How To Virtualize Your Data Center

Similar documents
EMC E Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

Building the Virtual Information Infrastructure

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Module: Business Continuity

Private cloud computing advances

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

High Availability with Windows Server 2012 Release Candidate

IBM EXAM QUESTIONS & ANSWERS

Brocade One Data Center Cloud-Optimized Networks

SAN Conceptual and Design Basics

CXS Citrix XenServer 6.0 Administration

Server and Storage Virtualization with IP Storage. David Dale, NetApp

IMPROVING VMWARE DISASTER RECOVERY WITH EMC RECOVERPOINT Applied Technology

Storage Virtualization

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

VMware vsphere Design. 2nd Edition

全 新 企 業 網 路 儲 存 應 用 THE STORAGE NETWORK MATTERS FOR EMC IP STORAGE PLATFORMS

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

HRG Assessment: Stratus everrun Enterprise

Data Center Networking Designing Today s Data Center

Cloud Optimize Your IT

Symantec Storage Foundation High Availability for Windows

Citrix XenServer 6 Administration

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION

VMware vsphere 5.0 Boot Camp

What s New with VMware Virtual Infrastructure

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server

Cloud Infrastructure and Services (EMCCIS)

Veritas Storage Foundation High Availability for Windows by Symantec

DEDICATED NETWORKS FOR IP STORAGE

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Frequently Asked Questions: EMC ViPR Software- Defined Storage Software-Defined Storage

VMware vsphere 5.1 Advanced Administration

Lecture 02b Cloud Computing II

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Best Practices for Managing Storage in the Most Challenging Environments

Nutanix Tech Note. Configuration Best Practices for Nutanix Storage with VMware vsphere

Technology Insight Series

Data Center Fabric Convergence for Cloud Computing (the Debate of Ethernet vs. Fibre Channel is Over)

June Blade.org 2009 ALL RIGHTS RESERVED

Virtualization. Nelson L. S. da Fonseca IEEE ComSoc Summer Scool Trento, July 9 th, 2015

Optimized Storage Solution for Enterprise Scale Hyper-V Deployments

VirtualclientTechnology 2011 July

NET ACCESS VOICE PRIVATE CLOUD

Microsoft SMB File Sharing Best Practices Guide

Optimization, Business Continuity & Disaster Recovery in Virtual Environments. Darius Spaičys, Partner Business manager Baltic s

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions

EMC BACKUP-AS-A-SERVICE

CA Cloud Overview Benefits of the Hyper-V Cloud

W H I T E P A P E R. VMware Infrastructure Architecture Overview

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

CloudCore. cloudcore infrastructure 4 100% SOLID STATE STORAGE 4 TRUE SCALE-OUT ARCHITECTURE 5 RAID-LESS DATA PROTECTION 5

Server and Storage Virtualization: A Complete Solution A SANRAD White Paper

Maxta Storage Platform Enterprise Storage Re-defined

The Benefits of Virtualization for Your DR Plan

Windows Server 2008 R2 Hyper-V Server and Windows Server 8 Beta Hyper-V

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Building Storage Service in a Private Cloud

OCR LEVEL 3 CAMBRIDGE TECHNICAL

What s new in Hyper-V 2012 R2

EMC Data Protection Advisor 6.0

Storage Networking Management & Administration Workshop

Cloud Storage Specialist Certification Self-Study Kit Bundle

IP SAN Best Practices

Preparation Guide. How to prepare your environment for an OnApp Cloud v3.0 (beta) deployment.

iscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters

Nimble Storage for VMware View VDI

DVS Enterprise. Reference Architecture. VMware Horizon View Reference

Managing Cloud Infrastructure

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

BEST PRACTICES GUIDE: Nimble Storage Best Practices for Scale-Out

MICROSOFT CLOUD REFERENCE ARCHITECTURE: FOUNDATION

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

FIBRE CHANNEL OVER ETHERNET

Cisco Secure Network Container: Multi-Tenant Cloud Computing

Using VMWare VAAI for storage integration with Infortrend EonStor DS G7i

Taking the Disaster out of Disaster Recovery

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments

Virtualization, SDN and NFV

EMC Business Continuity for Microsoft SQL Server 2008

VXLAN: Scaling Data Center Capacity. White Paper

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

WINDOWS SERVER MONITORING

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Downtime, whether planned or unplanned,

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Part 1 - What s New in Hyper-V 2012 R2. Clive.Watson@Microsoft.com Datacenter Specialist

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

SQL Server Storage Best Practice Discussion Dell EqualLogic

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

EMC Celerra Unified Storage Platforms

Transcription:

EMC.Test-inside.E20-018.v2014-01-02.by.Watson.289q Number: E20-018 Passing Score: 800 Time Limit: 120 min File Version: 12.5 http://www.gratisexam.com/ Exam Code: E20-018 Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

Exam A QUESTION 1 What is the first phase of the Virtual Data Center Design Process? A. Evaluate technology options B. Create plan C. Perform initial analysis D. Gather data /Reference: QUESTION 2 What is the key business goal when consolidating by business application? A. Virtualize the compute environment for efficiency B. Identify security gaps and increase security measures C. Reduce footprint by decreasing energy and space requirements D. Implement converged network technology for performance /Reference: QUESTION 3 A large company with multiple heterogeneous arrays would like to take advantage of the performance simplified management benefits of storage virtualization. They have a data center transformation pain that includes producing power and cooling at a high priority. Which storage virtualization method would meet their requirements? A. Network-based storage tiering B. Vertical storage tiering C. Server-based storage tiering D. Horizontal storage tiering /Reference: QUESTION 4 When using logging to maintain server security, which is the key element for intrusion detection and should be contained the server logs? A. Vulnerability scan that identifies susceptible services that are active on the server.

B. Results of penetration testing through uncover problem probable weaknesses. C. An entry for each application transaction with details of the organization. D. Alerts to suspicious activities that require further investigation. /Reference: QUESTION 5 What is a key VDC and cloud planning consideration for IT governance? A. Change management B. Regulations C. Separation of duties D. Creating trust zones /Reference: QUESTION 6 A midsize company has deployed centralized storage and is currently planning to virtualize their servers. They have considered their application into Tiers, with Tier 1 application requiring the same service and performance levels of the current servers. They have purchased new, high capacity servers for the virtualized environment and are planning to consolidate several physical servers into a single hypervisor. They are know determining the bandwidth requirements of the application in order to purchase the current number of FCME CNAs for each server. The results of their analysis for Tier 1 application are as follows: Average SAN Bandwidth: 3 Gb/s Average LAN Bandwidth: 2 Gb/s What is the minimum number of CNAs they would need to install an each server to meet the bandwidth required for the Tier 1 application while providing CAN redundancy and high availability? http://www.gratisexam.com/ A. 1 B. 2 C. 3 D. 4

/Reference: QUESTION 7 What are three attributes of a cloud services design? A. Web-based APIs, shared resources, minimal capital expenditures B. Static service, fixed priced access, improved economics C. Accessed via a web portal, self-service, throttled access D. Dedicated resources, usage-based pricing, web-based APIs /Reference: QUESTION 8 What would you identify as a business application in applying IT as a Service to IT processions? A. Defined workflow request processes B. Funded as a cost center C. Virtual data center best practices D. SLA-driven management /Reference: QUESTION 9 A development organization uses a PaaS service from a public cloud to develop and test an application. Once sending and verification are complete, the development team discovers that the cloud services uses proprietary software in the PaaS clustering mailing and deployment of the application within their production data center imposition without significant application records. What this type of lock-in called? A. Geographical lock-in B. Technology lock-in C. Cloud lock-in D. Vendor lock-in /Reference:

QUESTION 10 When applying compliance principles to your company's VDC and cloud architectures, how should you approach your information life cycle management strategy? A. Data of reset B. Archival and offsite storage C. Production and backup D. Inception to completion /Reference: QUESTION 11 A customer has implemented a Vblock solution in their primary data centre. They are using a single management tool set to configure and provisions the computer, network, and storage resources within the Vblock. Which management tool are they using? A. EMC ControlCenter B. EMC Unisphere C. EMC United Infrastructure Manager D. VMware vcenter /Reference: QUESTION 12 Which two capacity management objectives often conflict with each other? A. Manageability and redundancy B. Availability and security C. Compliance and efficiency D. Efficiency and availability /Reference: QUESTION 13 A customer has asked you to develop a framework for assuming that the cloud Part of this will resume an assessment development.

Where should you lock first for assessment criteria and technologies? A. International standards B. Internal IT development C. Company metadata D. Industry best practices /Reference: QUESTION 14 What is its approach to addressing performance issues during the Virtualize phrase of the cloud maturity mode? A. Selective B. Investigative C. Proactive D. Reactive /Reference: QUESTION 15 Your client is considering a virtualized data center (VDC) as an investment in process improvement. A VDC can improve the delivery of which business process? A. Auditing B. Business continuity / disaster recovery C. Compliance D. Capacity planning / management /Reference: QUESTION 16 A company has distributed infrastructure model where each remote office has its own site specific and application servers. These remote offices are all connected to a central data through lines that have a limited amount of bandwidth. The hardware is aging, and the lines will be ending soon. The company's overall objective is to reduce the number of servers at each location to one physical server. What is the business driver to Virtualize these systems?

A. Broad network access B. Consolidation C. Improved productivity D. Operational flexibility /Reference: QUESTION 17 The CIO has asked you to review the status of your company's cloud deployment and validates that the implementation has entered the IT-as-a-Service phase. Which capability must be in place to transmitting to this phase? A. Self-service B. Policy-driven automation C. Chargeback D. Zero-touch Infrastructure /Reference: QUESTION 18 What is a key benefit to consumers of cloud services? A. Start with minimal capital expenditure B. Dedicated SAN access to applications C. Requires extensive IT skills D. No operational expenditure /Reference: QUESTION 19 A large enterprise has virtualized heavily and is in the process of implementing configuration management in the virtual infrastructure. One thing that causes a large number of incidents is the movement of virtual guest between physical hosts while maintaining network configuration and security configuration consistency. Which feature should they implement to ensure consistency of network configuration and security while maintaining virtual machine mobility? A. Virtual switches B. VLAN tagging

C. Distributed virtual switches D. Port grouping /Reference: QUESTION 20 What caching technique does VPLEX use to ensure that the new write operation take advantage of underlying disk array functionality? A. Write-back B. Write-through C. Flush-on-idle D. Cache mirroring /Reference: QUESTION 21 Which consolidation approach involves consolidating by cross departmental needs or requirements? A. Cloud B. Services C. VDC D. Application /Reference: QUESTION 22 What is the definition of "cloud services"? A. Shared applications, storage, and solutions accessed by a multi-tenant user base. B. Access consumed in real time via internet services. C. Business applications and real storage provided by and access through public internet services. D. Consumer and business products, services, and solution delivered and consumed in real time over the internet. /Reference:

QUESTION 23 In the CAP Theorem, what is Partitioning? A. Ability to maintain ACID properties or transactions B. Ability to respond to all requests successfully C. Ability to maintain BASE properties or transactions D. Ability to handle lost network connectivity gracefully /Reference: QUESTION 24 A VDC environment is to be deployed with several virtual machines (VMs). The data stores for the VMs will be hosted on a storage array-based local replication that has been proposed as the BC/DR solution. Restore granularity is at the individual VM level. What is the optimal data layout to meet this requirement? A. Individual LUNs for each virtual disk B. All virtual disks on the boot LUN of the physical disks C. Individual LUNS for each VMS virtual disk D. Single large LUN for all VM virtual disks /Reference: QUESTION 25 A large banking customer has decided to move from a physical to virtual environment. They have been the long processes of gathering data from a storage perspective, what is something they could implement in the near term to help them transform to a virtual environment? A. Private cloud federation B. Cross-platform power and data center management C. Thin provisioning and data deduplication D. Provide client-aware services /Reference: QUESTION 26 Which WAN connectivity solution provides the same security options utilized in a local area network (VLAN)?

