Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What is an accurate description about Dell EMC VxBlock system?

A.

CI solution that combines compute, virtualization, network, software defined storage into an engineered solution.

B.

HCI solution that combines compute, virtualization, network, software-defined storage into an engineered solution.

C.

CI solution that combines compute, virtualization, network, storage into an engineered solution.

D.

HCI solution that combines compute, virtualization, network, and storage optimized for VMware VSAN

Full Access
Question # 5

Which method automatically allocates a large capacity secondary cache using SSD and SCM?

A.

Cache provisioning

B.

Volatile cache

C.

Cache tiering

D.

Non-volatile cache

Full Access
Question # 6

Which performance feature does an intelligent storage system provide?

A.

Automated storage tiering

B.

RAID 4 data protection

C.

End-to-end NVMe/IB storage connectivity

D.

End-to-end SAS storage connectivity

Full Access
Question # 7

Which type of data protection is used to move primary data to lower cost storage and helps to enforce compliance requirement?

A.

Archive

B.

Deduplication

C.

Backup

D.

Replication

Full Access
Question # 8

Which type of interface connects SSD drives to the storage array controller?

A.

NVMe

B.

NVMe/IB

C.

NVMe-oF

D.

NVMe/TCP

Full Access
Question # 9

An organization wants to replicate data over a public network to a cloud.

Which security control mechanism helps to secure the data during replication?

A.

LUN masking

B.

Data shredding

C.

Data compression

D.

Encryption

Full Access
Question # 10

What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?

A.

Utilizes preconfigured preinstalled and prepackaged vendor ready solutions

B.

Combines the datacenter components into a single standalone computing platform managed by software

C.

Utilizes products and services from the vendors that provide specific functions with more configuration options

D.

Combines datacenter components into a distributed infrastructure platform managed by software

Full Access
Question # 11

Refer to the Exhibit:

What type of data protection is represented?

A.

Deduplication

B.

Migration

C.

Archiving

D.

Backup

Full Access
Question # 12

Which uses an orchestrated approval process to assist decision making using an agile methodology?

A.

Configuration management

B.

Security management

C.

Change management

D.

Performance management

Full Access
Question # 13

Which standard provides FCoE with a lossless Ethernet network?

A.

SCSI Remote Direct Memory Access

B.

Data Center Bridging

C.

Data Center Bridging Exchange Protocol

D.

InfiniBand

Full Access
Question # 14

An organization is interested in a cloud service that provides middleware, development tools, and database management systems for application development and deployment.

Which cloud service model meets these requirements?

A.

Software as a Service

B.

Infrastructure as a Service

C.

Platform as a Service

D.

Application as a Service

Full Access
Question # 15

What is a function of the metadata service in an object-based storage device (OSD)?

A.

Generates the file system namespace from the file contents.

B.

Manages both physical and logical disks on which the user data is stored.

C.

Manages the storage space for all remote clients.

D.

Maintains the object IDs and file system namespace mappings.

Full Access
Question # 16

What kind of ML explicitly requires splitting the data into training and testing datasets before running an algorithm against that data?

A.

Deep Learning

B.

Unsupervised Learning

C.

Reinforcement Learning

D.

Supervised Learning

Full Access
Question # 17

What is a function of VM hardening?

A.

Isolate VM storage media to ensure data validity

B.

Isolate VM storage media to prevent data leaks

C.

Change the default configuration of the VM to enhance security

D.

Implement access control list across the VMs to enhance security

Full Access
Question # 18

What set of components are part of a block-based storage array controller?

A.

Front-end ports

Cache

Link Control Cards

B.

Front-end ports

Cache

C.

Front-end ports

Back-end ports

Cache

D.

Front-end ports

Back-end-ports

Cache

Link Control Cards

Full Access
Question # 19

Which security mechanism ensures secure access to internal assets while enabling Internet-based access to selected resources?

A.

Virtual local area network

B.

Demilitarized zone

C.

Virtual private network

D.

Discovery domain

Full Access
Question # 20

How should vulnerabilities be managed in a data center environment? (Verify the Correct answer from Associate - Information Storage and Management Study Manual from dellemc.com)

A.

Minimize the attack surfaces and maximize the work factors

B.

Minimize the attack surfaces and minimize the work factors

C.

Maximize the attack surfaces and minimize the attack vector

D.

Maximize the attack surfaces and maximize the attack vector

Full Access
Question # 21

Which data protection solution provides the ability to select a backup technology based on demand?

A.

Agent-Based backup

B.

Cloud-Based backup

C.

File-Based backup

D.

Image-Based backup

Full Access