You are on page 1of 30

1

2
3
4
5
6
7
8
9
10
11
12
13
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
46
47
48
49
50

Question
Which cloud service management process maintains information
Why should data center elements be monitored?
What is a primary goal of incident management?
Which product provides an application virtualization solution?
Which is a function of user access management software?
What should be included in a Cloud Service Termination Agreemen
A consumer needs to determine their scope of adoption of cloud s
What are key cost factors involved while using cloud services from
What is a characteristic of channel technology?
You are asked to create four VLANs on a newly installed physical
Which type of attack could enable the installation of a rogue hyper
What makes it possible to store virtual machine files on a NAS dev
Which cloud service model encompasses the complete cloud compu
Which data center management activity involves eliminating single
In a virtualized data center, guest operating system kernels were
Which statement is true about User State virtualization?
An organization needs to migrate all of their applications at the
Which Fibre Channel (FC) port type would only be used to connect
What is a benefit of cloud computing?
What is a key advantage of pointer-based virtual replication over p
Which parameter determines the maximum amount of CPU and memo
Which backup solution supports only source-based data deduplicat
What is a best practice for selecting drives for a thin pool?
Which type of software is capable of creating cloud services?
How does a domain name server balance client traffic across a clus
What are the three building blocks of automated storage tiering?
What is a limitation of using a backup agent on a hypervisor when
What is enabled by N_Port ID Virtualization (NPIV)?
Which challenges do RAID technologies address?
What are primary considerations related to performance when migr
Which process categorizes resource pools based on performance a
An organization has decided to deploy desktop virtualization using
An administrator is concerned about Denial of Service attacks on th
Which report should an administrator use to know both historic and
What enables a virtual machine to directly access LUNs in a stora
How is the term Recovery Point Objective (RPO) defined?
What is a benefit of automated site failover capability in a data c
Which type of expense is most likely to increase as an organizatio
Which mechanism enables a LUN with higher capacity than is physically allocated to be p
Which RAID type uses a dedicated parity disk?
An organization plans to migrate an application to the cloud. In w
Which statement is true about a Trunk link in a VLAN environment?
Which address is used to statically identify a physical port in a F
An administrator of a virtualized data center is particularly conce
What is a limitation of a server-based Intrusion Detection System (
What is the basis for determining the size of the virtual machine sw
What is a benefit of data striping in RAID?

51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98

Which remote replication mode provides a near-zero recovery point


Which EMC backup and recovery product provides source-based da
Which EMC product offers CDP functionality?
Which type of zoning does Zone 3 represent in the graphic?
Which iSCSI topology does the graphic represent?
Which data deduplication technique reduces storage capacity and
Which EMC product provides a unified storage platform?
Which type of storage system does the graphic represent?
Which hypervisor component is responsible for performing binary tr
Which cloud computing characteristic enables consumers to get c
Which cloud characteristic enables the consumers to use cloud serv
Which cloud deployment model enables to provisioning the cloud in
Which component(s) of a cloud infrastructure framework helps aut
In which circumstance is a converter boot CD used for a P2V conve
What is a benefit of NIC teaming?
What can be backed up if a backup agent is installed on a VM?
What best describes the VM snapshot?
What is a feature of Virtual Machine File System (VMFS)?
What best describes a VM template?
An organization requires that each user needs to access their own
Which statement is true about application encapsulation?
Three types of network traffic -VM, IP storage, and management Which technology enables configuring virtual HBAs?
Which statement is true about Remote Desktop Services (RDS)?
Which cloud service management process monitors and reports on al
What is updated when attributes of a cloud service change?
Which product provides cloud user access management capability
What should an organization consider before migrating its applicat
What is considered during the optimization phase for cloud adopti
What is explored during the proof of concept phase for cloud adop
What is an example of cloud vendor lock-in?
An attacker has carried out a denial-of-service attack in a cloud e
What best describes VM isolation??
What is a feature of multi-factor authentication
What is true about the Trusted Computing Base in information secu
What is the impact on RAID set performance when higher revolutions per minute (RPM) d
Which RAID technique does the graphic represent?
Which type of data access method does the graphic represent
Which statement best describes the function of a hypervisor
What enables a virtual machine to be portable across physical ma
Why is a bare-metal hypervisor more efficient than a hosted hyper
What is a feature of a linked clone?
Which technique can be used to cluster a virtual machine with a p
What is a feature of DNS server load balancing?
What is a component of VM network
What is determined during the compliance assessment for cloud a
An administrator wants to use a single management interface to in
Which software allows an administrator to create and publish a ser

99
100
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130

What is a key activity in problem management?