A. IP B. MPLS C. WDM D. Dark Fiber /Reference: QUESTION 27 An organization is establishing a second data center and needs to have high speed, low latency LAN and SAN connectivity between the two sites. They are only able to obtain two standards of dark fiber due to the cost. Which technology will allow them to fulfill their requirements? A. FCoE B. MPLS C. DWDM D. FCIP /Reference: QUESTION 28 Which design consideration helps reduce risk when data is co-mingled across different business units in a VDC or between companies or between clouds? A. Having a formal disk assessment process B. Regulations that specify data that can be co-mingled C. Creating trust zones D. Creating unique login IDs /Reference: QUESTION 29 Why proper sizing of an in-bound network is based on storage virtualization configuration import? A. To prevent single points of failure B. To prevent impact to IP network performance C. To prevent impact to SAN performance D. To ensure adequate storage allocation

/Reference: QUESTION 30 Which component of a VDI implementation manages the assignments of server-hosted desktops to clients? A. Security server B. Connector C. Resource broker D. Transfer server /Reference: QUESTION 31 Which is an example of horizontal scaling a virtual application? A. Database virtual server with a standby replica on the same physical server B. Web server farm with four virtual servers and one physical server C. Database virtual server with a standby replica on another physical server D. Web server farm with four virtual servers deployed across four physical servers /Reference: QUESTION 32 A customer has two data centers located within 3 km of each other. They use EMC arrays at one of the data center. They would like to have a consistent view of one or more LUNs. Which product would you suggest to them? A. Atoms B. Vblock C. VPLEX D. VNX /Reference: QUESTION 33 Why is the need for host-based agents a disadvantage in a block storage virtualization environment with on-of

band virtualization appliance? A. Capacity limitations B. Management complexity C. Performance concerns D. Functional limitations /Reference: QUESTION 34 Which is an example of a hypervisor that does binary translation of sensitive non-virtualized requests but allows for direct execution of user requests? A. VMware B. Citrix XenServer C. Microsoft Hyper V D. VMware workstation /Reference: QUESTION 35 A developer has asked you to recommend a Cloud Service Model to run a new home grown application currently in deployment. The application is based upon a programming language that your IT staff has no experience in supporting. Based upon these requirements, which cloud model would you recommend? A. WaaS B. SaaS C. PaaS D. IaaS /Reference: QUESTION 36 A customer has a mission-critical application running on a virtual server that must be continuously available. Which service should they configure to provide automatic failover, no-disruptive failure recovery, and a secondary running copy of the virtual server? A. High Availability

B. Resource Pooling C. Fault Tolerance D. Live Migration /Reference: QUESTION 37 An administrator is configuring resources for a self service portal. They have just completed their storage infrastructures categories based on performance. Which process did the administrator just complete? A. Discovery B. Pooling C. Distribution D. GRADING /Reference: QUESTION 38 A hypervisor running virtual servers fails with an unrecoverable error and at virtual server are restarted on another hypervisor. When the application restarts, some data has been lost. Which type of consistency does this situation represent? A. Crash consistency B. Full consistency C. Eventual consistency D. Application consistency /Reference: QUESTION 39 To ensure cost and resource efficiency, your customer is concerned with the configuration management of their IT infrastructure. Within a service management system, what would contain the most current information about each component of an IT infrastructure? A. CMDB B. Configuration CMDB

C. Fed elated CMDB D. Asset management system /Reference: QUESTION 40 What error accounts for 99% of the reasons why recovery and availability fail? A. Failures in automation scripts B. Configuration drift C. Failure to test for corrupted Backups D. Environmental issues /Reference: QUESTION 41 A customer wants to implement a service to provide their virtual server infrastructure the ability to dynamically migrate virtual machines from on physical host to another physical host. Which server should they implement? A. Distributed Switching B. Resource Pooling C. High Availability D. Live Migrate /Reference: QUESTION 42 A large enterprise has introduced virtualization into a data center. During live Mitigation, several virtual hosts have recognized lost cluster heartbeats and network performance degradation. Which solution should be implemented to immediate the solution? A. Implement load balance on the HBA to improve overall host performance B. Implement isolated VLAs to separate management control traffic from production traffic C. Implement load balancing on the NICs to improve overall host performance D. Implement a distributed virtual switch to separate the data plane from the control plane on the NIC

/Reference: QUESTION 43 What is a key business driver for automation in the virtualized data center? A. Service-level agreements B. Service metric reporting C. Change management policy D. Technology integration /Reference: QUESTION 44 Your customer is considering upgrade their network to a converged network that would handle their network traffic, storage traffic, and voice traffic. What are the two benefits when considering a converged network? A. Infrastructure cost reduction and security increase B. Performance increase and management reduction C. Security and performance increase D. Infrastructure and operational cost reduction /Reference: QUESTION 45 A customer has to improve a test/dev environment infrastructure as quickly as possible, not within weeks or months. They also have limited resources available. Considering their timeline, what type of infrastructure would they most likely have to choose? A. Cloud B. International virtualized environment with shared resources C. Internal VDC with automation D. VDG /Reference:

QUESTION 46 Which feature allows for the maximum utilization of the I/O and bandwidth available in the network infrastructure? A. VLAN tagging B. VLAN grouping C. Port grouping D. Oversubscription /Reference: QUESTION 47 What are the two common factors that drive a company to institute a company-wide compliance program? A. Execute mandate, private breaches B. Regulations, security breaches C. Security breaches, privacy breaches D. Migrating data to Virtualize data center, security breaches /Reference: QUESTION 48 A small law firm that does not currently have any virtualization technologies implemented has currently merged with another firm of approximately the same size. They are planning to consolidate into a single location. They have decided to virtualize their servers. They would like to consolidate storage but they are concerned about meeting performance of the different applications on a single storage array. Which storage array feature should be considered to meet their performance requirements? A. Virtual LUNs B. Virtual Pooling C. Virtual Provisioning D. Vertical tiering /Reference: QUESTION 49 Which storage requirement would be met with the implementation of traditional (thick) provisioning?

A. High availability B. Energy end capital savings C. Space efficiency D. Microseconds of performance /Reference: QUESTION 50 Which contractual agreement represents the legal contract with a service provider? A. Service level agreement B. Non-binding user contract C. Terms of service D. End-user license agreement /Reference: QUESTION 51 An administrator is managing a virtualized environment that has limited available physical NICs on the hyper host. The hypervisor hosts physical switch ports are configured for VLAN tagging. A new application is being deployed that will need to be on a new subnet. What should the administrator implement to provide this new subnet for the application servers in the least amount of time? A. Add ports to an existing port group B. Add virtual switch to the hypervisor host C. Add a new port group with an individual VLAN D. Add network cards to the hypervisor host /Reference: QUESTION 52 A company is planning the backup strategy for their virtual machine environment. They are considering migrating to an image based backup model. Where image-based backup would be processed in the environment? A. On the virtual server B. On a separate host

C. On the SAN D. On the storage array /Reference: QUESTION 53 An organization with 25,000 employees has moved to a new building that contains a fully virtualized data center with a virtual desktop infrastructure (VDI) instituted for all employees. However, each morning between 9:00 am to 9:30, the help desk receives a large number of calls concerning slow performance and timeout issues. The IT department that the storage array's Fibre Channel drives is the bottleneck. They propose sold purchasing solid state disks (SSDs) to store the entire VDI environment. Unfortunately, their proposed is rejected because of the cost of the drives. Which array feature should the organization implement to reduce the quality of SSD that are required to service the high I/O bursts of their VCs environment? A. Thin Pools B. Deduplication C. Cache Tiering D. Cache Partitioning /Reference: QUESTION 54 Consider the following statement The active distribution of decision-making rights and accountability among different stakeholders in an organization and the rules and procedures for making and monitoring those decisions to determine and achieve delivered behavior and results. Which aspect of cloud computing is expressed by the statement? A. Service level management B. Enterprise governance C. Standards compliance D. Risk assessment /Reference: QUESTION 55 Your client has a block-based storage virtualization environment. They want to avoid losing data in the event of

double disk failure. Which technology do you suggest they deploy? A. RAID 5 B. Eraser coding C. Mirrored RAID D. Multipathing /Reference: QUESTION 56 Which is primary dimension to consider when performing a risk management? A. Quality of exposures B. Owner of the asset C. Value of the asset D. Location of the asset /Reference: QUESTION 57 What would you describe is a key characteristic of cloud platform as a Service (PaaS)? A. Direct control over the underlying infrastructure B. Cloud hosted integrated development environment C. Home-grown programming environment D. Cloud hosted, in house built tools /Reference: QUESTION 58 What is a key attribute of cloud services? A. Manual provisioning B. Full pre-allocation C. Self-service D. Automatic content creation

/Reference: QUESTION 59 From a virtualization capacity perspective, what are the top issues? A. Forecasting, allocating, timing B. Fault tolerance, monitoring, automation C. Awareness, optimization, prediction D. Allocation, management, monitoring /Reference: QUESTION 60 Which services are typically offered by cloud service providers? A. Bundled storage, applications, operating systems B. Operating environment, virtualization, applications C. Software, platform, infrastructure D. Compute, storage, connectivity /Reference: QUESTION 61 Which is an example of vertically scaling a virtual application? A. Cluster two database virtual servers on a single physical server B. Migrate a database virtual server to a higher-capacity physical server C. Migrate a database virtual server to a less-utilized physical server D. Cluster two database virtual servers across two physical servers /Reference: QUESTION 62 A company is designing a new database for employee data. The database will store employment age, medical history, education, job history, performance reports, salary, increases and bonuses, and location. The HR department wants to mine the information for patterns of different age groups, pay levels, locations, and so forth.

The architect is concerned about some of this data being collected and stored in one central database and who has access to it. Where should the architect look for definitions on what information is controlled and what technical protections need to be employed? A. Scientific research papers B. Industry standards C. Best practices D. Regulations and laws /Reference: QUESTION 63 What is the difference between an FCoE frame and an iscsi frame? A. FCoE operates on 10 Gigabit Ethernet; iscsi does not B. iscsi uses TCP/IP; FCoE does not C. FCoE uses TCP/ IP; iscsi does not D. iscsi encapsulates a complete FC frame; FCoE does not /Reference: QUESTION 64 An organization is designing a virtual server environment. They have an application that requires a significant amount of communication with a database. The application and database will be located on different physical servers and configured on the same VLAN. For performance, both the application and database will have dedicated network adapters. Which virtualization functionality is negatively impacted by bypassing the hypervisor when configuring the dedicated network adapters for the applications? A. Data replication B. Converged networking C. Mobility D. Shared storage /Reference:

QUESTION 65 How can a hypervisor virtual switch increase the efficiency of a physical network? A. By consolidating ports into the physical network B. By reducing the amount of data transmitted to the physical network C. Through port aggregation to isolate VMs to another VLAN D. By increasing the bandwidth of the physical network /Reference: QUESTION 66 A company has just experienced an outage in their environment as a result of a configuration change that propagated across the entire environment. What would you recommend to prevent similar outages in the future? A. Standardize the environment on a single operating system to reduce risk and simplify changes B. Mandate that all configuration changes comply with FIPS Level 3 C. Encrypt all configuration management servers and configure ACLs to allow access to only a subset of administrators D. Configure resources to a known state and use a CMDB to ensure that the initial state is maintained /Reference: QUESTION 67 Which consolidation approach involves consolidating at the technology layer? A. Cloud B. Services C. Application D. VDC /Reference: QUESTION 68 A hypervisor running several virtual servers crashes, and all virtual servers are restarted on another hypervisor. When the applications restart, they replay log files to bring data up to date. Which type of consistency does this situation represent?

