the service model? a. Software-as-a-Service b. Infrastructure-as-a-Service c. IT-as-a-Service d. Platform-as-a-Service

11 70. In which compute virtualization technique is the guest operating system kernel modified to eliminate the need for binary translation? a. Paravirtualization b. Software assisted virtualization c. Hardware assisted virtualization d. Full virtualization 71. A storage administrator wants to know about the current and historic utilization of storage in their data center. Which report will provide this information? a. Routine report b. Performance report c. Chargeback report d. Capacity planning report 72. A Cloud service provider is considering offering both a SaaS and a PaaS service to their customers. Would their security concerns about virtualization differ if they were to choose only one of these services, and why? a. Yes; PaaS implementations require an API for authenticating users with external identity systems; SaaS implementations do not b. Yes; SaaS implementations require an API to encrypt data at rest; PaaS implementations do not c. No; SaaS and PaaS implementations both require that the customer is responsible for data security d. No; SaaS and PaaS implementations both require the same attention to virtualization security 73. What is a primary goal of incident management? a. Identifying the root cause of recurring incidents that exhibit common symptoms b. Restoring Cloud services to consumers as quickly as possible c. Analyzing incident history and identifying impending service failures d. Reporting incidents to the Cloud service provider 74. What are the two key expenses involved in running a business from the Cloud? a. Migration and operational costs b. Infrastructure and management costs c. Backup and service deployment costs d. Management and compliance costs 75. Which mechanism enables a virtual machine to directly access LUNs in a storage system? a. Virtual Machine File System b. Thin provisioning

12 c. Raw Device Mapping d. Block-level virtualization 76. Which is used to statically identify a hardware port device in an FC SAN? a. MAC b. Channel c. WWN d. IP 77. Which is a benefit of automatic site failover capability in a data center environment? a. Elimination of site failures b. Reduced Recovery Point Objective c. Elimination of Virtual Machine File System failures d. Reduced Recovery Time Objective 78. What is a key performance consideration for migrating operations to the Cloud? a. Resource utilization matrix b. Availability of different storage performance tiers c. Latency of the network between consumer and service provider d. Availability of target based de-duplication capability 79. Which is a characteristic of channel technology? a. Loose coupling b. Long distance transmission c. Dynamic connection establishment d. Low protocol overhead 80. Which is a best practice for selecting drives for a thin pool? a. Drive speed should be rpm or higher b. Drives should run at the same RPM c. The pool should be created from mix of FC, SATA, and Flash drives d. Drives should be supplied by the same vendor 81. Which statement about Cache tiering is true? a. It increases the performance of the primary cache b. It enables the use of solid state drives as secondary cache c. It enables the movement of data at the sub-lun level d. It increases the size of the primary cache 82. What is a limitation when using a backup agent on a hypervisor for backing up virtual machine data?

13 a. Backing up a LUN that is directly attached to a virtual machine using Raw Device Mapping is very slow b. Backing up data residing on a Virtual Machine File System is very slow c. It is not possible to back up a LUN that is directly attached to a virtual machine using Raw Device Mapping d. It is not possible to back up data residing on a Virtual Machine File System 83. What enables a LUN that has more capacity than is physically allocated to be presented to a compute system? a. Global namespace mapping b. Raw Device Mapping c. Virtual provisioning d. Automated storage tiering 84. What are the three building blocks of automated storage tiering? a. Storage type, storage group, storage pool b. Storage type, storage group, policy c. Storage pool, policy, storage group d. Storage pool, policy, storage type 85. Which attack could enable an attacker to install a rogue hypervisor that can take control of the underlying server resources? a. Side channel attack b. Hyperjacking c. VM theft d. VM escape 86. Which statement is true about User State virtualization? a. Operating system refreshes and migrations become easier to deploy b. Templates are used to create User States c. Common User States are used for all the desktops d. User States are preserved as temporary files 87. Which parameters need to be configured to control the resources consumed by virtual machines? a. Share, Limit, and Reservation b. Threshold, Priority, and Share c. Reservation, Threshold, and Priority d. Limit, Reservation, and Threshold 88. Which backup solution provides support only for source-based deduplication? a. EMC Avamar b. EMC Data Domain c. EMC Networker

14 d. EMC SourceOne 89. Which RAID type uses a dedicated parity disk? RAID 1 RAID 3 RAID 5 RAID Which issues are addressed by RAID technologies? Performance and data backup Loss of data due to disk drive hardware failure and performance Data corruption and backup Loss of data due to disk drive hardware failures and data corruption 91. Which is a feature of EMC PowerPath/VE? Traffic Shaping Dynamic Load Balancing Storm Control Integrated Traffic Steering 92. Which is responsible for creating Cloud services? User access management Virtual infrastructure management Unified management Cloud deployment 93. Which FC port type would only be used to connect an FC switch to another switch? F_port E_port G_port N_port 94. What is a reason for monitoring data center elements? To ensure that the IT support staff performs efficiently To ensure that no data is lost if there is a disaster or service disruption To eliminate threats to storage infrastructure security To determine that the components are available and functioning properly 95. Which product provides a desktop virtualization solution? a. VMware View b. VMware ThinApp c. VMware Workstation d. VMware Server

15 96. What is the correct sequence of steps for performing a hot conversion from a physical machine to a virtual machine (VM)? a. The converter server creates a VM on the destination machine b. The agent clones the physical disk of the source machine to the virtual disk of the destination VM c. The agent synchronizes the data and installs the required drivers to allow the OS to boot from the VM and personalize the VM d. The converter server installs the agent on the source physical machine 97. Which block storage over IP protocol requires a pair of bridges that uses IP as the transport protocol? a. iscsi b. FCoE c. FCIP d. ifcp 98. What is a key advantage of pointer-based virtual replication compared to pointer-based full volume replication? a. The replica can be used even when the source device has failed b. The source device is not required for the restore operation c. The replica device requires less space d. The replica is immediately accessible 99. Which is a benefit of data striping in RAID? a. Efficient allocation of sequential reads and writes b. Independent disks allow multiple reads and writes to take place simultaneously c. Improved security by creating multiple identical copies of data d. Efficient allocation of random reads and writes 100. Which statement is true about user access management software? a. It informs the user about incident and problem status b. It enables creating and publishing a service catalog c. It enables the user to configure pools and virtual resources d. It provides a consolidated view of existing virtual resources 101. Which functionality is enabled by N_Port ID Virtualization (NPIV)? a. A virtual N_port can access the FC Raw Device Mapping LUN assigned to a physical HBA b. A virtual N_port can act as multiple physical HBA ports c. A physical NIC port can operate as multiple virtual N_ports d. A physical FC HBA port can operate as multiple virtual N_ports 102. What needs to be assessed by an organization before migrating business operations to the Cloud?