What does integrity ensure in an information system?
In which storage array-based replication technique is the target LU
What is a function of a backup server?
Which type of port does label A in the graphic represent?
Which component of an FCoE network performs the function of bo
An administrator wants to install a guest OS on a newly created vi
What is a storage group in automated storage tiering?
What is a feature of a VSAN?
Which cloud deployment model is typically preferred by an individu
Which security mechanism enables organizations to authenticate th
Which management activity ensures adequate availability of resour
Which statement is true about VM-to-VM affinity?
What best describes a thin LUN extent?
What is a benefit of a VLAN?
An organization is planning to migrate a tightly coupled applicati
Which storage array-based security mechanism helps restricting u
The graphic shows three thin LUNs with their allocated and reporte
Which networking component does the label X represent in the gra
What best describes the authorization process in information secur
The slower data transfer rate between a compute cluster and a st
What best describes a VM theft?

B
C
D
Capacity Management Availability Managem Service Catalog and Configuration M
To ensure that no data isTo
l eliminate threats t To ensure that the IT support staff per
To analyze incident histoTo report incidents to To identify the root cause of recurri
VMware View
VMware Server
VMware Workstation
It provides configuration It enables users to co It provides a consolidated view of exis
Service performance leveTime required for the Cost of transferring the ownership of i
Business continuity ass Disaster recovery as Application hardening assessment
Management, compliancService deployment, Infrastructure, management
Long distance transmissiLoose coupling
Dynamic connection establishment
Add four VLAN IDs to theConfigure a trunk portActivate VLAN trunking and tagging on
VM theft
Side channel attack VM escape
Virtual machine monitor Guest operating syst Virtual Machine File System
Infrastructure-as-a-Servi Platform-as-a-ServiceIT-as-a-Service
Capacity management Performance manage Security management
Full virtualization
Hardware assisted virtSoftware assisted virtualization
Common User States areTemplates
u
are used toUser States are preserved as temporar
Hybrid
Vendor-specified
Proprietary
N_port
F_port
G_port
Simplification of regulat Reduced operational Transparent Provider-to-Provider migra
The replica device is immThe replica device ca The source device is not required for
Reservation
Share
Threshold
EMC Data Domain
EMC NetWorker
EMC SourceOne
Drive speed should be 1 The pool should contaDrives should be supplied by the sam
Capacity management User access managemPlatform management
By mapping the domain na
By sending client traffiBy translating the domain name to the
Storage type, storage gr Storage pool, storage Storage pool, storage group, policy
It is not possible to bac Backing up a LUN thatBacking up data residing on a Virtual
A physical NIC port can fA virtual N_port can f A virtual N_port can function as multip
Loss of data due to disk dPerformance issues, sData corruption, slow data backup
Infrastructure performanNetwork latency, clie Infrastructure security, application p
Resource Bundling
Resource Cataloging Resource Distribution
Application deployment IT management
Client devices
Deploy role-based accessInstall encryption sof Perform regular hypervisor updates
Chargeback report
Performance report Routine report
Virtual Machine File Sys Thin provisioning
Block-level virtualization
The period of time needeThe period of time th The number of mission critical applica
Reduced Recovery Point Elimination of site fai Elimination of Virtual Machine File Sys
Management costs
Capital expenditures Infrastructure costs
Automated storage tierinRaw Device Mapping Global namespace mapping
RAID 5
RAID 6
RAID 1+0
Assessment
Automation
Optimization
It transfers untagged Et It links two virtual s It is a dedicated link for transferring
MAC
IP
Fibre Channel
VLAN tagging
Port grouping
NIC trunking
It cannot detect encrypteIt works only when neIt cannot access logs written by privi
The sum of the virtual The physical machineThe difference between the amount of
Security is improved by cData is available in thRandom reads and writes are allocated