A. Eventual consistency B. Offline consistency C. Crash consistency D. Application consistency /Reference: QUESTION 69 To address security concerns when configuring a server, why should you avoid the use of non- persistent disks? A. Increasing the RAID level reduces the number of points that can be attacked B. Security limits vmotion flexibility C. Disk segmentation reduces the risk of security attacks D. A system reboot can remove traces of attacks /Reference: http://www.gratisexam.com/ QUESTION 70 Governance, risk, compliance, and security are all related and yet they differ. Which two attributes are governance attributes? A. IT, business exposures B. Access to information, enforcement C. Confidentiality, integrity D. Organizational structures, processes /Reference: QUESTION 71 In the CAP Theorem, what is Consistency?

A. Ability to maintain BASE properties of transactions B. Ability to handle lost network connectivity gracefully C. Ability to maintain ACID properties of transactions D. Ability to respond to all requests successfully /Reference: QUESTION 72 A customer wants to ensure that their critical application can fail over to another physical host within the cluster without disruption. Which feature should be utilized? A. Storage vmotion B. Distributed Resource Scheduler C. Fault Tolerance D. High Availability /Reference: QUESTION 73 An administrator has implemented a hypervisor cluster with high availability enabled. They are expecting that if any of the physical servers fail, the virtual servers will be transparently migrated to other hypervisors in the cluster. When the first hypervisor failure occurs, all of the hosted virtual servers appear offline to users as they are moved to another host. What feature should the administrator have implemented to achieve his goal? A. Load Balancing B. Live Migration C. Fault Tolerance D. Distributed Resource Scheduling /Reference: QUESTION 74 A company moved to a new building that contains a fully virtualized data center. They purchased a building 10 km away and decide to build a second data center at that location. The new data center will be identical to the

first, and applications and services will be mobile between the locations. Which WAN connectivity option would provide both the best performance for virtual server mobility across sites? A. MPLS B. Dark Fiber C. IP D. WDM /Reference: QUESTION 75 A small law firm that does not currently have any virtualization technologies implemented has recently merged with another firm of approximately the same size. They are planning to consolidate into a single location. They have decided to virtualize their servers, and they would like to consolidate storage. The current storage utilization is below 60%. The budget will not allow them to purchase an array that matches the capacity of the current storage. However, they cannot justify the application disruption associated with growing storage over time to meet forecasted capacity requirements. Which array feature would meet their requirements? A. Virtual Pooling B. Virtual Provisioning C. Vertical Tiering D. Virtual LUN /Reference: QUESTION 76 A customer is determining whether to divest resources into a third-party cloud solution. They are concerned about what will happen should they decide to migrate their data back in-house. Which contractual agreement defines this scenario? A. Service-level agreement B. End-user license agreement C. Non-binding user contract D. Termination agreement

/Reference: QUESTION 77 Why is it beneficial to define tier criteria during the data center inventory and data gathering process? A. To define recovery time objectives B. To define service-level objectives C. To define service-level agreements D. To define recovery point objectives /Reference: QUESTION 78 From an IT business layer perspective, what do you gain by consolidating at the application layer? A. Reduced transactional storage B. Reduced footprint C. Inter-array tiering D. Increased compute power /Reference: QUESTION 79 Why is it important to identify business objectives prior to planning and designing a virtual infrastructure? A. IT objectives are the same as business objectives B. IT objectives drive business objectives C. IT objectives are linked to business objectives D. Business objectives are a higher priority than IT objectives /Reference: QUESTION 80 A customer is determining whether the risk involved in migrating in-house data to a third-party cloud provider is acceptable. Which step should be performed after the initial evaluation of the asset? A. Run a full risk assessment

B. Leverage standards to mitigate risks C. Run a second asset evaluation D. Deploy the environment /Reference: QUESTION 81 Your customer is primarily concerned with asset discovery and a reconciled view of all infrastructure components and the dependencies between them. Which type of architecture would you recommend? A. Change management system B. CMDB C. Asset management system D. Federated CMDB /Reference: QUESTION 82 What can the consumer manage and control when subscribing to cloud Software as a Service (SaaS)? A. OS settings B. Network settings C. Application settings D. API module /Reference: QUESTION 83 Which two governing bodies focus on developing cloud standards? A. ISO, CSA B. NIST, (ISC)2 C. CSA, ENISA D. NIST, ISO

/Reference: QUESTION 84 A company is planning an image-based backup solution for their virtual server environment, and would like to continue to use their existing backup software. Which software feature is critical to reducing the amount of data that is backed up? A. File-level snapshot B. Open file plug-in C. Deduplication D. Changed file tracking /Reference: QUESTION 85 Which properties define a cloud environment? A. Self-service, dedicated leased services in-house B. Dedicated, but privatized, virtualized data center technologies in-house C. Power, connectivity, physical security D. Self-service, Internet served computing, shared resources, pay as you use /Reference: QUESTION 86 What cloud characteristic provides computing resources that facilitate multiple consumers using a multi-tenant model, with different physical and virtual components that are dynamically assigned and reassigned based on demand? A. On-demand self-service B. Resource pooling C. Rapid elasticity D. Measured service /Reference: QUESTION 87 Questions such as "How would you classify the sensitivity of your data?" and "What is the value of this application data?" are examples of which kind of sample risk score questions?

A. Management B. Business C. Information security D. Disaster recovery /Reference: QUESTION 88 A customer has three VMware ESX hosts in a cluster. They need to configure the virtual guest servers to restart automatically on an alternate host if the original host becomes unavailable. Which service should be configured on the cluster? A. Resource Pooling B. Live Migration C. Load Balancing D. High Availability /Reference: QUESTION 89 In an attempt to save money, the IT department of a midsize company is identifying opportunities for consolidation. What are three valid approaches they could take? A. Cloud application services, VDC, VMware B. Commoditized hardware and software, outsource backups, isolate client groups C. VDC, cloud, services D. Services, servers, modular hardware /Reference: QUESTION 90 The corporate data center has role segregation between network, security, and OS/systems administrators. The OS/system administrators also are responsible for the OSs running on hypervisors, and the hypervisors themselves. The company wants to keep the roles segregated. Which virtualized switch should they use so that the network administrators can manage the switches without logging in to the virtualized environments? A. Brocade ED-10000

B. Third-party virtual switch C. VMware vdistributed switch D. Basic VMware vswitch /Reference: QUESTION 91 Your customer is a law firm of about 500 people. They have decided to purchase a storage array. The IT staff wants to implement a converged network instead of the traditional LAN and SAN model. What benefit of FCoE/converged networking can they present to the CTO to obtain approval for implementing this technology? A. Increased bandwidth B. Improved fault tolerance C. Increased distance capabilities D. Reduced operational expenses /Reference: QUESTION 92 After virtualizing an x86 server workload, users report that a custom application is performing poorly. You investigate the issue and find that the resources on the host do not appear to be constrained. However, you discover that the application on the guest operating system has an abnormally high number of context switches. What should you do to resolve the issue? A. Deploy additional hosts B. Move to a Type 2 hypervisor C. Use software-assisted virtualization D. Turn on hardware virtualization in the BIOS /Reference: QUESTION 93 Infinite scalability, no boundaries, operational efficiency, self-management, and self-healing are key infrastructure requirements of which type of storage? A. Virtualized B. Enterprise C. Cloud

D. Commodity /Reference: QUESTION 94 Which EMC product can automatically promote data into a caching tier of Enterprise Flash Drive (EFD) storage to enable rapid access of data that may see infrequent bursts of activity? A. VPLEX B. Atmos C. VNX D. FMA /Reference: QUESTION 95 Which statement is true of Atmos? A. REST is the only method for storing content B. File system access requires FMA C. Provides universal access regardless of location D. Data is securely isolated via single tenancy /Reference: QUESTION 96 Which type of switch can provide management functions for virtual machine ports? A. Distributed virtual switch B. Standard virtual switch C. Physical switch D. Third-party virtual switch /Reference: QUESTION 97

Which method of storage virtualization provides the added benefit of wide striping? A. Virtual LUN Migration B. Virtual Provisioning C. Server-based storage virtualization D. Storage tiering /Reference: QUESTION 98 Questions such as "Where is this application hosted?" and "How are support and escalation processes performed for this application?" are examples of which kind of sample score questions when considering utilizing a service provider? A. Disaster recovery B. Information security C. Management D. Business /Reference: QUESTION 99 A large enterprise has virtualized heavily in their data center. All virtual machines in the enterprise are built from standardized baseline templates. Based on these image templates, they have set configuration best practices and implementation workflows. Recently, the company has started to see performance issues on several production-critical virtual guests. In responding to the performance issues, the cause was found to be incorrectly configured vnic parameters in the virtual guests. Which service should be implemented to identify deviations in the deployed servers from the baseline templates, and to remediate any such deviations? A. Change management reporting B. CMDB automation C. Policy-driven configuration management D. Incident management runbook automation /Reference: QUESTION 100

You are an EMC UIM administrator. You are in discussions with a business unit manager about how they want to create service offerings for their organization. What might you recommend? A. Configure zone sets B. Use a LAN or SAN boot C. Grade the types of network access D. Do not grade the types of storage /Reference: QUESTION 101 An administrator is configuring resources for a self-service portal. They have just completed grouping their storage resources into three categories, based on the organization's corporate structure. Which process did the administrator just complete? A. Distribution B. Discovery C. Grading D. Pooling /Reference: QUESTION 102 A large enterprise is in the process of converting to a virtual data center as a first step toward cloud computing. They want the ability to deploy, manage, and decommission infrastructure components in a timely manner to meet their business requirements, with minimal impact to their systems administration staff. What should be implemented? A. Centralized resource pooling and management B. Configuration management C. Self-service request automation D. Policy-driven configuration management /Reference: QUESTION 103

An application development team of a stock trading firm requires a very complex testing environment that has to be re-deployed with each code revision. It usually takes a system administrator at least a day to rebuild the environment using imaging software. How would virtualization benefit this firm? A. Resource pooling B. Simplified provisioning C. Measured service D. On-demand self-service /Reference: QUESTION 104 A large company has multiple data centers with heterogeneous arrays of various sizes at each site. Some arrays are reaching maximum utilization, and other arrays are underutilized. Which storage virtualization method would enable them to improve overall utilization across sites? A. Flash drive cache tiering B. Horizontal storage tiering C. Vertical storage tiering D. Server-based storage tiering /Reference: QUESTION 105 Why is it possible for Object-based Storage Devices (OSD) to achieve massive scale without significant performance impact? A. OSD uses solid state drives exclusively B. OSD distributes data management across clustered nodes C. Data organization is hierarchical by Object ID (OID) D. Data organization is flat by Object ID (OID) /Reference: QUESTION 106 What is a benefit of archiving data to the cloud using Atmos and FMA? A. Auto-deletes aging files

B. Provides elastic object storage C. Improves search and index D. Accelerates file retrieval speed /Reference: QUESTION 107 Your client is considering server-based storage virtualization. You explain that it is easy to deploy. What else should you tell them? A. Disaster recovery tools are not available B. Increased compute power and server utilization will be needed C. Complex management tools will be needed D. Devices to be virtualized must come from the same array /Reference: QUESTION 108 Why is existing SAN performance a key consideration when implementing an in-band virtualization component for block storage virtualization? A. Host connections fan in to virtualization components B. Storage connections fan in to virtualization components C. Virtual devices are cache-only devices D. Metadata and control are in the data path /Reference: QUESTION 109 A company has implemented a VDI solution. A user logs in to their virtual desktop for the first time and customizes the environment before logging off for the day. When they return the next day, all of their customizations are gone. Which type of virtual desktop has been implemented? A. Remote B. Thin C. Stateless D. Stateful

/Reference: QUESTION 110 Applications of different criticality have been deployed on a collection of virtual servers. In an effort to save cost, a business continuity plan has been devised to provide half the number of physical servers to host the virtual machines at the disaster recovery site. What is a possible outcome if a disaster were to occur at the primary site? A. Applications cannot be resolved B. Application data is inaccessible C. Application data is lost D. Application performance is degraded /Reference: QUESTION 111 What are two important Privacy by Design in Practice principles of an ILM strategy? A. Visibility and transparency B. Minimizing the data collected and role separation C. Create trust groups and purpose-built storage arrays D. Masking policies and data shredding /Reference: QUESTION 112 What is a key security-related action to perform when using templates to deploy virtual machines? A. Ensure that the hardened virtual machine used for the template uses non-persistent disks B. Ensure that the virtual machine operating system used for the template has no applications installed C. Ensure the hardened virtual machine used for the template is created with a known security baseline D. Ensure that the security services on the hardened virtual machine used for the template are turned off /Reference:

QUESTION 113 An IT organization has started the process of moving to a virtualized data center. They are trying to set expectations for management. What would be a realistic, near-term network resource objective? A. Consolidate the existing 1 GE and 10 GE networks, and implement traffic designs along with WAN redundancy B. Unify compute and storage traffic designs, QoS, and rapid failover C. Deploy WAN technologies, rapid elasticity and resource pooling D. Improve bandwidth, implement 10 GE, distribute virtual switching and failure planning /Reference: QUESTION 114 Why should storage technologies such as data deduplication and data compression be considered? A. They simplify storage configuration B. They improve storage efficiency C. They increase storage allocation D. They improve storage security /Reference: QUESTION 115 What is IT's approach to addressing performance issues during the Operationalize phase of the Cloud Maturity Model? A. Reactive B. Proactive C. Selective D. Investigative /Reference: QUESTION 116 Which product performs virtualized data caching across heterogeneous storage arrays? A. VMAX B. VNX

C. VPLEX D. Atmos /Reference: QUESTION 117 Refer to the exhibit. A VDC architect has just purchased switches to be used as converged access layer switches. All Fibre Channel traffic operates at 8 Gbps and all ports operate at line-rate. The design requires that all FC ports be configured as ISLs and be connected to the SAN core switches. An equal number of converged ports will be configured as standard Ethernet ports and connected to the aggregation layer switches. What is the oversubscription ratio of the FC ports on this switch? A. 3:1 B. 5:1 C. 6:1 D. 8:1 /Reference: QUESTION 118 You need to determine the number of CNAs needed on a hypervisor. Bandwidth requirements for applications running on the hypervisor are: - Average SAN Bandwidth: 3 Gb/s - Average LAN Bandwidth: 2 Gb/s

What is the minimum number of dual-port CNAs you would need to install in the server to meet bandwidth requirements while providing CNA redundancy? A. 1 B. 2 C. 3 D. 4 /Reference: QUESTION 119 A company asks you to design a stretched cluster environment for their new hypervisor deployment. The company's two data centers are located 150 km apart, and have Fibre Channel connected hosts and storage at both locations. Which distance networking technology should you recommend? A. DWDM B. CWDM C. Dark Fiber D. MPLS /Reference: QUESTION 120 An application is designed to use a middleware layer to communicate with, and share the data and resources of, other applications in the organization. What is this an example of? A. SOA B. EAI C. EAI via Mesh D. ESB /Reference: QUESTION 121 Which aspect of data security does SSL address? A. Secure data transport to and from the application over the network

B. Secure block data transfer between the host and storage array C. Encryption of data at rest on a storage device D. Centralized key management for data encryption /Reference: QUESTION 122 What capabilities are needed to transform a VDC into IaaS? A. Self-service portal, service catalog, metering processes B. Self-service portal, pay-as-you-go C. Metering processes, multi-tenancy, termination agreements D. Pay-as-you-go, service catalog /Reference: QUESTION 123 Which feature of server virtualization allows for the online movement of virtual server guests between separate physical hosts while providing zero downtime? A. Load Balancing B. Online Migration C. Distributed Switching D. Resource Pooling /Reference: QUESTION 124 Which technology can significantly reduce the network bandwidth required for backup? A. Source-based deduplication B. Target-based deduplication C. Converged network D. VTLs with hardware-assisted compression /Reference:

QUESTION 125 You have been asked to diagnose a problem in your VDC. excessive latency and application time- outs on one hypervisor. The problem is known to be network related. You examine the interface counters on the switch and find no abnormal activity. A packet analyzer shows a significant number of CRC errors being generated by one of the NICs. Which type of switch architecture is being used in this environment? A. Cut Through B. Store and Forward C. Switch on a Chip D. Distributed Forwarding /Reference: QUESTION 126 A company has two data centers located within 3 km of each other. They use EMC arrays at one of the data centers; they use non-emc storage at the other data center. They would like to have a consistent view of one or more LUNs. Which product should you suggest they deploy? A. VPLEX B. Atmos C. Vblock D. VNX /Reference: QUESTION 127 A company has finished the design for their VDC. They realize that they should also include a few design considerations to prepare them for cloud. What is a key organizational reason for the company to build a cloud-based service? A. Service levels are guaranteed to improve B. Lines of business can more easily reorganize C. Lines of business obtain what they want from IT D. Lines of business can self provision resources

/Reference: QUESTION 128 You are designing a new VDC and are planning to use iscsi for storage connectivity from the hypervisors. The network infrastructure is 10 Gigabit Ethernet, and the storage system can support multiple NICs. Your networking design on the storage system must provide the highest level of performance, security, and fault tolerance. What should you recommend? A. Bond the NICs together and connect them to different aggregation layer switches. Configure a separate VLAN for the iscsi traffic. B. Leave the NICs independent and connect them to different aggregation layer switches. Configure a separate VLAN for iscsi traffic on each NIC. C. Bond the NICs together and connect them to different access layer switches. Configure a separate VLAN for the iscsi traffic. D. Leave the NICs independent and connect them to different access layer switches. Configure a separate VLAN for iscsi traffic on each NIC. /Reference: QUESTION 129 An architect is designing a VDC network environment, and is concerned about the overhead introduced by the Spanning Tree Protocol. The environment will have approximately 2,500 VLANs configured. Which Spanning Tree Protocol should the architect specify for this implementation? A. MSTP B. RSTP C. PVST D. STP /Reference: QUESTION 130 When selecting a hypervisor, which condition would favor choosing KVM? A. All virtualized applications are layered on Linux and OpenBSD. B. Every guest VM is required to run an unmodified operating system. C. All virtualized applications are layered on Microsoft Windows operating systems. D. A full virtualization approach is desirable.

/Reference: QUESTION 131 A company is planning the backup strategy for their virtual machine environment. They are considering migrating to an image-based backup model. Where would image-based backups be processed in this environment? A. On a separate physical or virtual server B. On the tape library C. On the storage array D. On the SAN switch /Reference: QUESTION 132 From which resource are virtually provisioned LUNs allocated? A. Virtual pool B. Physical pool C. Thin pool D. Unallocated pool /Reference: QUESTION 133 A small law firm that does not currently have any virtualization technologies implemented has recently merged with another firm of approximately the same size. They are planning to consolidate into a single location. They have decided to virtualize their servers and they would like to consolidate storage. It has been determined that 80% of the file server data has not been accessed in over 90 days. What can they implement to achieve higher storage efficiency? A. A file archiving plan, to leverage inter-array storage tiering B. Quotas, to limit the amount of capacity users or groups can consume C. File extension filters, to prevent non-business related data from being stored in home directories D. Vertical storage tiering, to ensure data is placed on the appropriate drive technology

/Reference: QUESTION 134 You are designing a new VDC and are planning to use iscsi for storage connectivity from the hypervisors. The network infrastructure is 10 Gigabit Ethernet, and the hypervisor hardware can support only two NICs. Your networking design on the hypervisor must provide the highest level of performance, security, and fault tolerance. What should you recommend? A. Bond the NICs together and connect them to different access layer switches. Use the same VLAN for SCSI traffic as for management traffic. B. Leave the NICs independent and connect them to different access layer switches. Configure a separate VLAN for iscsi traffic on each NIC. C. Bond the NICs together and connect them to different access layer switches. Configure a separate VLAN for the iscsi traffic. D. Leave the NICs independent and connect them to different access layer switches. Use the same VLAN for SCSI traffic as for management traffic. /Reference: QUESTION 135 What are the components of a GRC profile? A. Risk level, assessment date, regulations, security requirements B. Healthcare and financial audits, security requirements, terms of service, service termination agreement C. Availability reporting, risk level, regulations, security requirements D. Risk level, security requirements, terms of service, service termination agreement /Reference: QUESTION 136 An application processes test results from a manufacturing facility, then generates and archives quality reports. The application has been in production for five years. The application was developed by an outsourced company that is no longer in business. The source code is not available. It can run on any current Microsoft Windows Server operating system. What is this an example of? A. Vendor lock-in B. A legacy application C. An enterprise application D. Service-oriented architecture

/Reference: QUESTION 137 An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan? A. Reduced impact on network infrastructure B. Control and containment of IP C. No change in desktop management methods and tools D. Immediate cost savings /Reference: QUESTION 138 Which aspect of data security does TLS address? A. Secure data transport to and from the application over the network B. Secure block data transfer between the host and storage array C. Encryption of data at rest on a storage device D. Centralized key management for data encryption /Reference: QUESTION 139 Which solution should be the primary choice for protection against accidental data deletion? A. Backup B. Local replication C. Remote replication D. Fault-tolerant cluster with hot standby VM /Reference: QUESTION 140 Which solution would address your requirement to encrypt data that will be stored in several SAN- attached storage systems, including both disk arrays and tape libraries?

A. Cisco SME B. VMAX D@RE C. PowerPath/VE with RSA Encryption D. EMC VPLEX /Reference: QUESTION 141 Which block-storage protocol should be implemented for high performance and combined management models? A. FCoE B. Enhanced iscsi C. iscsi D. ifcp /Reference: QUESTION 142 You are designing a VDC that uses converged networking to support both LAN and SAN traffic. FCoE is used exclusively for storage access. The access and aggregation layer switches that have been chosen support both 10 and 40 Gigabit Ethernet and Data Center Bridging. You have determined that the traffic between the access layer and aggregation layer switches is: - Average SAN (FCoE) 60 Gb/s - Average LAN (Ethernet) 100 Gb/s - Burst SAN (FCoE) 80 Gb/s - Burst LAN (Ethernet) 130 GB/s Performance cannot be degraded due to a failure of a single switch. Which port configuration would support the average traffic between the access and aggregation layer switches? A. Four 40 Gb/s ports and eight 10 Gb/s ports B. Four 40 Gb/s ports C. Three 40 Gb/s ports and four 10 Gb/s ports D. Three 40 Gb/s ports and six 10 Gb/s ports

/Reference: QUESTION 143 What is the primary benefit of Virtual Storage Integrator (VSI)? A. It enables a server administrator to provision storage to a hypervisor. B. It enables a storage administrator to create storage pools on the array. C. It enables a network administrator to manage VSANs and VLANs with a common interface. D. It eliminates the need for array-based thin pools. /Reference: QUESTION 144 Which type of application is a poor candidate for migration to a VDC? A. One that uses a specific BIOS B. One that uses an open source database C. One that uses an n-tier architecture D. One that has horizontal or web-scale characteristics /Reference: QUESTION 145 A VDC administrator wants to implement a service to non-disruptively relocate virtual machines from one physical host to another physical host. Which service should they implement? A. Distributed Switching B. High Availability C. Online Migration D. Resource Pooling /Reference: QUESTION 146 An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan?