16 a. Financial strength of the service provider b. Value added services provided by the service provider c. Required Quality of Service (QoS) level d. Capacity of the service provider s physical infrastructure 103. Which Cloud deployment model provides the highest level of security and control? a. External Private Cloud b. Hybrid Cloud c. Public Cloud d. On-premise Private Cloud 104. Which product provides a dashboard showing Vblock infrastructure configuration and resource utilization? a. VMware vcloud Director b. Cisco Nexus 1000V c. VMware vcenter Chargeback d. EMC Ionix Unified Infrastructure Manager 105. An organization performs full backup of its data every week. They are experiencing long backup windows and huge network bandwidth consumption during the backup process. What should the organization do? a. Use source-based deduplication b. Use target-based deduplication c. Change the backup software d. Use backup to tape 106. Which is a benefit of the Public Cloud? a. Reduced OPEX (Operational Expenditure) b. Simplification of regulatory compliance c. Self-service resource requests d. Transparent Provider-to-Provider migrations 107. Which data center management activity helps ensure business continuity by eliminating single points of failure? a. Availability management b. Security management c. Capacity management d. Performance management 108. Which address is used to statically identify a physical port in a Fibre Channel SAN environment? a. WWPN b. MAC

17 c. IP d. Fibre Channel 109. Which Fibre Channel (FC) port type would only be used to connect an FC switch to another switch? a. E_port b. N_port c. F_port d. G_port 110. Which product provides an application virtualization solution? a. VMware ThinApp b.vmware View c. VMware Server d. VMware Workstation" 111. An organization is deploying desktop virtualization using the Virtual Desktop Infrastructure technique. Which cost component increases for the organization? a. Compute infrastructure b. Desktop hardware c. Application deployment d. IT management 112. If an organization leverages more resources from Cloud service providers, which expense would be expected to grow larger? a. Management costs b. Operational expenditures c. Infrastructure costs d. Capital expenditures 113. What are key cost factors involved while using cloud services from a service provider? a. Data migration, operations b. Management, compliance c. Service deployment, backup management d. Infrastructure, management e What should be included in a Cloud Service Termination Agreement? a. Data migration plan b. Service performance levels c. Time required for the server provider to restart operations d. Cost of transferring the ownership of infrastructure back to the client Which type of software is capable of creating cloud services?

18 a. Unified management b. Capacity management c. User access management d. Platform management 115. Consider the following steps: Harden the VM image to create a known security baseline Remove unneeded devices and functions Utilize up-to-date VM patches and security updates Configure access permissions for a select group of administrators Which of the steps are specific to making VM templates more resistant to attack? a. 1 and 3 b. 1 and 4 c. 2 and 4 d. 3 and What is the basis for determining the size of the virtual machine swap file? a. The sum of the virtual machine memory limit and the reserved memory b. The physical machine memory size only c. The difference between the physical machine memory size and the virtual machine memory limit d. The difference between the virtual machine memory limit and the reserved memory 117. An organization has decided to deploy desktop virtualization using the Virtual Desktop Infrastructure technique. Which cost component to the organization will most likely increase due to this decision? a. Compute infrastructure b. Application deployment c. IT management d. Client devices 118. What does the Recovery Point Objective (RPO) define? a. Period of time needed to detect a fault and determine its cause b. Period of time by which systems and applications must be recovered after an outage c. Amount of data loss that a business can endure after an outage d. Number of applications that are mission critical for a business to restore after an outage 119. Which is a consideration for a Cloud user who is drafting a Cloud Service Termination Agreement? a. Cost of transferring the ownership of infrastructure back to the client b. Service performance levels c. Data migration plan d. Time required for the server provider to restart operations 120. During which phase of the Cloud migration process should it be verified that an application behaves as expected in the Cloud?

19 a. Proof of Concept b. Assessment c. Automation d. Optimization 121. Which statement about virtual machine (VM) fault tolerance is true? a. It does not use the VM file system for protection b. It provides faster backup of VM disk files c. VM cloning occurs between dissimilar hardware d. The secondary VM is in constant synchronization with the primary VM 122. Which mechanism provides protection against NIC failure? a. NIC trunking b. VLAN tagging c. NIC teaming d. Port grouping 123. What enables the storage of virtual machine files on a NAS device? a. Virtual machine monitor b. Virtual Machine File System c. Network File System d. Guest operating system 124. You are asked to create three VLANs on a newly installed physical Ethernet switch. Which operations should you perform to configure the VLANs? a. Add three VLAN IDs to the hypervisor s VLAN ID pool, then assign each VLAN ID to one or more switch ports b. Configure a trunk port on the switch, then assign three VLAN IDs to the trunk port c. Activate VLAN trunking and tagging on the switch, then define three VLAN IDs on the switch d. Define three VLAN IDs on the switch, then assign each VLAN ID to one or more switch ports 125. Which Governance, Risk and Compliance process needs to be performed by a client to determine the scope of adoption of Cloud services? a. Compliance penalty assessment b. Regulatory compensation assessment c. Enlisting anti-virus protection measures d. Risk assessment 126. Which process categorizes resource pools based on their performance and capacity? a. Resource Cataloging b. Resource Distribution c. Resource Grading d. Resource Bundling

