click below
click below
Normal Size Small Size show me how
ISM V5
| Question | Answer |
|---|---|
| sub-LUN tiering | Improved Performance |
| Backup operations | Backup server |
| FC-1 layer | transmission words Primitive signals Link Initialization |
| Write split operation | Production volume |
| Block-based storage | Fixed blocks of 512 bytes each |
| Migrate | Software as a Service |
| 4 coding segments | 4 |
| Continuity solution | Maintains availability |
| Content-based | Machine learning |
| fully functional SAN | ISCSI |
| rotation latency | Speed of the Spindle |
| VSANs | By providing isolation over a shared infrastructure |
| Addition of infrastructure | Scalability |
| Why should the replica be consistent with its source? | Usability |
| Virtual tape library | Legacy backup software can be used without additional modules or changes |
| Monitoring availability | Identify component failures that may lead to service unavailability |
| data in cache | Vaulting |
| Defense in depth | Provides additional time for organizations to detect and respond to an attack |
| “Sequence” | Contiguous |
| dynamic disk sparing | Assuming the identity |
| OSI | Transport |
| Lossless Ethernet network | Data center bridging |
| Middleware | Platform as a service |
| intelligent storage system controllers | SAS |
| MapReduce | HDFS |
| Mobile Device Management | Authenticate the device that requests access |
| SLAs | Operation management |
| Storing back up data | Source-based |
| training and testing | Supervised Learning |
| random data access | Virtual tape library |
| Malware on end-user’s computer | Keystroke logging |
| NDMP client | Instructs the NAS head |
| link aggregation | Provides a heighten throughput than a single interswitch link can provide |
| unified storage systems | Common storage pool |
| 5G technology | Higher connectivity density |
| Automation of sensors and devices | Internet of Things |
| Software-defined storage platform | ViPR Controller |
| Automate the operations management | Mitigates operation management risks |
| Port 2 | 71.6% |
| Resource-oriented architecture | REST |
| (SMB) | Common Internet File System (CIFS) |
| Raid 1 | Two write I/Os |
| VM storage migration solution | Management of capacity |
| On demand | Image-based backup |
| File and object | PowerScale |
| Migrating to a modern data center | Reduce Management complexity |
| 200 GB | 400 GB |
| Availability of Port 5 | 91.6% or 95.8% |
| Incident in a storage infrastructure | Functionality of the system |
| Cloning a VM | Saves time when creating multiple copies of a VM |
| Minor difference between two documents | Variable-length segment |
| Do-It-Yourself | Products and services |
| File-level virilization | Non-disruptive |
| Parity-based | Reduces the Capacity required to protect the data |
| inherent source-based deduplication | Avamar |
| Point of creation | Edge computing |
| What accurately describes an object-based storage device (OSD)? | Objects exist at the same level in the address space |
| PIT snapshots of the VM | Image-based |
| Hardening process | Disable Unnecessary application features or services |
| Increasing the number of FC switches | Reduces switch ports available for Node connectivity |
| Windows clients | CIFS |
| Sends metadata and tracking information | Backup agent |
| One active ISL | Full mesh |
| Which IDPS technique uses a database that contains known attack patterns | Signature-based |
| Repurpose existing infrastructure components | Brownfield |
| REST API interface | S3 |
| “Variability” | Diversity Or Importance |
| Connectrix | DS-6600B |
| What is an accurate statement about Storage Class Memory (SCM)? | SCM can be addressed at the bit or word level |
| Journal space | How far back |
| amount of space configured for the journal | Amount of data |
| Multi-site remote replication solution | Near-zero RPO |
| IP-based network infrastructure | Extend the network over long distances |
| Long backup window | Source-based with variable-length deduplication |
| What triggers an appropriate workflow upon receiving a service provisioning or management request? | Orchestrated operations |
| Policy engine | Moves the appropriate data into archive storage automatically |
| parameters define information availability in a modern data center environment | Reliability Accessibility Timeliness |
| VMware | VRealize Orchestrator |
| What is the MTBF of Port 5 | 38 hours |
| Secure the connection between the data center and cloud while performing data backup and replication | Identity and Access management |
| What statement describes machine learning? | Applies an algorithm |
| Connects SSD drives to the storage array controller | NVMe/TCP |
| Which security mechanism ensures secure access to internal assets while enabling Internet-based access to selected resources? | Demilitarized zone |
| Scale-out NAS | Stripes data |
| Business continuity solutions | Eliminate the time required |
| governance | Determines strategy |
| What is a function of a continuous data protection (CDP) appliance? | Splits each write |
| Cyber recovery | Isolate copies of critical data to ensure that an uncompromising copy always exists |
| Passive attack | Access is obtained Or Privacy is compromised |
| System-based replication | Snapshots are immediately accessible |
| Storage controller | Ability to pool and abstract |
| Infrastructure discovery | Creates an inventory |
| “Recovery-in-place” | Disk-based backup target |
| Continuous replication | Reduce the RPO |
| OpenID | Eliminates the need to deploy a Separate authentication system |
| Traffic monitoring | 1. Two active 2. But not both |
| Manage their data | Leveraging existing data |
| Abstracts and provides a common view | Global namespace |
| Single organization having multiple consumers | Private Cloud |
| Protect the data | Encryption Or Encryption |
| Intelligent storage systems | Effectively store and manage information Across data centers |