A. Ease of addressing compliance issues B. Reduced impact on network infrastructure C. No change in desktop management methods and tools D. Immediate cost savings /Reference: QUESTION 147 An enterprise has several line of business applications that exist as separate islands of data and functionality. The enterprise now needs to share data across these applications to automate business practices. What does the organization need to implement? A. SAS B. EAI C. GRC D. L2TP /Reference: QUESTION 148 A VDC application design dictates the use of multiple hypervisors with array LUNs that are directly provisioned to each VM. The application data has an active lifetime of 6 to 9 months, after which it is rarely accessed. The need is to re-purpose several storage arrays from different vendors and performance capabilities. Which technology should be considered for the VDC storage design? A. Block-level storage virtualization B. File-level virtualization with global namespace C. Thin-on-thin provisioning D. Intra-array storage tiering /Reference: QUESTION 149 When surveying an existing application environment to free up resources, which type of systems should be initially identified? A. Systems that have minimal GRC or security requirements B. Systems whose data can be comingled

C. Systems that can be combined, replaced, or obsoleted D. Systems that can be migrated easily to a virtual environment /Reference: QUESTION 150 A company has several NAS storage systems serving both NFS and CIFS shares. They want to offer storage to their end users, masking the identity of the target storage so the users cannot tell which storage system they are using. Which virtualization technique would work in this environment? A. File-level virtualization B. Mixed virtualization C. Distributed virtualization D. Block-level virtualization /Reference: QUESTION 151 An application handles data that is crucial for solving a specific business problem. The dataset is quite large, and originates from several sources and formats. This data also changes very quickly. How should you classify this application? A. Enterprise B. Web-scale C. Horizontal D. Big Data /Reference: QUESTION 152 An organization uses Linux desktops, laptops, and servers for their primary infrastructure. The company has a business need to run an application that is only available for the Microsoft Windows operating system. This application needs to be available to approximately one third of their 100 desktop and laptop users. There is concern about the stability of the application and how a single failure might impact multiple users in a shared environment. Which solution would best meet their needs, and why?

A. VDI, because it provides true user segmentation B. RDS, because it allows all users to share a single instance of an application C. VDI, because it provides the highest density per user D. RDS, because it provides better fault tolerance /Reference: QUESTION 153 Which technology provides load balancing and fault tolerance for Ethernet traffic? A. NIC Teaming B. Multipathing Software C. HBA Teaming D. Fibre Channel Initiator /Reference: QUESTION 154 What best describes the value proposition of EMC VFCache? A. Improved performance without compromising protection B. Improved capacity utilization at reduced cost C. Scale-out performance at a scale-up cost D. Source-based deduplication without any host overhead /Reference: QUESTION 155 You need to determine the number of CNAs needed on a hypervisor. Bandwidth requirements for applications running on the hypervisor are: - Average SAN Bandwidth: 5 Gb/s - Average LAN Bandwidth: 4 Gb/s What is the minimum number of dual-port CNAs you would need to install in the server to meet bandwidth requirements while providing CNA redundancy? A. 1 B. 2

C. 3 D. 4 /Reference: QUESTION 156 What are the two primary reasons for creating services in the service catalog? A. Standardization, providing consumers with business relevant options B. Standardization, providing consumers with templates for selection C. Setting prices, limiting resource consumption D. Setting prices, deploying security policies /Reference: QUESTION 157 Which design consideration helps reduce risk when data is comingled across different business units in a VDC, or between different companies in the cloud? A. Creating unique login IDs B. Creating trust zones C. Having a formal risk assessment process D. Regulations that specify data that can be co-mingled /Reference: QUESTION 158 A software manufacturer is planning to convert their VDC to IaaS. As part of the transformation to IaaS the company realizes they have to make several organizational changes. They have already obtained executive sponsorship and made all the necessary organizational changes. Which is the most likely next step in their transformation process? A. Evaluate technical and relationship skills and perform a gap analysis B. Build trust in the system so that the lines of business will use the services C. Cross train operations, development, and test to remove silos and form collaborative teams D. Reorganize IT as a whole to support IaaS.

/Reference: QUESTION 159 Which type of application is a poor candidate for migration to a VDC? A. Appliance-based B. Web-scale C. Enterprise D. n-tier /Reference: QUESTION 160 You are planning to deploy a virtualized application in a high-availability configuration with automated VM restart on a hypervisor cluster. Your sizing estimates show that peak workload conditions will saturate the processing power of three hypervisor servers. To meet the SLA, N+2 redundancy is required on the hypervisor servers, with server utilization not to exceed 75% under any conditions. What is the minimum number of nodes that you should configure in the hypervisor cluster? A. 5 B. 6 C. 7 D. 8 /Reference: QUESTION 161 An architect is designing a VDC network environment, and is concerned about Spanning Tree convergence issues. The environment will have approximately 150 VLANs configured. Each access layer switch will be configured with no more than 5 VLANs. Which Spanning Tree Protocol should the architect specify for this implementation? A. STP B. RSTP C. MSTP D. PVST

/Reference: QUESTION 162 Why does lock-in represent a significant threat to the business? A. Lack of tools and procedures for migration B. Potential for isolation failure between tenants C. Insufficient evidence of compliance D. Inadequate guarantees of full data erasure /Reference: QUESTION 163 What is a feature of the Cisco Unified Computing System (UCS)? A. Server identity pools B. Fabric reconfiguration services C. Layer 3 routing optimization D. CMDB maintenance utilities /Reference: QUESTION 164 A company has to implement a test/dev environment infrastructure as quickly as possible. The company does not have weeks or months to accomplish this. They also have limited resources available. Considering their timeline, what type of infrastructure would the company most likely have to choose? A. A traditional data center B. An offering from a cloud service provider C. An internal, virtualized environment with shared resources D. An internal, virtualized data center with automation /Reference: QUESTION 165 An organization uses Linux desktops, laptops, and servers for their primary infrastructure. The company has a business need to run an application that is only available for the Microsoft Windows operating system. This

application needs to be available to 10-12 of the company's 2000 employees. Which solution would best meet their needs, and why? A. RDS, because it provides low cost per user B. RDS, because it provides true user segmentation C. VDI, because it thin provisions desktops automatically D. VDI, because it is a mature, proven technology /Reference: QUESTION 166 Which backup solution(s) are possible candidates when there is a need to restore specific files on a VM? A. VM-based backup and image-based backup B. Storage-based backup only C. Hypervisor-based ("VM as flat file") backup D. Storage-based backup and image-based backup /Reference: QUESTION 167 You are creating dimension classifications for applications. You are considering attributes such as data size, availability requirements, RTO/RPO, compute resources, management method, and access. What is the goal of this analysis? A. Standardization B. Flexibility C. Granularity D. Modularity /Reference: QUESTION 168 What is a benefit of client-side application virtualization? A. Ease of license tracking, assignment, and management is achieved. B. Reduced overall complexity in the application and desktop environment is achieved. C. Tools used to manage standard applications can also be used to manage virtualized client-side

applications. D. All applications can be virtualized, providing flexibility and management control of client-side applications. /Reference: QUESTION 169 What is a benefit of PowerPath/VE with RSA encryption relative to array-based data encryption? A. Data encrypted before transmission to the array B. Reduces CPU overhead on the host C. Reduces SAN bandwidth requirements D. Eliminates the need for key management /Reference: QUESTION 170 Which storage requirement would be met with the implementation of traditional (thick) provisioning? A. Predictable performance B. Space efficiency C. Energy and capital savings D. High availability /Reference: QUESTION 171 Which framework for governance is also an international standard? A. ISO 27002 B. Common Criteria C. HIPAA D. FIPS 140-2 /Reference:

QUESTION 172 What is the primary consideration when performing a risk assessment? A. Value of the asset B. Location of the asset C. Owner of the asset D. Quantity of exposures /Reference: QUESTION 173 A company has implemented a VDI solution. A user logs in to their virtual desktop for the first time and customizes the environment before logging off for the day. When they return the next day, all of their customizations are gone. Which type of virtual desktops have been implemented? A. Stateless B. Stateful C. Thin D. Remote /Reference: http://www.gratisexam.com/ QUESTION 174 The formula "If A > B and B > C, then A > C" describes which aspect of governance, compliance, and risk in a cloud architecture? A. Effective risk mitigation B. Governance priority weighting C. Compliance tiering D. Transitivity of risk /Reference:

QUESTION 175 Which technology provides load balancing and fault tolerance for Fibre Channel traffic? A. Multipathing Software B. NIC Teaming C. HBA Teaming D. Fibre Channel Initiator /Reference: QUESTION 176 You are using virtual (thin) provisioning to reduce the amount of physical storage that is initially required for an implementation. On the storage array, you configure a pool that contains 20 TB of physical storage and then define several LUNs that total 100 TB. These LUNs are presented to several hypervisor clusters. Virtual Machines are subsequently created using a thick format for the virtual hard disks. What is the maximum capacity that can be allocated for VM hard disks in this configuration? A. 20 TB B. 100 TB C. 120 TB D. 2000 TB /Reference: QUESTION 177 Which is a scale-out NAS solution? A. EMC VNX B. EMC VFCache C. EMC Isilon D. EMC Symmetrix VMAX /Reference: QUESTION 178 A small company is deploying VDI as part of their VDC initiative. The storage array that is currently being used for VDI and other applications contains SSD, SAS and NL SAS drives. The SSDs are being used exclusively for

the Email servers, and the SAS and NL SAS drives are being used by all the applications, including VDI. Each application is configured to use one or more storage pools. Every morning at 9:00 AM, the performance of all applications connected to the storage array degrades significantly for a period of time and then returns to normal. How can this issue be resolved with the least capital expenditure, in the shortest amount of time, and without impacting the normal performance of the applications? A. Migrate the LUNs on the SSDs to SAS drives, then allocate the SSDs to a caching tier. B. Purchase new SSDs to use for the VDI deployment. C. Purchase new SSDs for the other applications. D. Migrate the LUNs on the SSDs to SAS drives, then allocate the SSDs to the VDI storage pool. /Reference: QUESTION 179 What is a benefit of client-side application virtualization? A. Isolation of the application from the endpoint operating system is achieved. B. Reduced overall complexity in the application and desktop environment is achieved. C. Tools used to manage standard applications can also be used to manage virtualized client-side applications. D. All applications can be virtualized, providing flexibility and management control of client-side applications. /Reference: QUESTION 180 In the context of GRC, which are data handlers? A. SAN components B. Service providers C. Employees and contractors D. End users populating a web form /Reference: QUESTION 181 A project is assigned to a group of developers who have only weeks to develop a prototype for an online trading application. The application needs to run on a variety of virtual host compute systems and be accessible from anywhere. The project lead must select an environment that would allow for self-service, anywhere availability,

wide scalability, and elasticity. Which would be the best approach to meet their needs? A. Outsource their infrastructure needs to a cloud provider that can meet their service-level requirements B. Outsource their connectivity requirements and build their compute environment at a co-location facility C. Construct a virtualized host compute environment with SAN storage and virtual network within their data center D. Construct an internal cloud infrastructure group to build virtualized services to run, metered, within their organization /Reference: QUESTION 182 A software manufacturer is planning to convert their VDC to IaaS. As part of the transformation to IaaS the company realizes they have to make several organizational changes. They have already obtained executive sponsorship and organizational buy-in. Which is the most likely next step in their transformation process? A. Evaluate and re-align the current IT organizational structure B. Identify early adopters and funding sources C. Perform a skills gap analysis and train resources as needed D. Build a trust matrix that includes the top GRC concerns /Reference: QUESTION 183 Which product eliminates the need to manually replicate data to a secondary file system? A. EMC Isilon B. EMC VFCache C. Cisco WAFS D. Cisco UCS /Reference: QUESTION 184 As part of a VDC design, you configured a number of hypervisor clusters that require a non- routable network to accommodate data transfers for online VM migrations and cluster heartbeats. However, some of the clusters contain sensitive data that should not be accessible by hypervisors in any other cluster. The design

recommends using Private VLANs to isolate each cluster's private network traffic. The network administrator has created a Primary VLAN, and asks you how the Private VLANs should be configured. How should you instruct the network administrator to proceed? A. Configure a Community Private VLAN for each cluster. B. Configure a Community Private VLAN for each cluster, and configure the gateway port in the Primary VLAN. C. Configure an Isolated Private VLAN for each cluster. D. Configure an Isolated Private VLAN for each cluster, and configure the gateway port in the Primary VLAN. /Reference: QUESTION 185 Which type of application is represented by virus scanning software, email clients, and word processing software? A. Enterprise B. Mobile C. Horizontal D. Legacy /Reference: QUESTION 186 A load balancing/firewall application is purchased and downloaded from a vendor site. It is prepackaged to run on a specific hypervisor. The administrator must import it into the VDC environment then perform minimal configuration tasks. Once installed, this application will solve a specific business problem for the organization. What is this an example of? A. A virtual appliance B. A web application C. A legacy application D. A thin appliance /Reference: QUESTION 187 Which represent key legal contracts for a service provider? A. Service level agreement, terms of service, termination agreement