20 127. In which Cloud deployment model would an organization see operational expenditures grow in proportion to capital expenditures? a. On-premise Private Cloud b. External Private Cloud c. Public Cloud d. Hybrid Cloud 128. As an organization leverages more resources from Cloud service providers, which expense of the organization would be expected to grow larger? a. Power and energy b. Management c. Infrastructure d. Operational 129. What best describes the "metered service" characteristic of Cloud computing? a. Consumers are billed based on resource usage. b. Services are provisioned based on their deman c. Metering services are created when required from the resource pools. d. Metering services can scale up and down based on resource usage Which Cloud service model allows the user to run any operating system and application? a. Platform-as-a-Service b. Infrastructure-as-a-Service c. Software-as-a-Service d. IT-as-a-Service 131. Which Cloud service model is most appropriate for application development? a. Infrastructure-as-a-Service b. Platform-as-a-Service c. Software-as-a-Service d. IT-as-a-Service 132. An organization runs a proprietary operating system for its custom applications. System performance has been declining at an increasing rate. They would like to leverage a Cloud solution to address their problem. Which Cloud service model would be appropriate for them? a. Infrastructure-as-a-Service b. Platform-as-a-Service c. Software-as-a-Service d. IT-as-a-Service 133. Which problem is addressed by RAID technologies? a. Data corruption b. Data backup

21 c. Data loss d. Data security 134. Which is a benefit of server clustering? a. High CPU utilization b. High availability c. High memory utilization d. High security 135. Which RAID type uses parity to protect against data loss? a. RAID 3 b. RAID 0 c. RAID 1 d. Nested 136. Which RAID types use no parity in protecting against data loss? a. RAID 1 and Nested b. RAID 0 and RAID 6 c. RAID 3 and RAID 5 d. RAID 5 and Nested 137. Which component retrieves data from disk in an Intelligent Storage System? a. Front-end b. Cache c. LUN d. Back-end 138. Which component of a compute system performs the creation and control of logical storage? a. Volume Manager b. Operating System c. DBMS d. Application 139. Which is used to logically group FC ports? a. Zone b. VLAN c. Mask d. ISL 140. Which parameter uniquely identifies a switch in a SAN environment? a. Area ID b. Port ID c. Domain ID d. WWN

22 141. Which protocol is most commonly used for compute-to-compute communication? a. TCP/IP b. FC c. FCIP d. iscsi 142. Which term is used to describe the virtual space in which all nodes communicate with each other in a SAN environment? a. Fabric b. Fibre Channel c. Loop d. Trunking 143. What is a benefit of an Object based storage system? a. It uses multiple object IDs for high security b. It provides fast replication c. It ensures data integrity d. It enables fast backup 144. Which are components of FCoE? a. Converged Network Adapter and Fibre Channel Forwarder b. Bridging and E_port c. E_port and Zoning d. TCP/IP and Fibre Channel 145. A compute resource is accessing data from storage over a network at the block level. Which statement is true about the associated file system? a. It is managed by the compute resource. b. It is managed by the storage. c. It is part of the network. d. It is managed by the application Which enables distributed FC SAN islands to interconnect over a WAN? a. FCoE b. CEE c. ISCSI d. FCIP 147. Which FC port type is located on the compute system's HBA? a. N_port b. E_port c. F_port d. G_port 148. Which port type should be designated to allow an FC switch port to automatically determine its functionality during initialization?

23 a. G_port b. N_port c. F_port d. E_port 149. What does the Recovery Time Objective (RTO) define? a. Amount of data loss that a business can endure between an outage and recovery b. Period of time by which systems and applications must be recovered after an outage c. Number of applications that are mission critical for a business to recover after an outage d. Period of time needed to detect a fault and determine its cause prior to recovery 150. An administrator wants to perform replication between heterogeneous storage arrays over a WAN. Which technology should you recommend to the administrator? a. SAN-based replication b. Three site replication c. Array-based replication d. Silvering 151. What is a key advantage of pointer-based, full volume replication in Copy on First Access (COFA)mode compared to Full Volume mirroring? a. The replica device size is smaller than the original. b. The source device is not required for restore. c. The replica is immediately accessible. d. The replica only holds pointers to the source data Which data center management activity ensures business continuity by eliminating single points of failure? a. Availability management b. Capacity management c. Performance management d. Security management 153. Which is a key benefit of implementing an ILM strategy? a. Lower total cost of ownership b. Lower recovery time c. High performance d. High security 154. Which metric can be used for monitoring performance bottlenecks? a. Number of replication task failures b. Number of I/Os to the disk c. Number of login failures d. Number of used and free ports on a switch

24 155. A storage administrator receives an alert message that a new LUN has been create Based on severity, how should this alert be classified? a. Warning b. Fatal c. Information d. Normal 156. A storage administrator receives an alert message that a disk has faile Based on severity, how should this alert be classified? a. Fatal b. Warning c. Information d. Normal 157. Which is a benefit provided by Hyper-threading in a virtualized server environment? a. Improved CPU utilization b. Logical CPU load balancing c. Improved memory utilization d. Improved virtual machine security 158. Transparent page sharing is employed in a compute system. What occurs if a write to a shared page is attempted? a. Data is overwritten on the page. b. A shared copy of the page is create c. The shared page size is extende d. A private copy of the page is create 159. What is the key function of the balloon driver in the memory ballooning technique? a. To demand memory from guest OS and later relinquish it under the control of the hypervisor b. To demand memory from the hypervisor and later relinquish it under the control of the virtual machine c. To extend memory using a swap file under the control of the hypervisor d. To extend memory using a swap file under the control of the virtual machine 160. What happens to a swap file if the associated virtual machine is powered off? a. The swap file is delete b. The content of the swap file is preserve c. The swap file is emptie d. The swap file remains open for use by the hypervisor What is required to convert a physical machine to a virtual machine when using cold mode? a. Converter switch