Synchronous replication Database log shippin Differential replication


HomeBase
Avamar
Unisphere
MirrorView
RecoverPoint
SnapView
Port
Mixed
Domain
Native
Combined
Isolated
Disk-based deduplicationAppliance-based deduSource-based deduplication
VNX
Atmos
Isilon
Block-based storage
File-based storage
Object-based storage
Virtual machine
Kernel
Virtual machine monitor
Measured service
Rapid elasticity
On-demand self-service
Resource pooling
Broad network accessRapid elasticity
Public cloud
Hybrid cloud
Community cloud
Physical infrastructure Virtual infrastructure Application and platform software
Perform a cold P2V convePerform a hot P2V co Perform a hot P2V conversion in the c
Increases switch port avai
Provides fault toleran Avoids physical NIC failure
VM configuration files
VM image
Virtual machine file system
Creates a child VM from tReverts the configuratCreates a master copy of a powered-o
Managed only by a NAS Maps the logical path Maps the file metadata to the object I
A point-in-time replica ofA protected copy of aAn online VM with a hardened guest
Application EncapsulatioRemote Desktop ServiApplication Streaming
Application requires localEncapsulated applicati
Application requires a local installatio
Share
Burst size
Average bandwidth
Zoning
RDM
Trunking
Each RDS session has itsA user has full contro Resources of the client system is cons
Capacity management Service catalogue m Performance management
Problem resolution docu Chargeback report Configuration management database
EMC Unisphere
VMware Service Manager
VMware

vCloud Director
Ensure the provider has tEnsure the provider cEnsure the provider stores the data in
Option to relinquish tightly
Cost
coupled
of the applications
existing s Optimum effort needed to migrate app
Ensure the provider has tEnsure the provider cEnsure the provider stores the data in
A software vendor does no
Organization cannot mo
On-disk locking prevents simultaneou
Configure reservation forEncrypt all the data Reduce network bandwidth for storage
Configuring a guest OS ru
Preventing a comprom
Changing the default configuration of
Multiple specified factorsA single credential is Enables multiple clients to be service
Defines the boundary betw
Defines the boundaryDefines the policies of authentication
Improves the overall pe No impact on the overProvides overall performance equivale
Mirroring
Striping
Nested
Block-level
Object-level
Network-level
Allows applications to ru Creates a virtualizat Provides hardware resources to VMs
Standardized virtual ma Virtual machine monitHardware assisted virtualization tech
Allows binary translationAllows binary translation
Provides
to be direct
performed
access
directly
to theby
hardwar
a guest OS
Uses the network identityCopies changes madeContains a symbolic link that enables
File-level virtualization Storage Tiering
Block-level virtualization
IP addresses of applicat Domain names of appli
IP addresses of the clients are mapped
Virtual SCSI controller Virtual switch
Virtual machine monitor
Compatibility of consumer
Contractual obligations
Cost of the in-house infrastructure and
User access managemenVirtual infrastructur Element management
User access managemenVirtual infrastructur Element management

Prioritizes incidents ba Documents the incident


Analyzes the incident history and iden
Only authorized users haAuthorized users haveSpecific access rights to data is given
Pointer-based full volumePointer-based virtual rPointer-based full volume virtual repli
Sends backup data to th Sends backup data toStores deduplicated data
NL_port
E_port
N_port
Enhanced Ethernet AdapFibre Channel ForwardEthernet Forwarder
Virtual machine console Virtual machine templVirtual machine manager
Physical collection of RA Logical collection of Physical collection of storage drives o
Each VSAN has its own faEach VSAN has its own
VSAN ID must be unique for each trun
Private
Community
Hybrid
One-time passwords
Open virtualization f Directory services
Performance
Capacity
Security
Selected VMs should runSelected VMs should VMs running a different guest OS sho
Collection of physical dr Maximum amount of sto
Total amount of physical storage alloc
Increases security level Standardized networking
Reduced

OPEX
Differential
Forklift
Multi-step
Sandboxing
Intrusion detection s Demilitarized zone
750 GB
900 GB
1050 GB
Virtual NIC
Physical HBA
Virtual HBA
A process to give a user A process to ensure thA process to ensure that only legitima
Service asset and confi Performance manage Compliance management
An attacker installs a ro An attacker installs u An attacker copies or moves a VM in

Answer
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

set
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

2
3
3
3
1
4
2
1
4
4
3
4
1
2
3
1
1
1
1
1
1
1
1
1
1
4
4
1
1
1
1
1
3
1
2
1
2
1
4
2
4
1
1
2
3
3
1
2