B. Service level agreement, terms of service, enterprise license agreement C. End user license agreement, termination agreement, service level agreement D. End user license agreement, termination agreement, performance guarantee /Reference: QUESTION 188 What is IT's approach to addressing performance issues during the Virtualize phase of the Cloud Maturity Model? A. Reactive B. Selective C. Proactive D. Investigative /Reference: QUESTION 189 A company has invested in virtualization for all of their non-mission critical applications and many of their mission critical applications. The now want to convert their virtualized silos that are still owned by each line-ofbusiness into a true VDC. What is the primary ("#1") business driver for doing this? A. Efficiency B. Hyper-consolidation C. CAPEX reduction D. OPEX reduction /Reference: QUESTION 190 Which solution should be the primary choice for protection against a site-wide failure? A. Remote replication B. Array-based snapshots C. Local replication D. Hypervisor-based snapshot

/Reference: QUESTION 191 You have decided to pursue a "scale-up" approach instead of a "scale-out" approach to storage. What is the fundamental tradeoff that you have made? A. Improved availability versus limited scalability B. Simplicity of management versus improved scalability C. Ease of storage tiering versus poor resource utilization D. Higher application throughput versus degraded response time /Reference: QUESTION 192 Why is a quick risk assessment performed? A. It filters high value assets to determine proper placement in a VDC or a cloud. B. It is a simple method for assessing exposures in a VDC or a cloud. C. It serves as a check and balance against an auditor's report. D. It is a governance requirement, conducted for regulatory reasons. /Reference: QUESTION 193 What is the benefit of storage technologies such as data deduplication and data compression? A. Improved storage efficiency B. Improved storage security C. Simplified storage configuration D. Increase storage allocation /Reference: QUESTION 194 A Linux-based application platform stack is downloaded from a community site. It is prepackaged to run on a specific hypervisor. The administrator must import it into the VDC environment, and then perform minimal

configuration tasks. Once installed, the platform stack will solve a specific business problem for the organization. What is this an example of? A. An enterprise application B. A web application C. A thin appliance D. A virtual appliance /Reference: QUESTION 195 In which situation should you consider implementing hypervisor over-provisioning? A. Multiple applications with peak workload times that do not overlap B. Performance is a primary and critical consideration C. A mix of Tier-1 and Tier-2 applications in the same hypervisor cluster D. Multiple applications with the same peak workload times /Reference: QUESTION 196 What is the primary GRC concern when using a service provider's storage? A. Where the data is stored and how it is protected B. How many copies there are of the data C. If there is sufficient redundancy to protect the data D. If the data is erased when the storage is released /Reference: QUESTION 197 Which backup solution(s) should be your preferred choice(s) when you require consistent backups for ease of recovery? A. VM-based backup and image-based backup B. Storage-based backup only C. Hypervisor-based ("VM as flat file") backup D. Storage-based backup and VM-based backup

/Reference: QUESTION 198 Which cloud deployment model would be appropriate if the primary concern is to address spikes in application load? A. Hybrid B. Private C. Public D. Community /Reference: QUESTION 199 A company has finished the design for their VDC. They realize that they should also include a few design considerations to prepare them for cloud. What is a key technical reason for the company to build a cloud-based service? A. Scale resources up and down to meet needs B. Take advantage of multi-tenancy to improve utilization C. Consolidate systems to increase density D. Leverage auto-healing to reduce down-time /Reference: QUESTION 200 You are using virtual (thin) provisioning to reduce the amount of physical storage that is initially required for an implementation. On the storage array, you configure a pool that contains 20 TB of physical storage and then define several LUNs that total 50 TB. These LUNs are presented to several hypervisor clusters. Virtual Machines are subsequently created using a thick format for the virtual hard disks. What is the maximum capacity that can be allocated for VM hard disks in this configuration? A. 20 TB B. 50 TB C. 70 TB D. 1000 TB

/Reference: QUESTION 201 You are planning to deploy a virtualized application in a high-availability configuration with automated VM restart on a hypervisor cluster. Your sizing estimates show that peak workload conditions will saturate the processing power of four hypervisor servers. To meet the SLA, N+2 redundancy is required on the hypervisor servers, with server utilization not to exceed 80% under any conditions. What is the minimum number of nodes that you should configure in the hypervisor cluster? A. 5 B. 6 C. 7 D. 8 /Reference: QUESTION 202 A company has implemented a Vblock solution in their primary data center. They are using a single management toolset to configure and provision the compute, network, and storage resources within the Vblock. Which management tool are they using? A. EMC Unified Infrastructure Manager B. VMware vcenter C. EMC Unisphere D. EMC ControlCenter /Reference: QUESTION 203 Which is a poor candidate for migration to a VDC? A. An enterprise-wide manufacturing application B. An application with web-scale characteristics C. An application requiring data isolation D. An n-tier application that uses an open-source database

/Reference: QUESTION 204 Which technology provides load balancing and fault tolerance for Fibre Channel over Ethernet traffic? A. Multipathing Software B. NIC Teaming C. HBA Teaming D. Fibre Channel Initiator /Reference: QUESTION 205 Which is a valid method for modifying an application environment to support more clients and increased data throughput? A. Vertically scale by increasing resources on existing nodes B. Migrate the application from SSD to SAS storage C. Migrate the application from SAS to NL SAS storage D. Horizontally scale using a closed loop system /Reference: QUESTION 206 You are designing a VDC that uses converged networking to support both LAN and SAN traffic. FCoE is used exclusively for storage access. The access and aggregation layer switches that have been chosen support both 10 and 40 Gigabit Ethernet and Data Center Bridging. You have determined that the traffic between the access layer and aggregation layer switches is: - Average SAN (FCoE) 60 Gb/s - Average LAN (Ethernet) 100 Gb/s - Burst SAN (FCoE) 80 Gb/s - Burst LAN (Ethernet) 130 Gb/s Performance cannot be degraded due to a failure of a single switch. Which port configuration would support the average and burst traffic between the access and aggregation layer switches?

A. Four 40 Gb/s ports and eight 10 Gb/s ports B. Six 40 Gb/s ports C. Five 40 Gb/s ports and one 10 Gb/s port D. Three 40 Gb/s ports and six 10 Gb/s ports /Reference: QUESTION 207 What are the three general components of a Vblock? A. Compute, connectivity, storage B. Caching, sub-lun tiering, FAST C. Security, risk, compliance D. Multi-tenancy, self-service, elasticity /Reference: QUESTION 208 Which is a valid method for modifying an application environment to support more clients and increased data throughput? A. Migrate the application from NL SAS to SAS storage B. Migrate the application from SSD to SAS storage C. Vertically scale by adding more nodes to support the application D. Horizontally scale by increasing system resources on the same number of nodes /Reference: QUESTION 209 Which EMC product provides seamless data mobility and enables management of the storage resources of multiple heterogeneous arrays from a single interface? A. VPLEX B. Vblock C. VNXe D. Atmos

/Reference: QUESTION 210 A company requires their application, which is running on a virtual server, to be continuously available. They would like to provide automatic failover and non-disruptive failure recovery. Which service should they configure? A. Resource Pooling B. High Availability C. Online Migration D. Fault Tolerance /Reference: QUESTION 211 In addition to encryption, which techniques represent risk mitigation? A. Two-factor authentication, role separation B. Two-factor authentication, privacy assessment C. Role separation, ISO 27002 assessment D. PCI compliance, hardened VMs /Reference: QUESTION 212 You are meeting with the CIO to discuss your VDC design. They QUESTION NO: the amount of capital that is being invested in iscsi adapters. They state that, because of the number of adapters required, it is more costeffective to purchase 10 Gigabit Ethernet NICs and use the integrated hypervisor software stack. How should you justify the increased cost of the iscsi Adapters? A. Using NICs and the software stack will increase CPU load on each hypervisor, requiring more hypervisors to deliver the same performance levels. This will result in additional hardware and licensing costs. B. iscsi adapters can encrypt iscsi frames, preventing unauthorized access to the data. The hypervisor software stack cannot encrypt iscsi frames, leaving the data vulnerable. C. Using NICs and the software stack will require additional NICs for each hypervisor to deliver the same throughput. To obtain the additional PCIe slots for the NICs, larger form-factor servers will be required, increasing hardware costs. D. iscsi adapters can use Jumbo Frames, providing improved performance for storage traffic. The hypervisor software stack cannot use Jumbo Frames, resulting in poorer performance.

/Reference: QUESTION 213 An application processes test results from a manufacturing facility, then generates and archives quality reports. The application runs on an old, but still supported UNIX system. It was developed by an organization's IT department 10 years ago. While it has not been changed in over five years, the application source code and skills needed to modify it are still available internally. What is this an example of? A. An enterprise application B. Vendor lock-in C. A legacy application D. Service-oriented architecture /Reference: QUESTION 214 In addition to hypervisor hardening, what are the components of a Tier 3 trust tier? A. Guest OS hardening, meeting regulatory requirements B. Guest OS hardening, VM hardening C. Trusted hardware, meeting regulatory requirements D. Trusted hardware, dedicated hardware /Reference: QUESTION 215 A company is considering converting their VDC to IaaS. They realize to do this they will also have to implement several new technologies and create several new functions: service operations and service management. Previously the organization thought they were service oriented because they had a service desk in IT to provide support. Which key area(s) of investment is required for successful transition to IaaS? A. A chargeback/showback method for showing value back to the business B. ITIL-based, standardized service templates C. An expanded help desk that includes more comprehensive reporting D. Service level agreements with the lines of business

/Reference: QUESTION 216 In which situation should you consider implementing hypervisor over-provisioning? A. Tier-2 and Tier-3 applications configured in separate hypervisor clusters B. Performance is a primary and critical consideration C. Multiple applications with the same peak workload times D. A mix of Tier-1 and Tier-2 applications in the same hypervisor cluster /Reference: QUESTION 217 Which is an example of a hypervisor that performs binary translation of sensitive non-virtualized instruction requests, but allows for direct execution of user requests? A. VMware Fusion B. Microsoft Hyper-V C. Citrix XenServer D. VMware Workstation /Reference: QUESTION 218 A small organization plans to migrate a critical application from a traditional, physical infrastructure to the first servers in their VDC. This will be one of several applications the organization plans to migrate over the next 2-3 years. As this is a new VDC implementation, they have not yet realized any of the benefits of a fully virtualized infrastructure. They have retained an experienced consulting service to help them build a detailed migration plan. Which migration strategy will they most likely use and why? A. A phased approach, because they have planning assistance that may be cost sensitive. B. A forklift approach, because they have new servers available and can move small sections of the environment at a time. C. A phased approach, because they can keep the existing systems online in parallel with the new systems. D. A forklift approach, since it is less expensive than a phased approach and existing systems can be maintained online in parallel.