25 b. Converter Boot CD c. Converter server d. Converter agent 162. What is the correct sequence of steps for performing cold conversion from a physical machine to a virtual machine (VM)? a. The converter application creates a new VM on the destination physical machine. b. The converter application copies volumes from the source machine to the destination machine. c. Boot the source machine from the converter boot CD and use converter software to defineconversion parameters. d. The converter application installs the required drivers to allow the OS to boot from the VM and personalizes the VM How does a virtual machine appear to a hypervisor? a. As a discrete set of files b. As a physical machine c. As a remote server d. As a file system 164. Which type of hypervisor is recommended if the organization s primary concern is performance of virtual machines? a. Bare-metal b. Hosted c. Built-in d. Encapsulated 165. Which statement is true about a virtual machine (VM) swap file? a. It stores the state of the VM BIOS. b. It exists only when the VM is running. c. It stores configuration information of VMs. d. It is used for troubleshooting VMs Which component provides the ability to power off the virtual machine? a. Virtual Machine Console b. Virtual Machine Monitor c. Virtual Machine Controller d. Virtual Machine BIOS 167. What is a function of Virtual Machine Monitor? a. Binary translation b. File system management c. Virtual machine troubleshooting d. Process scheduling 168. Which component optimally assigns physical CPU resources to virtual machines?

26 a. Guest OS kernel b. CPU load balancer c. Hypervisor scheduler d. Virtual machine controller 169. An administrator decides to power on a virtual machine (VM) that has less memory available in a resource pool than the configured reservation parameter. What would be the expected outcome? a. The VM will fail to power on. b. The VM will crash after boot up. c. The VM will power on in safe mode. d. The VM will power on normally but perform poorly Which statement about automated storage tiering is true? a. Data movement is performed non-disruptively. b. Total size of the required storage is reduce c. It provides automated storage provisioning. d. It is performed only within a storage array Which network component performs physical-to-virtual volume mapping? a. Logical Volume Manager b. Virtualization appliance c. Virtual Machine File System d. Virtual machine 172. What are the three deployment models offered by EMC VPLEX? a. Local, metro, and geo b. Local, remote, and multi-site c. Local, remote, and geo d. Local, metro, and wide 173. Which statement about virtual machines is true? a. They are not aware of the underlying storage technology use b. They are not aware of the size of the virtual disk. c. They are aware of the underlying storage technology use d. They are aware of the type of storage media use 174. In file-level storage virtualization, what maps the logical path of a file to the physical path name? a. Virtual Machine File System b. Raw Device Mapping c. Global namespace d. File system extent 175. Which technique ensures that the used capacity of the disk drives in a thin pool is uniform after a new drive is added? a. Rebalancing

27 b. Reordering c. Leveling d. Resizing 176. Which network component is used to connect a virtual machine to a virtual switch? a. Virtual NIC b. Virtual HBA c. Physical NIC d. Uplink port 177. Which event occurs when network broadcast traffic reaches the Storm Control threshold, assuming Storm Control is enabled at the switch? a. Switch port bandwidth is extended, based on the pre-configured peak bandwidth. b. The switch port forwards broadcast traffic partially, maintaining the traffic rate below the threshold level. c. The switch port blocks broadcast traffic and drops subsequent broadcast frames over the next time interval. d. Switch port bandwidth is extended, based on the pre-configured share value What is enabled by using NIC teaming? a. Failover to another available physical NIC in the event of a physical NIC failure b. Balancing of traffic across both active and standby NIC team members c. Allocation of bandwidth to broadcast, multicast, and unicast traffic, based on priority d. Transfer of data to a LUN on a FC storage system using multiple network links 179. An administrator has configured the following traffic shaping parameters for a distributed virtual switch: Average bandwidth: 1 Kb/s Peak bandwidth: 4 Kb/s Burst size: 3 Kb What happens if a 6 Kb/s burst of data arrives at the switch port? a. Some of the frames of the burst will be queued or dropped by the switch. b. The burst will remain for 0.5 seconds without queuing or dropping frames. c. The burst will remain for 1.5 seconds without queuing or dropping frames. d. All the frames of the burst will be dropped 180. Which is a component of Cisco Nexus 1000V? a. Virtual Switch Node b. Virtual Supervisor Module c. Virtual Internet Module d. Virtual Service Node 181. Under which condition of communicating nodes does routing occur across virtual networks? a. When they are on different virtual networks, but belong to the same physical network b. When they are on the same virtual network, but belong to different physical networks

28 c. When they are on the same virtual network and physical network d. When they are located on different geographic locations, but belong to the same virtual network 182. Which is a function of a virtual switch? a. Directs network traffic to and from virtual machines b. Maintains MAC address table to perform OSI layer 3 operations c. Shares bandwidth of a physical NIC with other virtual switches d. Enables configuring load balancing policies across virtual HBA ports 183. What is a purpose of uplink ports on a virtual switch? a. To provide connectivity between a virtual switch and virtual NICs b. To enable inter-switch links (ISLs) between virtual switches in a physical server c. To enable the hypervisor kernel to access FC storage d. To provide connectivity between a virtual switch and physical NICs 184. Which statement best defines the term "virtual machine port group"? a. It is a mechanism for applying uniform network policy settings to a group of virtual machine ports. b. It is a method for transferring virtual machine traffic through a single network connection. c. It is a method for enabling communication between virtual machines, regardless of their location. d. It is a mechanism for assigning a VSAN ID to a group of virtual machine ports What is a principal benefit of deploying a distributed virtual switch? a. It maintains consistent network policies when virtual machines migrate across physical servers. b. It aggregates both physical and virtual switches distributed across virtualized data centers. c. It enables physical NICs to use MAC addresses for transmission of frames. d. It eliminates the requirement of individually configuring policies to hypervisor kernel ports Which statement is true about physical NICs on a physical server running hypervisor? a. They offload iscsi processing from the hypervisor. b. They are not assigned IP addresses. c. They are used as links between virtual machines. d. They encapsulate SCSI data into Ethernet frames What are the three key components of Virtual Desktop Infrastructure (VDI)? a. Endpoint device, VM hosting server, and Connection broker b. VM hosting server, VM management server, and Endpoint device c. VDI console, VM management server, and Connection broker d. VM management server, VDI console, and VM execution server