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

4
1
1
1
3
1
2
1
2
1
1
3
3
1
2
3
1
4
1
2
3
4

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

1
2
3
4
5
6
7
8
9
10
11
12
13
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
46
47
48
49
50

51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98

99
100
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
NULL

QUESTION
Which cloud service management process maintains information in the Configuration Management
Why should data center elements be monitored?
What is a primary goal of incident management?
Which product provides an application virtualization solution?
Which is a function of user access management software?
What should be included in a Cloud Service Termination Agreement?
A consumer needs to determine their scope of adoption of cloud services. Which Governance, Risk
What are key cost factors involved while using cloud services from a service provider?
What is a characteristic of channel technology?
You are asked to create four VLANs on a newly installed physical Ethernet switch. How should you c
Which type of attack could enable the installation of a rogue hypervisor and take control of underly
What makes it possible to store virtual machine files on a NAS device?
Which cloud service model encompasses the complete cloud computing stack?
Which data center management activity involves eliminating single points of failure to ensure busin
In a virtualized data center, guest operating system kernels were modified to eliminate the need fo
Which statement is true about User State virtualization?
An organization needs to migrate all of their applications at the same time. Which migration strate
Which Fibre Channel (FC) port type would only be used to connect an FC switch to another switch?
What is a benefit of cloud computing?
What is a key advantage of pointer-based virtual replication over pointer-based full volume replicat
Which parameter determines the maximum amount of CPU and memory resources that can be con
Which backup solution supports only source-based data deduplication?
What is a best practice for selecting drives for a thin pool?
Which type of software is capable of creating cloud services?
How does a domain name server balance client traffic across a cluster of servers?
What are the three building blocks of automated storage tiering?
What is a limitation of using a backup agent on a hypervisor when backing up virtual machine (VM)
What is enabled by N_Port ID Virtualization (NPIV)?
Which challenges do RAID technologies address?
What are primary considerations related to performance when migrating operations to the cloud?
Which process categorizes resource pools based on performance and capacity?
An organization has decided to deploy desktop virtualization using the Virtual Desktop Infrastructu
An administrator is concerned about Denial of Service attacks on their virtual machines (VMs). Wha
Which report should an administrator use to know both historic and current utilization of storage in
What enables a virtual machine to directly access LUNs in a storage system?
How is the term Recovery Point Objective (RPO) defined?
What is a benefit of automated site failover capability in a data center environment?
Which type of expense is most likely to increase as an organization increases the consumption of c
Which mechanism enables a LUN with higher capacity than is physically allocated to be presented
Which RAID type uses a dedicated parity disk?
An organization plans to migrate an application to the cloud. In which phase of the migration proce
Which statement is true about a Trunk link in a VLAN environment?
Which address is used to statically identify a physical port in a Fibre Channel SAN environment?
An administrator of a virtualized data center is particularly concerned about NIC failure. What shou
What is a limitation of a server-based Intrusion Detection System (IDS)?
What is the basis for determining the size of the virtual machine swap file?
What is a benefit of data striping in RAID?

Which remote replication mode provides a near-zero recovery point objective (RPO)?
Which EMC backup and recovery product provides source-based data deduplication?
Which EMC product offers CDP functionality?
Which type of zoning does Zone 3 represent in the graphic?
Which iSCSI topology does the graphic represent?
Which data deduplication technique reduces storage capacity and network bandwidth requirement
Which EMC product provides a unified storage platform?
Which type of storage system does the graphic represent?
Which hypervisor component is responsible for performing binary translation of instructions that ca
Which cloud computing characteristic enables consumers to get computing resources without any
Which cloud characteristic enables the consumers to use cloud services from a wide range of clien
Which cloud deployment model enables to provisioning the cloud infrastructure for exclusive use b
Which component(s) of a cloud infrastructure framework helps automating the creation and deliver
In which circumstance is a converter boot CD used for a P2V conversion?
What is a benefit of NIC teaming?
What can be backed up if a backup agent is installed on a VM?
What best describes the VM snapshot?
What is a feature of Virtual Machine File System (VMFS)?
What best describes a VM template?
An organization requires that each user needs to access their own copy of OS and applications inst
Which statement is true about application encapsulation?
Three types of network traffic -VM, IP storage, and management - sharea total bandwidth of 300 Mb
Which technology enables configuring virtual HBAs?
Which statement is true about Remote Desktop Services (RDS)?
Which cloud service management process monitors and reports on allocation and utilization of reso
What is updated when attributes of a cloud service change?
Which product provides cloud user access management capability?
What should an organization consider before migrating its applications and operating system to the
What is considered during the optimization phase for cloud adoption?
What is explored during the proof of concept phase for cloud adoption?
What is an example of cloud vendor lock-in?

