You are on page 1of 11

Exam Title

: Network Appliance NS0-530 : NCIE-DataFort Security Exam

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. If a DataFort 2.x or later appliance fails, which three information sources can be used with the DataFort Wizard to recreate the configuration information on a replacement? (Choose three.) A. *.xdf file from LKM software/appliance B. mysqldump of DataFort configDB C. *.xdf file from manual backup D. *.lkm file from LKM software/appliance E. surviving cluster member Answer: ACE

2. In 2.x firmware, how many virtual storage devices (targets) and virtual client hosts (initiators) can be attached to a single FC525 model DataFort? A. 1 virtual storage device and 8 virtual client hosts B. 7 virtual storage device and 7 virtual client hosts C. 8 virtual storage device and 8 virtual client hosts D. 8 virtual storage device and 32 virtual client hosts E. 16 virtual storage device and 128 virtual client hosts Answer: B

3. Which two can authorize Key Translation? (Choose two.) A. the source DataFort administrator B. the destination DataFort administrator C. the LKM administrator D. a quorum of Recovery Cards and passwords E. a Recovery Key Archive file Answer: DE

4. Which procedure is used to move keys between LKM servers or appliances that do not share network connectivity? A. clustering B. key export and import
www.Prepking.com

C. Key Translation D. tape metadata Answer: B 5. Which is a correct System Card replacement procedure for SAN 2.x? A. zeroize DataFort and restore with an initialized System Card and a recent configdb using a quorum of Recovery Cards B. zeroize DataFort and join an existing cluster with an uninitialized System Card and a quorum of Recovery Cards C. insert an uninitialized System Card into the DataFort and perform a System Card replacement using a quorum of Recovery Cards D. insert an initialized System Card from an existing cluster member and perform a System Card replacement using a quorum of Recovery Cards Answer: B

6. Which two statements are true about signed DataFort log messages? (Choose two.) A. They contain a verifiable digital signature. B. They can only be authenticated on the DataFort that generated the log message. C. They may not be sent to a syslog server. D. They may not be sent to a Windows event log. Answer: AB

7. If you have an 8-node cluster, how many members must be online in the cluster in order to create Cryptainer vaults? A. 1 B. 4 C. 5 D. 8 Answer: C

8. Which two statements are true if a System Card is removed in a functional, fully initialized DataFort?
www.Prepking.com

(Choose two.) A. Encryption services are disabled after a reboot. B. Encryption services halt within five minutes of card removal. C. Recovery Card replacement does not work. D. DataFort sends SNMP trap and initiates shutdown to protect access to encrypted data. Answer: AC

9. In SAN 2.x, how many targets can be virtualized on an FC520? A. 1 B. 7 C. 8 D. 31 Answer: B

10. When are Recovery Cards required in the trustee key-sharing process? A. during the establishment of only the trustee relationship B. during the establishment of the trustee relationship and the key export C. during the establishment of the trustee relationship, key export, and key import D. Recovery Cards are not required in the trustee key-sharing process. Answer: A

11. Which two key policies allow for all keys to be pre-generated and replicated to the DR site? (Choose two.) A. key per tape B. key per pool C. Global Pool with single key D. periodic disk rekey Answer: BC

12. Which two statements about disk and tape I/O are true? (Choose two.)
www.Prepking.com

A. Disk and tape I/O can be combined through the same standalone DataFort. B. Disk and tape I/O can be combined through the same cluster but not through the same DataFort. C. Disk and tape I/O cannot be combined through the same standalone DataFort. D. Disk and tape I/O cannot be combined through the same cluster. Answer: CD

13. Which three factors should be considered when assessing the performance impact a DataFort will have on an existing environment? (Choose three.) A. the number of devices connected to a specific DataFort B. the type of Cryptainer vault created (LUN Mapped versus Port Mapped) C. the combined speed of all devices connected to the DataFort D. the device type, tape or disk, being connected to the DataFort Answer: ACD