29 188. What is a role of Connection Broker in desktop virtualization? a. Connects end point device to the assigned virtual machine b. Establishes connection between end point devices c. Connects virtual machines to virtual machine hosting server d. Establishes connection between two virtual machine hosting servers 189. Which technology enables desktop virtualization? a. Operating system virtualization b. User state virtualization c. File system virtualization d. Memory virtualization 190. What is a benefit of Application Virtualization? a. It simplifies application deployment/retirement. b. It increases application and CPU utilization. c. It enables communication among different applications. d. It breaks dependencies between the application interface and processing logi 191. An application s data has been corrupte Associated files must be restored from the last virtual machine backup.which restoration approach would be most efficient? a. Using an agent running on the storage array b. Using an agent running on the hypervisor c. Using an agent running on the virtual machine d. Using storage array-based restoration 192. Which method is used to create a linked clone of a virtual machine (VM)? a. Using a snapshot of the source VM b. Using a template of the source VM c. Sharing the network identity with the source VM d. Making a separate copy of the source VM virtual disk 193. Which tool can be used for live migration of virtual machine disk files between two EMC CLARiiONarrays? a. VMware Storage vmotion b. VMware HA c. VMware vmotion d. VMware FT 194. Which functionality is provided by a Virtual Machine File System when virtual machines are running on clustered servers? a. Pool of running virtual machines to be shared among hypervisors b. Pool of virtual disks to be shared among running virtual machines c. Automated locking of virtual machine files d. Virtual machine namespace resolution

30 195. Which virtual machine technique provides zero downtime in case of a virtual machine failure? a. Fault tolerance b. Clone c. Snapshot d. Backup 196. Which statement about virtual machine (VM) fault tolerance is true? a. The secondary VM is in constant synchronization with the primary VM. b. VM cloning occurs between dissimilar hardware. c. It provides faster backup of VM disk files. d. It does not use the VM file system for protection A multipathing option is enabled on a hypervisor. What is required for successful failover to occur? a. Virtual machine configuration files must include multipathing settings. b. The Virtual Machine File System must support multipathing. c. All the HBA ports must share the same network path to the storage. d. HBA ports must be set up with multiple storage controllers An organization requires backup of virtual CPU configurations for each of its virtual machines. In a compute based backup approach, where should the backup agent be installed? a. On the hypervisor b. On each virtual machine c. No backup agent is required d. On the Virtual Machine File System 199. Which provides a consolidated view of existing physical and virtual infrastructure resources across virtualized data centers? a. Unified management software b. Cloud integration management software c. User access management software d. Cloud resource management software 200. Which service management process maintains information about the attributes of Cloud infrastructure resources? a. Service Catalog Management b. Capacity Management c. Service Asset and Configuration Management d. Infrastructure Management 201. Which Cloud service management process ensures that configuration best practices are followed when creating Cloud services? a. Service Asset and Configuration Management b. Compliance Management c. Capacity Management

31 d. Performance Management 202. Which tool enables consumers to deploy their applications and platform software to the Cloud? a. Migration tool b. Shredding tool c. Configuration tool d. Service Creation tool 203. Which Cloud service management process is used to perform trend analysis of resource consumption and to plan future resource requirements? a. Capacity Management b. Service Asset and Configuration Management c. Resource Planning Management d. Availability Management 204. Which statement describes the resource distribution process performed by unified management software? a. Create attributes of all Cloud services from different bundles b. Create service instances and allocate resources from bundles to service instances c. Integrate a graded compute pool with graded storage and network pool d. Categorize pools based on performance and capacity 205. Which statement describes the Resource Grading process? a. Integrating a graded compute pool with a graded network pool and a graded storage pool b. Grading attributes of all Cloud services to be created from different bundles c. Categorizing resource pools based on their capabilities d. Allocating graded resources from bundles to service instances 206. Which operation is performed by user access management software? a. Monitor allocation and usage of resources associated with Cloud service instances b. Manage bundling of application and platform software c. Manage multiple grade levels for each type of user resource pool d. Enable users to create virtual infrastructure from physical infrastructure 207. Which product provides a solution for Cloud user access management? a. VMware vcloud Director b. VMware Service Manager c. EMC Ionix Unified Infrastructure Manager d. EMC Ionix Cloud Manager 208. Which security mechanism(s) defines the boundary between security critical and noncritical parts of an information system? a. Trusted Computing Base b. Encryption

32 c. Authentication, Authorization, and Auditing d. Defense-in-Depth 209. How does the VMware vshield Endpoint product streamline and accelerate anti-virus and anti- malware deployment? a. All anti-virus and anti-malware mitigation is performed in a single place. b. Engines and signature files can be deployed to a common share available to all clients. c. Running detection software against client disk partitions finds infections earlier. d. The engines and signature files are only updated within the special security virtual machine Which security measures should be adopted to prevent virtual machine (VM) theft? a. VM copy and move restrictions b. VM reservation c. Mutual client isolation d. Sandboxing of the guest OS 211. Which product provides a solution for one-time password based authentication? a. RSA SecurID b. RSA Archer egrc c. RSA Envision d. RSA BSAFE 212. Which product provides a solution for multi-factor authentication? a. RSA Archer egrc b. RSA envision c. RSA SecurID d. RSA BSAFE 213. Which security aspect ensures that unauthorized changes to data are prevented? a. Integrity b. Confidentiality c. Authenticity d. Availability 214. Which measure should an administrator adopt to mitigate multitenancy-based security concerns in a Cloud environment? a. Mutual client isolation b. Virtual machine reservation c. Sandboxing d. Virtual firewall 215. Which measure should be adopted to mitigate the challenge of "velocity of attack" in the Cloud? a. Sandboxing b. Virtual firewall