An attacker has carried out a denial-of-service attack in a cloud environment. In this attack, the att

What best describes VM isolation??


What is a feature of multi-factor authentication
What is true about the Trusted Computing Base in information security?
What is the impact on RAID set performance when higher revolutions per minute (RPM) drives are
Which RAID technique does the graphic represent?
Which type of data access method does the graphic represent
Which statement best describes the function of a hypervisor
What enables a virtual machine to be portable across physical machines running the same hypervi
Why is a bare-metal hypervisor more efficient than a hosted hypervisor
What is a feature of a linked clone?
Which technique can be used to cluster a virtual machine with a physical machine?
What is a feature of DNS server load balancing?
What is a component of VM network
What is determined during the compliance assessment for cloud adoption?
An administrator wants to use a single management interface to interact with all standalone virtua
Which software allows an administrator to create and publish a service catalogue?

What is a key activity in problem management?


What does integrity ensure in an information system?
In which storage array-based replication technique is the target LUN unavailable to the secondary h
What is a function of a backup server?
Which type of port does label A in the graphic represent?
Which component of an FCoE network performs the function of both a NIC and an FC HBA?
An administrator wants to install a guest OS on a newly created virtual machine. What enables the
What is a storage group in automated storage tiering?
What is a feature of a VSAN?
Which cloud deployment model is typically preferred by an individual who is least concerned about
Which security mechanism enables organizations to authenticate their users of cloud services usin
Which management activity ensures adequate availability of resources based on a service level ob
Which statement is true about VM-to-VM affinity?
What best describes a thin LUN extent?
What is a benefit of a VLAN?
An organization is planning to migrate a tightly coupled application to the cloud. Which migration s
Which storage array-based security mechanism helps restricting unauthorized host access to stora
The graphic shows three thin LUNs with their allocated and reported capacities. The total usable ca
Which networking component does the label X represent in the graphic?
What best describes the authorization process in information security?
The slower data transfer rate between a compute cluster and a storage array has been adversely i
What best describes a VM theft?
NULL

A
Service Asset and Configuration Management
To determine whether components are functioning properly
To restore cloud services to consumers as quickly as possible
VMware ThinApp
It enables the creation and publication of a service catalog
Data migration plan
Risk assessment
Data migration, operations
Low protocol overhead
Define four VLAN IDs on the switch, then assign each VLAN ID to one or more switch ports
Hyperjacking
Network File System
Software-as-a-Service
Availability management
Paravirtualization
Operating system refreshes and migrations are easier to deploy
Forklift
E_port
Fast provisioning of resources through a self-service portal
Less space is required for the replica device
Limit
EMC Avamar
Drives should run at the same rpm
Unified management
By mapping the domain name to the IP address of each server in round-robin fashion
Storage type, storage group, policy
It is not possible to back up a LUN that is directly attached to a VM using Raw Device Mapping
A physical FC HBA port can function as multiple virtual N_ports
Loss of data due to disk drive failures, performance issues
Infrastructure performance, network latency
Resource Grading
Compute infrastructure
Limit the resource consumption of the VMs
Capacity planning report
Raw Device Mapping
The amount of data loss due to an outage that a business can tolerate
Reduced Recovery Time Objective
Operational expenditures
Virtual provisioning
RAID 3
Proof of Concept
It is a single network connection that carries multiple VLAN traffic
WWPN
NIC teaming
It runs on the same system as malicious software
The difference between the virtual machine memory limit and the reserved memory
Independent disks allow multiple reads and writes to take place simultaneously