| Security management task | LUN masking to restrict hosts |
| LUN masking to restrict hosts | Security management |
| FCoE environment | Jumbo frames for optimal performance |
| ISCSI connectivity | ISCSI initiator |
| (ISL) | Core-edge |
| Moving data between storage systems | Data migration |
| Granularity | Incremental |
| Consume compute, network, and storage resources through self-service portal | Platform as a Service |
| Which management monitoring parameter involves examining the amount of infrastructure resources used? | Configuration |
| Advantage of performing incremental backups | Storage capacity needed for backups is Significantly reduced |
| Pre integrated systems | DCaaS solution |
| (VM) clone | Separate network identity |
| Purpose-build | File sharing across Windows and Linux |
| Maintains the catalog | Backup server |
| Metadata service | Object IDs |
| Which action takes place during the login phase in an FCoE SAN? | VN_Ports obtain FC addresses |
| Enables consumers to use cloud services on Heterogeneous thin or think client platforms | Broad network access |
| Multi-tenancy and abstracts the loacation | Resource pooling |
| Ticket-based | Kerberos |
| Hypervisor-based | Write splitter is embedded in the hypervisor |
| (DRaaS) | Avoid maintaining a complete set |
| Up-to-date | SW-RSCN |
| Rolled back | VM snapshot |
| Image-based backup of virtual machines (VMs) | Backup processing is offloaded from the hypervisor |
| FCoE switch | Ethernet Bridge |
| VNX array-based local replication software that creates a full volume mirror of the source | SnapView Clone |
| What does an area ID represent | Group of switch ports |
| Three-way NDMP backup | Backup device can be shared among multiple NAS heads |
| recovery point objective | Frequency of the backup |
| Statistically different from normal events | Anomaly-based |
| Flow control mechanism | Ports agree on the number of buffers available during port login |
| VSAN trunking | Allows network traffic from multiple VSANs to traverse a single interswitch link |
| Discover Suspicious event trends | Dell InTrust |
| Which components facilitate communication between gateways | Compute system with iSCSI ports and the storage system with only FC ports |
| Continuous data protection (CDP) remote replication solution | Appliances are present at both the source and remote sites |
| Malware protection | Protect applications and the OS against Trojan horse programs |
| What is used to track where objects and metadata are stored in an OSD system? | Object storage database |
| email archiving | Increase the mailbox space |
| A company has virtualized their data center and wants to deploy a recovery-in-place backup approach. | Eliminates the need to transfer the image from the backup device to the primary storage before it is restarted |
| Limited budget | Deploy the less critical applications on a public cloud |
| Fixed content | Content addressed storage |
| Converged Network Adapter (CNA) | Physical adaptor that provides the functionality of both a standard NIC and an FC HBA in a single device |
| Information-centric storage architecture | Storage capacity can be increased dynamically without impacting information availability. |
| N_Port virtualization (NPV) | Reduces the number of domain IDs in a fabric |
| Hardware RAID implementation | Uses a specialized hardware controller installed on a storage array |
| Availability management task | Designing a new replication solution |
| (CHAP) control | Secret code Or Secret code |
| Orchestration layer | Provides workflows |
| Dynamically provisioning and releasing resources | Rapid elasticity |
| VMAX3 | SRDF |
| Software-defined architecture | Centralized monitoring and administration |
| (SAN) in a data center | Enables data replication between storage systems across different locations |
| Shared pool | Supports a single RAID protection level |
| OAuth | Allows a client to access protected resources from a resource server on behalf of a resource owner |
| MTTR of Port 4 | 2 hours |
| What enables a NAS device to provide improved performance compared to a general purpose file server? | Specialized for file serving |
| which functionality provides a framework for the allocation of bandwidth to different network traffic classes | Enhanced transmission selection |
| risk assessment | Determine the likelihood of a risk |
| Which NAS implementation requires separate management of the NAS head and the storage? | Gateway |
| What is a benefit when a node is added to a scale-out NAS cluster? | Increased cluster performance |
| Software RAID implementation | Uses CPU cycles |
| 4200 | 11200 |
| Application virtualization | Avoids conflicts between different versions of the same application |
| Goal of a business continuity solution | Ensure information availability |
| N_Port ID virtualization (NPIV) | A single physical N_Port to obtain multiple FC addresses |
| Streaming technique | Downloaded in portions |
| Copy of data | Ensure disaster recovery |
| (VM) storage migration | Balances storage utilization by redistributing VMs |
| Scans primary storage to find the files that meet the archiving policy | Archive agent |
| Process login | Exchange ULP-related parameters between two N_Ports |
| Global addressing | Uniform Resource Identifier |
| scale-out storage architecture | Maximize its capacity |
| Login assigns an FC address to a node in an FC SAN environment | FLOGI |
| Virtual desktop infrastructure | Dedicated desktop |
| Consistent replica | Dependent write I/O |
| 8400 | 16800 |
| What is considered a CI | Username |
| remote desktop | Multiple users |
| A hybrid cloud | Portability |
| under attack | Authorized users |
| FC-4 layer | Interfaces and maps |
| Measured service characteristic | Control and optimization |
| FC-AL | Reserves on address |
| (SDS) controller | Third-party |
| “X”, “Y”, and “Z” | IP Network FC SAN NAS Gateway |
| Pre-defined storage services | Service catalog |