/Reference: QUESTION 219 What does using the cloud for a DR site offer protection against? A. Geo-specific outages B. Cyber security threats C. Non-competitive pricing D. Vendor lock-in /Reference: QUESTION 220 An organization with 25,000 employees moved to a new building that contains a fully virtualized data center with a virtual desktop infrastructure (VDI) instituted for all employees. Each morning between 9:00 and 9:30, the help desk receives a large number of calls concerning slow performance and timeout issues. The IT department determines that the storage array's Fibre Channel drives are the bottleneck. IT proposes purchasing solid state disks (SSDs) to store the entire VDI environment. Unfortunately, their proposal is rejected because of the cost of the drives. Which array feature should be implemented to reduce the quantity of SSDs required to service the high I/O bursts of their VDI environment? A. Deduplication B. Cache Partitioning C. Thin Pools D. Cache Tiering /Reference: QUESTION 221 You are meeting with the CIO to discuss your VDC design. They QUESTION NO: the amount of capital that is being invested in iscsi adapters. They state that, because of the number of adapters required, it is more costeffective to purchase 10 Gigabit Ethernet NICs and use the integrated hypervisor software stack. What effect will this have on the hypervisors? A. Increased CPU load B. Increased amount of I/O C. Decreased amount of I/O

D. Decreased CPU load /Reference: QUESTION 222 An organization plans to migrate a single application from a traditional, physical infrastructure to new servers. These servers are the first of several planned for their VDC. This will be the pilot application for the VDC migration to be completed over the next 5 years. The project is well funded and the VDC has more than enough capacity to support the pilot application. Which migration strategy will they most likely use and why? A. A forklift approach, because they can keep the old systems running in parallel and they have the capacity to run in either the VDC or traditional data center as needed should something go wrong. B. A phased approach, because they can keep the old systems running in parallel and they have the capacity to run in either the VDC or traditional data center as needed should something go wrong. C. A forklift approach, because this allows them to re-purpose the old servers and add those resources to the new VDC immediately. D. A phased approach, because this allows them to re-purpose the old servers and add those resources to the new VDC immediately. /Reference: QUESTION 223 Which product enables storage tiering to be extended to the host platform? A. VFCache B. PowerPath/VE C. VPLEX D. VNX /Reference: QUESTION 224 An application executes code in a "virtual bubble" on the endpoint device. Which application virtualization architecture has been implemented? A. Streaming B. Presentation C. Thin install D. Thick install

/Reference: QUESTION 225 A criminal act is committed by one of the tenants in a multi-tenant environment where customer data also resides. What would be a key design recommendation to minimize risk of exposure to the customer data in this situation? A. Sufficient data isolation B. Physically separate storage C. Physically separate servers D. Restrictive file permissions /Reference: QUESTION 226 Which component within the array is used to create and configure secondary cache in storage arrays? A. SSD B. 15k rpm drives C. DRAM D. NL SAS drives /Reference: QUESTION 227 A company is considering using a public cloud environment for a new HR application. However, they are concerned about the regulatory requirements for their employee data. Several of the countries in which the company operates require that personal information not flow across country borders. What should the company do when it investigates cloud providers? A. Evaluate the cloud provider's architecture to ensure that it meets regulatory requirements for storing, backing up, replicating, and moving data B. Accept the cloud provider's service-level agreement for specific protections regarding employee data C. Review the cloud provider's audit results to verify that it has never moved data across country borders D. Create a one-off contract with the cloud provider to specify that the data will never be moved across country borders

/Reference: QUESTION 228 Which mode of IPSec encrypts the entire IP packet? A. Tunnel B. Transport C. Transparent D. Trusted /Reference: QUESTION 229 When selecting multipathing software, which requirement would favor choosing PowerPath/VE instead of native multipathing? A. Tight integration with, and optimization for, specific models of storage arrays B. A choice of several path selection algorithms for each supported storage array C. A distinct set of base features for each supported hypervisor D. Support for active/passive storage arrays /Reference: QUESTION 230 A hypervisor has been deployed with all virtual machines (VMs) sharing the same storage array LUN for their respective virtual disks. Array-based replication has been implemented for BC/DR. A restore of a single VM is now required. What would happen if you attempt to recover an individual VM? A. All VMs will be reverted. B. Only the restored VM will need to be restarted. C. None of the VMs will be restartable. D. Only the restored VM will be reverted. /Reference:

QUESTION 231 What is the primary mechanism used to secure data between data centers? A. IPSec B. SSL C. TLS D. FC-SP /Reference: QUESTION 232 A company has invested in virtualization for all their non-mission critical applications and many of their mission critical applications. They now want to convert their virtualized silos that are still owned by each line-of-business into a true VDC. What is an important technical capability gained from doing this? A. Reduces provisioning from days to minutes B. Leverages a multi-tenant environment C. Prepares the data center for cloud D. Cuts energy consumption dramatically /Reference: QUESTION 233 The CIO has asked you to review the status of your company's VDC and validate that the implementation has entered the IT-as-a-Service phase. Which capability must be in place prior to transitioning to this phase? A. Zero-touch infrastructure B. Policy-driven automation C. Self-service D. Chargeback /Reference: QUESTION 234 A small company asks you to design a VDC in each of their two data centers, using stretched VLANs and native Fibre Channel extension to interconnect the environments. The data centers are located 30 km apart.

After inquiring with the local service providers, you find that only two strands of dark fiber are available. Which distance networking technology is the most appropriate? A. CWDM B. DWDM C. Dark Fiber D. MPLS /Reference: QUESTION 235 What are the four key areas reported on a scorecard used to compare the assessments of internal IT to Service Providers? A. Security, Privacy, Service Levels, Audit B. Security, Compliance, Privacy, Service Levels C. Security, Compliance, Cost, and Business Stability D. Security, Compliance, Governance, and Risk /Reference: QUESTION 236 As part of a VDC design, you configured a number of virtual machine OS clusters. Each cluster must have a non-routable network to accommodate system heartbeats. However, some of the clusters house sensitive data that should not be accessible by any other cluster. For fault tolerance purposes, the cluster nodes will never be hosted on the same hypervisor. How should you instruct the administrator to configure the Private VLANs? A. Configure the Primary and Community VLANs on both the hypervisor virtual switches and access layer switches. B. Configure the Primary and Community VLANs on the hypervisor virtual switches. C. Configure the Primary and Isolated VLANs on both the hypervisor virtual switches and access layer switches. D. Configure the Primary and Isolated VLANs on the hypervisor virtual switches. /Reference: QUESTION 237 An application executes code on a remote host while receiving keyboard and mouse input from the endpoint.

Which application virtualization architecture has been implemented? A. Presentation B. Thin install C. Streaming D. Thick install /Reference: QUESTION 238 Refer to the exhibit. A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel switches, which are connected to two separate SAN fabrics. For ease of management, each fabric can only be configured with a single VSAN. How should you configure this environment to meet the requirements? A. Configure the blade server switches in NPV mode. Configure the SAN core switches in NPIV mode. B. Configure the blade server switches in NPIV mode. Configure the SAN core switches in NPV mode. C. Configure the blade server switches in NPV mode. Configure the storage edge switches in NPIV mode. D. Configure the blade server switches in NPIV mode. Configure the storage edge switches in NPV mode.

/Reference: QUESTION 239 Refer to the exhibit. You are expanding the compute layer of a VDC, and need to add more access layer switches to provide connectivity to the hypervisors. However, there are no available ports on the two aggregation layer switches to accommodate the uplink connections from the new access layer switches, and there is no available funding to purchase additional aggregation layer switches. The active uplinks are operating at 95% of capacity. What can be done to expand the access layer and not impact the performance of the existing environment? A. Aggregate the aggregation layer switches into a virtual switch. Reduce the number of uplink connections from each access layer switch by 50%. B. Aggregate the access layer switches into a virtual switch. Reduce the number of uplink connections to each aggregation layer switch by 50%. C. Aggregate the datacenter core switches. Reduce the number of uplink connections from each access layer switch by 50%. D. Aggregate the datacenter core switches. Reduce the number of uplink connections from each aggregation layer switch by 50%. /Reference: QUESTION 240 Refer to the exhibit.

A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel switches, which are connected to two separate SAN fabrics. For ease of management, each fabric can only be configured with two VSANs. Each blade server chassis must connect to both VSANs. How should you configure this environment to meet the requirements? A. Configure the blade server switches in NPV mode. Configure the SAN core switches in NPIV mode. B. Configure the blade server switches in NPIV mode. Configure the SAN core switches in NPV mode. C. Configure the blade server switches in NPV mode. Configure the storage edge switches in NPIV mode. D. Configure the blade server switches in NPIV mode. Configure the storage edge switches in NPV mode. /Reference: QUESTION 241 Refer to the exhibit.

You are expanding the compute layer of a VDC, and need to add more access layer switches to provide connectivity to the hypervisors. However, there are no available ports on the two aggregation layer switches to accommodate the uplink connections from the new access layer switches, and all uplinks are active and operating at 95% of capacity. Your design must satisfy all of the following requirements: - Expand the access layer - Maintain the same configuration as the existing environment - Maintain the performance of the existing environment The CIO has authorized you to purchase additional aggregation layer switches if needed. What should you recommend? A. Purchase two new aggregation layer switches. Aggregate them into a virtual switch. Connect the new access layer switches to them. B. Purchase one new aggregation layer switch. Connect the new access layer switches to it. C. Purchase one new aggregation layer switch. Aggregate it with the existing switches. Redistribute all access layer switches across all aggregation layer switches. D. Purchase two new aggregation layer switches. Connect the new access layer switches to them. /Reference: QUESTION 242 A company has invested in virtualization for all their non-mission critical applications and many mission critical applications. The company now wants to convert their virtualized silos that are still owned by each line-of business into a true VDC.

What is an important business outcome from this? A. Reporting for management and chargeback B. Workload right-sourcing C. Dramatic reduction in energy consumption D. Reduction in workforce /Reference: QUESTION 243 What is IT's approach to addressing performance issues during the IT-as-a-Service phase of the Cloud Maturity Model? A. Selective B. Investigative C. Proactive D. Reactive /Reference: QUESTION 244 A company has finished the design for their VDC. They realize that they should also include a few design considerations to prepare them for cloud. What is a key business reason for the company to build a cloud-based service? A. Speed and agility B. Cost savings C. Multi-tenancy D. Chargeback /Reference: QUESTION 245 An organization seeks to solve a business problem by licensing software from a supplier. The supplier contract stipulates that the software will only be supported if it runs on server platforms also provided by that supplier. What is this an example of? A. A virtual appliance

B. A legacy application C. Enterprise Application Integration D. Vendor lock-in /Reference: QUESTION 246 An application is used by nearly all the employees in an organization to place and track orders, provide customer support, maintain and report on financials, and track product defects. The application was written by the organization's IT Department 10 years ago. The IT staff actively maintains it and adds features on a regular basis. What is this an example of? A. Vendor lock-in B. A legacy application C. An enterprise application D. Service-oriented architecture /Reference: QUESTION 247 An application is designed with reusable modules that can be called by other applications as needed. What is this an example of? A. EAI via Mesh B. EAI C. SOA D. ESB /Reference: QUESTION 248 An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan? A. Immediate cost savings B. Reduced impact on network infrastructure C. No change in desktop management methods and tools

D. Standardization of desktop environments /Reference: QUESTION 249 Which application virtualization architectures usually require the use of a packager to prepare the application for deployment? A. Streaming, presentation B. Thick install, thin install C. Presentation, thick install D. Thin install, streaming /Reference: QUESTION 250 What is a benefit of client-side application virtualization? A. Simplification and standardization of patch management is achieved B. Reduced overall complexity in the application and desktop environment is achieved C. All applications can be virtualized, providing flexibility and management control of client-side applications D. The same management tools used for standard application management can be used to manage virtualized client-side applications /Reference: QUESTION 251 An organization uses Linux desktops, laptops, and servers for their primary infrastructure. The company has a business need to run a mission critical application that is only available for the Microsoft Windows operating system. This application and associated data need to be available to 10-12 users. Which solution would best meet their needs, and why? A. VDI, because it provides better fault tolerance B. VDI, because it offers a lower cost per user than C. RDS, because it offers true user segmentation D. RDS, because it provides better fault tolerance

/Reference: QUESTION 252 Which represents the contractual agreement between the service provider and the business? A. Terms of service B. End-user license agreement C. Non-binding user contract D. Service-level agreement /Reference: QUESTION 253 What are elements of governance? A. Adherence to regulations, industry-aligned B. Change management, configuration management C. Policy definition, separation of duties D. Change management, adherence to regulations /Reference: QUESTION 254 What should be the guiding principle of data ownership when using a service provider? A. The business only owns the data that they store on the system B. The service provider owns all the data that the business places on its service C. The business owns the data no matter where it is placed D. The business shares ownership with the service provider depending on the type of data /Reference: QUESTION 255 The Patriot Act is a law that, under special circumstances, allows warrantless search and seizure of information. Which environment presents the highest risk to corporate information given the Patriot Act? A. Private VDC B. Virtualized service provider