Asynchronous replication
PowerPath/VE
TimeFinder
WWN
Bridged
Target-based deduplication
Symmetrix VMAX
Unified storage
Guest OS
Broad network access
On-demand self service
Externally-hosted private cloud
Service management tools
Perform a hot P2V conversion within a data center
Improves network security
Data stored on virtual disk
Preserves the state and data of a VM at a specific point-in-time
Enables multiple compute systems to access a shared volume
A reusable image created from a VM
Virtual Desktop Infrastructure
Application package contains built-in agents
Limit
NPIV
RDS provides individual OS sessions to the client systems
Financial management
Incident history log file
EMC Unified Infrastructure Manager
Ensure the provider supports the open virtual machine format
Usage pattern of consumed resources
Ensure the provider supports the open virtual machine format
Application built on a PaaS model cannot be moved to an IaaS model
Configure limit for the virtual machine traffic
Deploying VMs from templates with up-to-date security updates
Access is granted only when all the specified factors are validated
Defines the policies of confidentiality, integrity, and availability of an information system
Lowers the overall performance
Parity
File-level
Encapsulates VMs inside applications
Guest OS running on a virtual machine
Allows applications to run directly on physical hardware
Shares the virtual disk with its parent VM
Raw Device Mapping
IP addresses of the load balancers are mapped to a virtual IP address
Virtual IDE Controller
Issues related to performance of the cloud infrastructure
Unified management
Unified management

Transfers error correction activity to incident management


Only authorized changes to data are allowed
Full volume mirroring
Manages backup operations
N_port
Converged Network Adapter
Virtual machine monitor
Logical collection of LUNs that are managed together
Multiple VSANs can be members of a zone
Public
Federated Identity Management
Availability
VMs running the same guest OS should always run on different hypervisors
Minimum amount of storage allocated at a time to a thin LUN from a thin Pool
Increased broadcast activity
Hybrid
LUN masking
300 GB
Physical NIC
A process to ensure that a users credentials are genuine
Service catalogue management
An attacker controls the interaction between a VM and the application
NULL

B
Capacity Management
To ensure that no data is lost if there is a disaster
To analyze incident history and identify impending service failures
VMware View
It provides configuration of, and relationships among, physical resources
Service performance levels
Business continuity assessment
Management, compliance
Long distance transmission
Add four VLAN IDs to the hypervisors VLAN ID pool, then assign each VLAN ID to one or more switc
VM theft
Virtual machine monitor
Infrastructure-as-a-Service
Capacity management
Full virtualization
Common User States are used for all the desktops
Hybrid
N_port
Simplification of regulatory compliance
The replica device is immediately accessible
Reservation
EMC Data Domain
Drive speed should be 15,000 rpm or higher
Capacity management
By mapping the domain name to the IP address of a load balancing device
Storage type, storage group, storage pool
It is not possible to back up data residing on a Virtual Machine File System
A physical NIC port can function as multiple virtual N_ports
Loss of data due to disk drive failures, data corruption
Infrastructure performance, security compliance
Resource Bundling
Application deployment
Deploy role-based access control on the VMs
Chargeback report
Virtual Machine File System
The period of time needed to detect a fault and determine its cause
Reduced Recovery Point Objective
Management costs
Automated storage tiering
RAID 5
Assessment
It transfers untagged Ethernet frames from different VLANs
MAC
VLAN tagging
It cannot detect encrypted traffic
The sum of the virtual machine memory limit and the reserved memory
Security is improved by creating multiple, identical copies of data

Synchronous replication
HomeBase
MirrorView
Port
Native
Disk-based deduplication
VNX
Block-based storage
Virtual machine
Measured service
Resource pooling
Public cloud
Physical infrastructure
Perform a cold P2V conversion
Increases switch port availability
VM configuration files
Creates a child VM from the configuration file of its parent VM
Managed only by a NAS systemAS system
A point-in-time replica of VM log file
Application Encapsulation
Application requires locally-installed agents for execution
Share
Zoning
Each RDS session has its own OS and applications installed
Capacity management
Problem resolution document
EMC Unisphere
Ensure the provider has the capability to meet the service level objectives
Option to relinquish tightly coupled applications
Ensure the provider has the capability to meet the service level objectives
A software vendor does not offer its software as a service
Configure reservation for the virtual machine traffic
Configuring a guest OS running critical applications in TCB mode
Multiple specified factors enable elimination of attackers even if one factor fails
Defines the boundary between security-critical and non-critical parts of an information system
Improves the overall performance
Mirroring
Block-level
Allows applications to run directly on physical hardware resources
Standardized virtual machine hardware
Allows binary translation to be performed by applications
Uses the network identity of its parent VM
File-level virtualization
IP addresses of application servers are mapped to a domain name
Virtual SCSI controller
Compatibility of consumer applications with the cloud infrastructure
User access management
User access management