33 c. Client based security protection d. Defense-in-depth 216. What is a major reason for auditing? a. To ensure that only authorized individuals can access the system b. To evaluate the effectiveness of security enforcement controls and processes c. To measure and charge for computer usage d. To ensure that individuals are provided with privileges appropriate for their role 217. Which is a recommended method for virtual machine (VM) hardening? a. Use a directory service for authentication b. Use VM only for proprietary applications c. Use a VM snapshot to provision a new VM d. Disable VM access to the management console 218. A Cloud service provider decides to close its business due to legal litigation. Which Governance, Risk and Compliance (GRC) document would safeguard the interests of its clients? a. Termination Agreement b. Service Implementation Guide c. Business Continuity Agreement d. Service Level Agreement 219. Which Governance, Risk and Compliance (GRC) aspect may limit adoption of public Clouds for applications handling sensitive data? a. SAN Security Regulations b. Information Flow Regulations c. Inadequate anti-virus protection d. Lack of robust data encryption standards 220. Which security process defines the scope of the access rights for a resource? a. Authorization b. Authentication c. Encryption d. Auditing 221. From which level should a Distributed Denial of Service attack be prevented? a. Network b. Access control c. Perimeter d. Compute 222. Consider the following actions: Exhausting resources such as CPU cycles or network bandwidth Exploiting weaknesses in communication protocols Hijacking of user identities Intercepting communications traffic

34 Which of these actions are involved in a Denial of Service (DoS) attack? a. 2 and 3 b. 2 and 4 c. 1 and 3 d. 1 and What statement related to a Virtual Demilitarized Zone (DMZ) is true? a. A virtual DMZ can support multiple trust zones. b. DMZ virtual machines should be in separate sub-networks. c. Virtual DMZ subnets do not use a firewall to protect traffi d. Trusted nodes in the DMZ are not accessible from outside networks Which security mechanism removes the need for services to provide their own identity system and allows users to consolidate their digital identities? a. OpenID b. Federated Identity Management c. One-time passwords d. Shared LDAP directory 225. Review the following considerations: A contingency plan for handling data in the Cloud A process for migrating the data back into the organization or to another Cloud Whether or not data can be moved over the network in a reasonable amount of time Cost of transferring ownership of the infrastructure back to the client Which considerations should apply before terminating a Cloud service agreement? a. 2 and 4 only b. 1, 2, and 3 c. 2, 3, and 4 d. 1 and What is an advantage of adopting Cloud Open Standards? a. It enables mission critical applications to be run on the Cloud b. It prevents vendor lock-in issues c. It increases security compliance d. It improves performance 227. What action should be part of a security and compliance assessment prior to migrating business operations to the Cloud? a. Selecting the geographic location of data storage b. Reviewing disaster recovery options c. Understanding the vendor lock-in period d. Negotiating the service charge rate 228. During which phase of the Cloud migration process should business application compatibility withcloud infrastructure be evaluated?

35 a. Technical Assessment b. Security and Compliance Assessment c. Proof of Concept d. Optimization 229. During which phase of the Cloud migration process should the usage pattern of an application be determined? a. Proof of Concept b. Assessment c. Optimization d. Migration 230. What are the three key Quality of Service (QoS) parameters that need to be assessed by an organization before moving operations to the Cloud? a. Performance, Availability, and Security b. RPO, RTO, and Security c. Service Charge Rate, RTO, and Performance d. Performance, Availability, and Service Duration 231. Which trade-off needs to be evaluated to determine how Cloud computing fits into an organization s overall business strategy? a. Risk versus convenience b. Security versus penalty c. Risk versus compliance d. Security versus compliance 232. Which Cloud deployment model(s) is considered suitable for most start-up organizations? a. Private Cloud only b. Hybrid Cloud only c. Public Cloud d. Both Private and Hybrid Cloud 233. Which Cloud deployment model(s) is considered most suitable for Tier 1 applications for the small to medium sized business (SMB) segment? a. Private Cloud b. Public Cloud only c. Hybrid Cloud only d. Both Public and Hybrid Cloud 234. Which type(s) of application involves higher risk when moving to the Cloud? a. Proprietary and mission critical b. Backup and testing c. Proprietary but not mission critical d. Non-proprietary and non-mission critical 235. Which document defines the quality and reliability of Cloud services?

36 a. Regulatory Compliance b. Document Service Charge Rate Specification c. Service Level Agreement d. Service Contract Agreement 236. An organization is planning to migrate its operations to the ClouThere are several Cloud vendors that can provide the required services.which is the primary factor that the organization should consider when selecting the vendor? a. Ease of adding or removing services from the vendor b. Identity of the vendor's existing clients c. Range of value added services the vendor provides d. The current market share of the vendor 237. Which step of the "Journey to the Cloud" allows pooling of resources? a. Virtualizing the IT environment b. Automating resource management processes c. Delivering IT-as-a-Service d. Policy-based provisioning 238. Which is a benefit of a virtualized environment? a. Transparent Provider-to-Provider migrations b. Optimized utilization of IT resources c. Simplification of regulatory compliance d. Reduced OPEX (Operational Expenditure) 239. An organization must meet government requirements prohibiting export of data outside its territory. Which Cloud deployment model would be most appropriate for this organization? a. On-premise Private Cloud b. External Private Cloud c. Public Cloud d. Hybrid Cloud 240. Which technology provides user-level authentication and file locking functionality? a. NAS b. FCIP c. iscsi d. FCoE 241. Which storage platform supports file, block, and object level access? a. Unified b. Converged c. Virtual d. SOAP

37 242. Which provide file-level access to storage on a NAS device? a. CIFS and NFS b. CIFS and FCIP c. iscsi and FCoE d. SATA and SCSI 243. Which mechanism enables a LUN with higher capacity than is physically allocated to be presented to a compute system? a. Virtual provisioning b. Automated storage tiering c. Raw Device Mapping d. Global namespace mapping" 244. What makes it possible to store virtual machine files on a NAS device? a. Network File System b. Virtual machine monitor c. Guest operating system d. Virtual Machine File System" 245. Which type of expense is most likely to increase as an organization increases the consumption of cloud resources from a service provider? a. Operational expenditures b. Management costs c. Capital expenditures d. Infrastructure costs 246. What is a benefit of cloud computing? a. Simplification of regulatory compliance b. Reduced operational expenditures (OPEX) c. Transparent Provider-to-Provider migrations d. Fast provisioning of resources through a self-service portal 247. Which data center management activity involves eliminating single points of failure to ensure business continuity? a. Availability management b. Capacity management