C. Multi-tenant public cloud D. Multi-tenant private cloud /Reference: QUESTION 256 This is the correct order of steps in the recommended risk assessment process? 1 Quick risk (L/M/H) check 2 Mitigation 3 Full risk assessment 4 Deploy 5 Evaluate A. True B. False /Reference: QUESTION 257 Why is there a need for a full risk assessment if a quick risk assessment has already been performed? A. A full assessment can help find operational exposures after implementation B. A full assessment is usually conducted by a third party to get an unbiased version of the risk profile C. A full assessment details all the exposures in high value/high risk assets D. A full assessment is always executed by internal auditing /Reference: QUESTION 258 A company has asked you to develop a framework for assuring trust in the VDC. An assessment methodology is to be part of the framework. Where should you look first for assessment criteria and methodologies? A. Company mandate documents B. International standards bodies

C. Internal IT department D. Industry best practices /Reference: QUESTION 259 What could delay a virtualization or cloud initiative? A. Failed audits B. Compliance concerns C. Risk assessments D. Improper asset valuations /Reference: QUESTION 260 What is (are) included in internal and external attestation? A. SSAE 16 assessment B. Internal and external audits C. 27002 risk assessment D. IT and service provider audits /Reference: QUESTION 261 An administrator has implemented a hypervisor cluster with high availability enabled. They are expecting that if any of the physical servers fail, the virtual servers will be transparently migrated to other hypervisors in the cluster. When the first hypervisor failure occurs, all of the hosted virtual servers appear offline to users as they are moved to another host. Which feature should the administrator have implemented to achieve their goal? A. Online Migration B. Load Balancing C. Resource Pooling D. Fault Tolerance

/Reference: QUESTION 262 A company wants to ensure that their critical application can fail over to another physical host within the cluster without disruption. Which feature should be utilized? A. Online Migration B. High Availability C. Fault Tolerance D. Resource Pooling /Reference: QUESTION 263 Applications of different criticality have been deployed on a collection of virtual servers. In an effort to save cost, a business continuity plan has been devised to provide half the number of physical servers to host the virtual machines at the disaster recovery site. What is a likely outcome if a disaster were to occur at the primary site? A. Application performance would be degraded B. Data would not be available to applications C. Application URLs could not be resolved D. Application data would be lost /Reference: QUESTION 264 You require low processing overhead on the hypervisor from backup. Which backup solution(s) should you consider? A. Storage-based backup only B. VM-based backup and image-based backup C. Image-based backup and storage-based backup D. VM-based backup only

/Reference: QUESTION 265 A company is planning the backup strategy to be used after migrating separate physical systems into a consolidated virtual machine environment. They are considering migrating their existing traditional backup model into this virtual environment. Where do the backup data collection operations occur? A. On the SAN switch B. On a separate host C. On the virtual machine D. On the storage array /Reference: QUESTION 266 You are planning to deploy a virtualized application in a high-availability configuration with automated VM restart on a hypervisor cluster. Your sizing estimates show that peak workload conditions will saturate the processing power of five hypervisor servers. To meet the SLA, N+1 redundancy is required on the hypervisor servers, with server utilization not to exceed 85% under any conditions. What is the minimum number of nodes that you should configure in the hypervisor cluster? A. 5 B. 6 C. 7 D. 8 /Reference: QUESTION 267 In which situation should you consider implementing a non-over-provisioned hypervisor design? A. A high degree of server consolidation is a critical goal B. Tier-1 applications are not virtualized C. Multiple applications with peak workload times that do not overlap D. Applications requiring guaranteed performance and availability

/Reference: QUESTION 268 In a non-virtualized environment, what is the primary problem with attempting consolidation by deploying multiple applications per server? A. Incompatibility between drivers and libraries across applications B. Increased risk of security breaches C. Compromised availability of applications D. Underutilized resources and increased server sprawl /Reference: QUESTION 269 What is a feature of the Cisco Unified Computing System (UCS)? A. Stateless hardware identity B. CMDB maintenance utilities C. Layer 3 routing optimization D. Fabric reconfiguration services /Reference: QUESTION 270 A VDC environment will be deployed with several virtual machines (VMs). The datastores for the VMs will be hosted on a storage array. Array-based local replication has been proposed as the BC/DR solution. Restore granularity will be at the individual VM level. What is the simplest data layout that would meet this requirement? A. A single large LUN for all virtual disks B. An individual LUN for all virtual disks of each VM C. All virtual disks on the boot LUN of the hypervisor D. An individual LUN for each virtual disk /Reference: QUESTION 271 A tenant of your service provider/hosting company requires that their data be completely isolated from other tenant data.

Which implementation would best meet the tenant's requirement? A. Separate ports with dedicated LUNs B. Separate ports with dedicated pools C. Shared ports with dedicated pools D. Shared pools with separate LUNs /Reference: QUESTION 272 You are using virtual (thin) provisioning to reduce the amount of physical storage that is initially required for an implementation. On the storage array, you configure a pool that contains 10 TB of physical storage and then define several LUNs that total 50 TB. These LUNs are presented to several hypervisor clusters. Virtual Machines are subsequently created using a thick format for the virtual hard disks. What is the maximum capacity that can be allocated for VM hard disks in this configuration? A. 10 TB B. 50 TB C. 60 TB D. 100 TB /Reference: QUESTION 273 As part of a VDC deployment, you are examining the existing storage configurations. On one storage system, you discover over fifty storage pools. The pools contain a single type of drive (SSD, SAS or NL SAS), but many of them contain only a few drives and share the same RAID configuration. The Storage Administrator admits that they have been creating separate pools for each application because they did not want the applications contending for the disks. As part of the design, you propose to consolidate the existing pools into larger pools of mixed drive types and RAID configurations. What technology will you need to implement to utilize the new pool design? A. Virtual Provisioning B. Caching Tier C. Storage Virtualization D. Storage Tiering

/Reference: QUESTION 274 A company has five heterogeneous storage arrays that are all connected to a common SAN environment. They want to offer storage to their end users, masking the identity of the target storage so the users cannot tell which storage system they are using. Which virtualization technique would work in this environment? A. Distributed virtualization B. Block-level storage virtualization C. Hadoop HDFS D. File-level storage virtualization /Reference: QUESTION 275 A VDC administrator needs to create a virtual distributed file system. Which file storage protocol would best meet their requirement? A. isns B. pnfs C. NFS D. NTFS /Reference: QUESTION 276 Refer to the exhibit. You are designing the storage environment for a new VDC. The applications have been classified into three groups, as shown in the exhibit. You have chosen to create a storage pool for each application group. How should you configure the storage for each pool to meet the performance and capacity requirements, while minimizing costs?

A. Pool 1 - SSD and SAS drives with storage tiering Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering Pool 3 - SAS and NL SAS drives with storage tiering and cache tiering B. Pool 1 - SSD and SAS drives with storage tiering Pool 2 - SSD and NL SAS drives with storage tiering Pool 3 - SAS drives with cache tiering C. Pool 1 - SSD and SAS drives with storage tiering Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering Pool 3 - NL SAS drives with cache tiering D. Pool 1 - SSD and SAS drives with storage tiering and cache tiering Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering Pool 3 - NL SAS drives with cache tiering /Reference: QUESTION 277 You are meeting with the CIO to discuss your VDC design. They QUESTION NO: the amount of capital that is being invested in iscsi adapters. They state that, because of the number of adapters required, it is more costeffective to purchase 10 Gigabit Ethernet NICs and use the integrated hypervisor software stack. What effect will this have on the design? A. Larger form-factor hypervisors will be required B. Fewer hypervisors will be required C. More hypervisors will be required D. Smaller form-factor hypervisors will be required /Reference: QUESTION 278 You have decided to pursue a "scale-out" approach instead of a "scale-up" approach to storage. What is the fundamental tradeoff that you have made? A. Complexity of management versus limited scalability B. Improved availability versus unlimited scalability C. Higher application throughput versus degraded response time D. Ease of storage tiering versus unpredictable performance /Reference: QUESTION 279

Which is a scale-out NAS solution that can distribute data over multiple nodes for resiliency? A. EMC VPLEX B. EMC Symmetrix VMAX C. EMC Isilon D. EMC VNX /Reference: QUESTION 280 A small college asks you to design a VDC that will span four data centers located within a campus environment. They want to have the VLANs stretched across all four locations. They also require stretched clusters spanning pairs of data centers. Which distance networking technology would most cost effectively address their requirements? A. Dark Fiber B. MPLS C. CWDM D. DWDM /Reference: QUESTION 281 Refer to the exhibit.

A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel switches, which are connected to two separate SAN fabrics. All of the blade chassis FC switches are configured in NPV mode, and the SAN core switches are configured in NPIV mode. Where can the administrator make zoning changes? A. SAN core or storage edge B. Blade chassis or SAN core C. Blade chassis only D. SAN core only /Reference: QUESTION 282 Refer to the exhibit. You are configuring the SAN environment of a VDC using switches with a Switch on a Chip architecture. A high I/O hypervisor is connected to Port 1 on the switch. Where should you make the ISL connection to provide the lowest latency? A. Port 4 B. Port 5 C. Port 8 D. Port 20 /Reference: QUESTION 283 You are designing a VDC that uses converged networking to support both LAN and SAN traffic. FCoE is used exclusively for storage access. The access and aggregation layer switches that have been chosen support both

10 and 40 Gigabit Ethernet and Data Center Bridging. You have determined that the traffic between the access layer and aggregation layer switches is: - Average SAN (FCoE) 60 Gb/s - Average LAN (Ethernet) 100 Gb/s - Burst SAN (FCoE) 80 Gb/s - Burst LAN (Ethernet) 130 Gb/s The port channeling technology you are using requires that channels be configured with even numbers of links. Performance cannot be degraded due to a failure of a single switch. Which port configuration would support the average and burst traffic between the access and aggregation layer switches? A. Four 40 Gb/s ports and six 10 Gb/s ports B. Four 40 Gb/s ports and eight 10 Gb/s ports C. Six 40 Gb/s ports D. Six 40 Gb/s ports and two 10 Gb/s ports /Reference: QUESTION 284 What is a key advantage of Cisco SME relative to other encryption products? A. Provides a data encryption solution for disk or tape storage B. Can offload encryption processing to hosts C. Can offload encryption processing to both hosts and storage arrays D. Can leverage RSA Key Manager for key management /Reference: QUESTION 285 Which mode of IPSec encrypts only the payload of the IP packet? A. Trusted B. Transparent C. Transport D. Tunnel

/Reference: : QUESTION 286 Which cloud deployment model would most likely be implemented in an "on demand" or "pay as you go" environment? A. Private B. Hybrid C. Public D. Community /Reference: QUESTION 287 What is typically included with an IaaS bundle featuring compute, storage, and networking? A. Encryption technology B. Management tools C. Integrated development environment D. Storage virtualization /Reference: QUESTION 288 A company is considering converting their VDC to IaaS. They realize to do this they will also have to implement several new technologies and create several new functions: service operations and service management. Previously the organization thought they were service oriented because they had a service desk in IT to provide support. Which key area(s) of investment is required for successful transition to IaaS? A. ITIL-based, standardized service templates B. Service level agreements with the lines of business C. An expanded help desk that includes more comprehensive reporting D. Dynamic capacity planning and centralized management /Reference: QUESTION 289

A software manufacturer is planning to convert their VDC to IaaS. As part of the transformation to IaaS the company realizes they have to make several organizational changes. Which is the most likely starting point for their organizational transformation? A. Cross train IT operations and delivery personnel B. Create new service based roles in the lines of business C. Align GRC and Trust requirements D. Obtain executive and organizational buy-in /Reference: http://www.gratisexam.com/