Prioritizes incidents based on the timestamp


Only authorized users have access to data
Pointer-based full volume replication
Sends backup data to the storage node
NL_port
Enhanced Ethernet Adapter
Virtual machine console
Physical collection of RAID-protected storage drives
Each VSAN has its own fabric services
Private
One-time passwords
Performance
Selected VMs should run on different hypervisors
Collection of physical drives that provide the actual physical storage used by thin LUNs
Increases security level
Differential
Sandboxing
750 GB
Virtual NIC
A process to give a user specific access rights to resources
Service asset and configuration management
An attacker installs a rogue Virtual Machine Monitor to take control of cloud resources
NULL

C
Availability Management
To eliminate threats to storage infrastructure security
To report incidents to the cloud service provider
VMware Server
It enables users to configure pools and virtual resources
Time required for the server provider to restart operations
Disaster recovery assessment
Service deployment, backup management
Loose coupling
Configure a trunk port on the switch, then assign four VLAN IDs to the trunk port
Side channel attack
Guest operating system
Platform-as-a-Service
Performance management
Hardware assisted virtualization
Templates are used to create User States
Vendor-specified
F_port
Reduced operational expenditures (OPEX)
The replica device can be used even when the source device has failed
Share
EMC NetWorker
The pool should contain an equal number of FC, SATA, and Flash drives
User access management
By sending client traffic to each server that uses a driver to filter client traffic
Storage pool, storage type, policy
Backing up a LUN that is directly attached to a VM using Raw Device Mapping is very slow
A virtual N_port can function as multiple physical HBA ports
Performance issues, slow data backup
Network latency, client device performance
Resource Cataloging
IT management
Install encryption software on hypervisors
Performance report
Thin provisioning
The period of time that a business can tolerate an outage
Elimination of site failures
Capital expenditures
Raw Device Mapping
RAID 6
Automation
It links two virtual switches that carry tagged Ethernet frames
IP
Port grouping
It works only when network-based IDS is enabled
The physical machine memory size only
Data is available in the event of a disk drive failure

Database log shipping


Avamar
RecoverPoint
Mixed
Combined
Appliance-based deduplication
Atmos
File-based storage
Kernel
Rapid elasticity
Broad network access
Hybrid cloud
Virtual infrastructure
Perform a hot P2V conversion between two data centers
Provides fault tolerance
VM image
Reverts the configurations of a VM to a later point-in-time
Maps the logical path of a file to the physical path name
A protected copy of a VM snapshot
Remote Desktop Services
Encapsulated application overwrites the already existing application
Burst size
RDM
A user has full control to the resources of the virtualized desktop
Service catalogue management
Chargeback report
VMware Service Manager
Ensure the provider can provide the RPO
Cost of the existing software licenses
Ensure the provider can provide the RPO
Organization cannot move its existing licensed software into the cloud
Encrypt all the data transmitted over the network
Preventing a compromised guest OS from impacting other VMs
A single credential is used to provide access to multiple services
Defines the boundary between internal and external networks in an organization
No impact on the overall performance
Striping
Object-level
Creates a virtualization layer between applications and VMs
Virtual machine monitor
Allows binary translation to be performed directly by a guest OS
Copies changes made to its parent VM
Storage Tiering
Domain names of application servers are mapped to the IP address of the load balancer
Virtual switch
Contractual obligations to store data in specific jurisdictions
Virtual infrastructure management
Virtual infrastructure management

Documents the incident history or all services


Authorized users have reliable access to data
Pointer-based virtual replication
Sends backup data to the storage device
E_port
Fibre Channel Forwarder
Virtual machine template
Logical collection of LUNs created only from storage drives of the same type
Each VSAN has its own, dedicated trunk link
Community
Open virtualization format
Capacity
Selected VMs should run on the same hypervisor
Maximum amount of storage that can be allocated at a time to dynamically expand a thin LUN
Standardized networking
Forklift
Intrusion detection system
900 GB
Physical HBA
A process to ensure that users have reliable and timely access to data
Performance management
An attacker installs unauthorized applications on the guest OS of a VM
NULL