38 c. Performance management d. Security management 248. Why should data center elements be monitored? a. To ensure that no data is lost if there is a disaster b. To eliminate threats to storage infrastructure security c. To ensure that the IT support staff performs efficiently" d. To determine whether components are functioning properly 249. What is a benefit of automated site failover capability in a data center environment? a. Reduced Recovery Time Objective b. Reduced Recovery Point Objective c. Elimination of site failures d. Elimination of Virtual Machine File System failures 250. Which report should an administrator use to know both historic and current utilization of storage in a data center? a. Chargeback report b. Performance report c. Routine report d. Capacity planning report

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

Module: Business Continuity

Module: Business Continuity Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions

More information

Storage Virtualization

Storage Virtualization Section 2 : Storage Networking Technologies and Virtualization Storage Virtualization Chapter 10 EMC Proven Professional The #1 Certification Program in the information storage and management industry

More information

What s New with VMware Virtual Infrastructure

What s New with VMware Virtual Infrastructure What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management

More information

Building the Virtual Information Infrastructure

Building the Virtual Information Infrastructure Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage

More information

Journey to the Private Cloud. Key Enabling Technologies

Journey to the Private Cloud. Key Enabling Technologies Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.1 Advanced Administration Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.

More information

Private cloud computing advances

Private cloud computing advances Building robust private cloud services infrastructures By Brian Gautreau and Gong Wang Private clouds optimize utilization and management of IT resources to heighten availability. Microsoft Private Cloud

More information

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

N_Port ID Virtualization

N_Port ID Virtualization A Detailed Review Abstract This white paper provides a consolidated study on the (NPIV) feature and usage in different platforms and on NPIV integration with the EMC PowerPath on AIX platform. February

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Virtual SAN Design and Deployment Guide

Virtual SAN Design and Deployment Guide Virtual SAN Design and Deployment Guide TECHNICAL MARKETING DOCUMENTATION VERSION 1.3 - November 2014 Copyright 2014 DataCore Software All Rights Reserved Table of Contents INTRODUCTION... 3 1.1 DataCore

More information

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

VirtualclientTechnology 2011 July

VirtualclientTechnology 2011 July WHAT S NEW IN VSPHERE VirtualclientTechnology 2011 July Agenda vsphere Platform Recap vsphere 5 Overview Infrastructure Services Compute, Storage, Network Applications Services Availability, Security,

More information

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Tech Note Configuration Best Practices for Nutanix Storage with VMware vsphere Nutanix Virtual Computing Platform is engineered from the ground up to provide enterprise-grade availability for critical

More information

Microsoft SMB File Sharing Best Practices Guide

Microsoft SMB File Sharing Best Practices Guide Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents

More information

Virtualization. Nelson L. S. da Fonseca IEEE ComSoc Summer Scool Trento, July 9 th, 2015

Virtualization. Nelson L. S. da Fonseca IEEE ComSoc Summer Scool Trento, July 9 th, 2015 Virtualization Nelson L. S. da Fonseca IEEE ComSoc Summer Scool Trento, July 9 th, 2015 Acknowledgement Some slides in this set of slides were kindly provided by: Luiz Fernando Bittencourt, University

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

EMC: The Virtual Data Center

EMC: The Virtual Data Center EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

VMware vsphere Design. 2nd Edition

VMware vsphere Design. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330623/ VMware vsphere Design. 2nd Edition Description: Achieve the performance, scalability, and ROI your business needs What

More information

HBA Virtualization Technologies for Windows OS Environments

HBA Virtualization Technologies for Windows OS Environments HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology White Paper IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology Abstract EMC RecoverPoint provides full support for data replication and disaster recovery for VMware ESX Server

More information

A virtual SAN for distributed multi-site environments

A virtual SAN for distributed multi-site environments Data sheet A virtual SAN for distributed multi-site environments What is StorMagic SvSAN? StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical

More information

VMware vsphere 4.1 with ESXi and vcenter

VMware vsphere 4.1 with ESXi and vcenter VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Vmware VSphere 6.0 Private Cloud Administration

Vmware VSphere 6.0 Private Cloud Administration To register or for more information call our office (208) 898-9036 or email [email protected] Vmware VSphere 6.0 Private Cloud Administration Class Duration 5 Days Introduction This fast paced,

More information

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4

More information

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead

More information

EMC Business Continuity for Microsoft SQL Server 2008

EMC Business Continuity for Microsoft SQL Server 2008 EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server How to deploy Converged Networking with VMware ESX Server 3.5 Using Emulex FCoE Technology Table of Contents Introduction...

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

Optimized Storage Solution for Enterprise Scale Hyper-V Deployments

Optimized Storage Solution for Enterprise Scale Hyper-V Deployments Optimized Storage Solution for Enterprise Scale Hyper-V Deployments End-to-End Storage Solution Enabled by Sanbolic Melio FS and LaScala Software and EMC SAN Solutions Proof of Concept Published: March

More information

Windows Server 2008 R2 Hyper-V Server and Windows Server 8 Beta Hyper-V

Windows Server 2008 R2 Hyper-V Server and Windows Server 8 Beta Hyper-V Features Comparison: Hyper-V Server and Hyper-V February 2012 The information contained in this document relates to a pre-release product which may be substantially modified before it is commercially released.

