What is a function of the orchestration layer in a data center infrastructure?
A. Provides workflows for automated execution of management tasks
B. Aggregates physical infrastructure components into resource pools
C. Measures the consumption of IT resources by various services
D. Decouples an operating environment from the underlying hardware
What is an accurate statement about three-way NDMP backup in a NAS environment?
A. Backup data is sent directly from NAS to the backup device
B. Backup data is sent to the backup device through the application servers
C. A dedicated backup device is required for each NAS
D. All NAS systems should have the same operating environment
What is an accurate statement about full volume replication?
A. Target device is at least as large as the source device
B. Target device requires only a fraction of the space used by the source device
C. Target device is accessible only after the replication session starts
D. Target and source devices should be on different storage arrays
What is an accurate statement about VSAN trunking?
A. Allows network traffic from multiple VSANs to traverse a single interswitch link
B. Enables an F_Port to transfer multiple VSAN traffic over a single port channel
C. Provides VSAN IDs to F_Ports to include them in the VSANs
D. Forwards FC frames between F_Ports that belong to the same VSAN
What is a benefit of configuring EX_Ports on each Fibre Channel over IP (FCIP) gateway in an FCIP tunnel implementation?
A. Enables FC-FC routing through the FCIP tunnel without merging the fabrics
B. Merges the fabrics at either end of the FCIP tunnel to create a single large fabric
C. Transfers VSAN tagged traffic over the FCIP tunnel without FC protocol overhead
D. Creates eight virtual FC links on the FCIP tunnel that can be paused and restarted independently
What is signified by the “variety” characteristic of big data?
A. Data is generated in different formats by numerous sources
B. Meaning of the data changes constantly
C. Varying data quality affects its reliability and accuracy
D. Data change rate affects its timely analysis
What is an accurate statement about OAuth security control?
A. Allows a client to access protected resources from a resource server on behalf of a resource owner
B. Provides strong authentication for client-server applications by using secret-key cryptography
C. Enables initiators and targets to authenticate each other by using a shared secret code
D. Enables an organization to use authentication services from an identity provider
What is an example of an active attack on an IT infrastructure?
A. Attempt to modify information for malicious purposes
B. Attempt to copy the data from the storage system
C. Attempt to gain unauthorized access into the system
D. Attempt to gain access to the data in transit