D
Service Catalog and Configuration Management
To ensure that the IT support staff performs efficiently
To identify the root cause of recurring incidents that exhibit common symptoms
VMware Workstation
It provides a consolidated view of existing virtual resources
Cost of transferring the ownership of infrastructure back to the client
Application hardening assessment
Infrastructure, management
Dynamic connection establishment
Activate VLAN trunking and tagging on the switch, then define four VLAN IDs on the switch
VM escape
Virtual Machine File System
IT-as-a-Service
Security management
Software assisted virtualization
User States are preserved as temporary files
Proprietary
G_port
Transparent Provider-to-Provider migrations
The source device is not required for the restore operation
Threshold
EMC SourceOne
Drives should be supplied by the same vendor
Platform management
By translating the domain name to the IP address of higher throughput servers
Storage pool, storage group, policy
Backing up data residing on a Virtual Machine File System is very slow
A virtual N_port can function as multiple physical NIC ports
Data corruption, slow data backup
Infrastructure security, application performance
Resource Distribution
Client devices
Perform regular hypervisor updates
Routine report
Block-level virtualization
The number of mission critical applications that a business must restore after an outage
Elimination of Virtual Machine File System failures
Infrastructure costs
Global namespace mapping
RAID 1+0
Optimization
It is a dedicated link for transferring traffic belonging to a single VLAN
Fibre Channel
NIC trunking
It cannot access logs written by privileged processes
The difference between the amount of physical machine memory and the virtual machine memory
Random reads and writes are allocated more efficiently

Differential replication
Unisphere
SnapView
Domain
Isolated
Source-based deduplication
Isilon
Object-based storage
Virtual machine monitor
On-demand self-service
Rapid elasticity
Community cloud
Application and platform software
Perform a hot P2V conversion in the cloud
Avoids physical NIC failure
Virtual machine file system
Creates a master copy of a powered-off VM
Maps the file metadata to the object ID
An online VM with a hardened guest OS
Application Streaming
Application requires a local installation
Average bandwidth
Trunking
Resources of the client system is consumed to run applications on the virtual desktop
Performance management
Configuration management database
VMware vCloud Director
Ensure the provider stores the data in a geographic location that the organization chooses
Optimum effort needed to migrate applications
Ensure the provider stores the data in a geographic location that the organization chooses
On-disk locking prevents simultaneous powering-on of the same VM
Reduce network bandwidth for storage and migration traffic
Changing the default configuration of a VM to achieve security
Enables multiple clients to be serviced by the same set of resources
Defines the policies of authentication, authorization, and auditing of an information system
Provides overall performance equivalent to the highest RPM drive
Nested
Network-level
Provides hardware resources to VMs
Hardware assisted virtualization technique
Provides direct access to the hardware resources
Contains a symbolic link that enables raw device Mapping
Block-level virtualization
IP addresses of the clients are mapped to the IP addresses of the application servers
Virtual machine monitor
Cost of the in-house infrastructure and using the cloud infrastructure
Element management
Element management

Analyzes the incident history and identifies the impending service failures
Specific access rights to data is given to authorized users
Pointer-based full volume virtual replication
Stores deduplicated data
N_port
Ethernet Forwarder
Virtual machine manager
Physical collection of storage drives over which data is uniformly distributed
VSAN ID must be unique for each trunk port
Hybrid
Directory services
Security
VMs running a different guest OS should always run on the same hypervisors
Total amount of physical storage allocated to the thin LUN from the thin pool
Reduced OPEX
Multi-step
Demilitarized zone
1050 GB
Virtual HBA
A process to ensure that only legitimate users have access to data
Compliance management
An attacker copies or moves a VM in an unauthorized manner
NULL

ANS

SET
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

2
3
3
3
1
4
2
1
4
4
3
4
1
2
3
1
1
1
1
1
1
1
1
1
1
4
4
1
1
1
1

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
1

3
1
2
1
2
1
4
2
4
1
1
2
3
3
1
2

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

4
1
1
1
3
1
2
1
2
1
1
3
3
1
2
3
1
4
1
2
3
4
NULL

1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
NULL

You might also like