More information

Unleash the Performance of vsphere 5.1 with 16Gb Fibre Channel

Unleash the Performance of vsphere 5.1 with 16Gb Fibre Channel W h i t e p a p e r Unleash the Performance of vsphere 5.1 with 16Gb Fibre Channel Introduction The July 2011 launch of the VMware vsphere 5.0 which included the ESXi 5.0 hypervisor along with vcloud Director

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration Course Details Level: 1 Course: V6PCRE Duration: 5 Days Language: English Delivery Methods Instructor Led Training Instructor Led Online Training Participants: Virtualization and Cloud Administrators,

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 White Paper HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 Abstract This white paper demonstrates key functionality demonstrated in a lab environment

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery

More information

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales [email protected] The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)

More information

Dell High Availability Solutions Guide for Microsoft Hyper-V

Dell High Availability Solutions Guide for Microsoft Hyper-V Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Symantec Storage Foundation High Availability for Windows

Symantec Storage Foundation High Availability for Windows Symantec Storage Foundation High Availability for Windows Storage management, high availability and disaster recovery for physical and virtual Windows applications Data Sheet: High Availability Overview

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS

TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS TOP FIVE REASONS WHY CUSTOMERS USE EMC AND VMWARE TO VIRTUALIZE ORACLE ENVIRONMENTS Leverage EMC and VMware To Improve The Return On Your Oracle Investment ESSENTIALS Better Performance At Lower Cost Run

More information

vsphere 6.0 Advantages Over Hyper-V

vsphere 6.0 Advantages Over Hyper-V v3c Advantages Over Hyper-V The most trusted and complete virtualization platform 2015 Q1 2015 VMware Inc. All rights reserved. The Most Trusted Virtualization Platform Hypervisor Architecture Broad Support

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Best Practices for Managing Storage in the Most Challenging Environments

Best Practices for Managing Storage in the Most Challenging Environments Best Practices for Managing Storage in the Most Challenging Environments Sanjay Srivastava Senior Product Manager, Symantec The Typical Virtualization Adoption Path Today, 20-25% of server workloads are

More information

Virtual server management: Top tips on managing storage in virtual server environments

Virtual server management: Top tips on managing storage in virtual server environments Tutorial Virtual server management: Top tips on managing storage in virtual server environments Sponsored By: Top five tips for managing storage in a virtual server environment By Eric Siebert, Contributor

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Part 1 - What s New in Hyper-V 2012 R2. [email protected] Datacenter Specialist

Part 1 - What s New in Hyper-V 2012 R2. Clive.Watson@Microsoft.com Datacenter Specialist Part 1 - What s New in Hyper-V 2012 R2 [email protected] Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

DR-to-the- Cloud Best Practices

DR-to-the- Cloud Best Practices DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS

More information

VMware vsphere: Install, Configure, Manage [V5.0]

VMware vsphere: Install, Configure, Manage [V5.0] VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

E20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min

E20-005. http://www.gratisexam.com/ Number: E20-005 Passing Score: 800 Time Limit: 120 min E20-005 Number: E20-005 Passing Score: 800 Time Limit: 120 min http://www.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 Which statement defines retention period? A. Amount of time available for restoring

More information

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist EMC E20-018 Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist http://www.exams.solutions/e20-018-exam-guide.html Product: Demo Question: 1 What is the first phase of the Virtual

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

IOmark- VDI. Nimbus Data Gemini Test Report: VDI- 130906- a Test Report Date: 6, September 2013. www.iomark.org

IOmark- VDI. Nimbus Data Gemini Test Report: VDI- 130906- a Test Report Date: 6, September 2013. www.iomark.org IOmark- VDI Nimbus Data Gemini Test Report: VDI- 130906- a Test Copyright 2010-2013 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VDI, VDI- IOmark, and IOmark are trademarks of Evaluator

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Storage Networking Management & Administration Workshop

Storage Networking Management & Administration Workshop Storage Networking Management & Administration Workshop Duration: 2 Days Type: Lecture Course Summary & Description Achieving SNIA Certification for storage networking management and administration knowledge

More information

vcloud Suite Architecture Overview and Use Cases

vcloud Suite Architecture Overview and Use Cases vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

1 Data Center Infrastructure Remote Monitoring

1 Data Center Infrastructure Remote Monitoring Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to

More information

Bosch Video Management System High Availability with Hyper-V

Bosch Video Management System High Availability with Hyper-V Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements

More information

What s new in Hyper-V 2012 R2

What s new in Hyper-V 2012 R2 What s new in Hyper-V 2012 R2 Carsten Rachfahl MVP Virtual Machine Rachfahl IT-Solutions GmbH & Co KG www.hyper-v-server.de Thomas Maurer Cloud Architect & MVP itnetx gmbh www.thomasmaurer.ch Before Windows

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

Storage Challenges Created by a Virtualized Server Infrastructure. Agenda. State of server virtualization

Storage Challenges Created by a Virtualized Server Infrastructure. Agenda. State of server virtualization Storage Challenges Created by a Virtualized Server Infrastructure Steve Norall Senior Analyst Taneja Group [email protected] Agenda State of server virtualization Four storage challenges created by

More information

EMC BACKUP-AS-A-SERVICE

EMC BACKUP-AS-A-SERVICE Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase

More information

The next step in Software-Defined Storage with Virtual SAN

The next step in Software-Defined Storage with Virtual SAN The next step in Software-Defined Storage with Virtual SAN VMware vforum, 2014 Lee Dilworth, principal SE @leedilworth 2014 VMware Inc. All rights reserved. The Software-Defined Data Center Expand virtual

More information

Luxembourg June 3 2014

Luxembourg June 3 2014 Luxembourg June 3 2014 Said BOUKHIZOU Technical Manager m +33 680 647 866 [email protected] SOFTWARE-DEFINED STORAGE IN ACTION What s new in SANsymphony-V 10 2 Storage Market in Midst of Disruption

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Storage Solutions to Maximize Success in VDI Environments

Storage Solutions to Maximize Success in VDI Environments Storage Solutions to Maximize Success in VDI Environments Contents Introduction: Why VDI?. 1 VDI Challenges. 2 Storage Solutions Optimized for VDI. 3 Conclusion. 6 Brought to you compliments of: Introduction:

More information