14. California SB1386 requires businesses and government agencies to _____. A. encrypt personal information on onsite backup tapes when reasonable alternative methods are not in place B. encrypt all personal information on offsite backup tapes when reasonable alternative methods are not in place C. encrypt all personal information on both disk and backup tapes, onsite or offsite, when reasonable alternative methods are not in place D. notify individuals if their unencrypted personal information is believed to have been disclosed to an unauthorized person E. notify the California District Attorney Office if unencrypted personal information is believed to have been disclosed to an unauthorized person Answer: D

15. During installation of the LKM server software, which configuration options can be specified? A. database type and schema B. target directory and license
www.Prepking.com

C. server port number and "using SSL" D. LKM server IP and hostname Answer: B

16. How many additional FC-switch ports are required for an inline direct-attached FC-5XX DataFort? A. 0 B. 1 C. 2 D. 4 E. 10 Answer: A

17. What is the purpose of the Key Policy setting for tapes? A. It determines whether or not each tape has a unique key. B. It determines whether or not tape encryption keys can be shared by DataFort appliances. C. It determines whether or not tape encryption keys are written to tape. D. It determines how frequently tape keys are backed up. Answer: A

18. Which property must be set to prevent overlapped SCSI commands? A. dfc.serialize_storage_cmds B. dfc.disable_overlapped_cmds C. dfc.disable_host_LIP D. dfc.isp.enableTaskMgmtPassUp Answer: A

19. What are three valid forced media type and duplex mode settings on the DataFort? (Choose three.) A. 1000baseTX, full-duplex B. 1000baseTX, half-duplex C. 100baseTX, full-duplex
www.Prepking.com

D. 100baseTX, half-duplex E. 10baseTX, half-duplex Answer: ACD

20. What can the E-Series DataFort net util tcpdump command capture? A. network packets going between two arbitrary machines B. only network packets going between DataFort client-side NIC and arbitrary machines C. only network packets going between DataFort server-side NIC and arbitrary machines D. only network packets going between DataFort client-side NIC and server-side NIC E. network packets going between DataFort client-side/server-side NIC and arbitrary machines Answer: E

21. Which three switches support FL ports? (Choose three.) A. Cisco 9513 B. Brocade 48000 C. McData 4700 D. McData 6140 Answer: ABC 22. The primary and disaster recovery sites are connected through IP across a WAN connection. Which two key replication methods are supported between DataFort appliances at these sites? (Choose two.) A. Cryptainer Key File B. clustering the DataFort appliances across sites C. manual key translation through LKM D. establishing trustee relationships Answer: CD

23. If your recovery schema is two out of five, how many Recovery Cards do you need to remove a cluster member? A. 0 B. 1
www.Prepking.com

C. 2 D. 3 E. 5 Answer: A

24. In a 4-node DataFort cluster, how many distinct nodes can you perform global administrative tasks on? A. one, the member with the lowest ID B. one, just the current cluster coordinator C. two, the head and first cluster member D. four Answer: D

25. Which step is automatically performed when using host virtualization? A. WWN forwarding for virtualized hosts B. WWN forwarding when creating Cryptainer vaults C. masking LUNs to the base WWN on the storage side and to the virtualized host WWN D. granting Cryptainer access to virtualized hosts E. adding the virtualized host WWN to the storage side zone Answer: D

26. Which is an advantage of an asymmetric cryptosystem as compared to a symmetric cryptosystem? A. stronger asymmetric keys of the same length B. public key distribution C. better performance D. truly random keys Answer: B

27. What is the purpose of the Recovery Card schema? A. It defines the number of Recovery Cards needed to form a quorum. B. It determines where Recovery Cards must be presented.
www.Prepking.com

C. It specifies the authentication mechanism used with Recovery Cards. D. It determines where Recovery Card information is stored in the configuration database. Answer: A

28. The E-Series DataFort Local ACL feature is designed to prevent unauthorized Windows administrators from gaining Cryptainer access by adding themselves to _____. A. the DataFort Local ACL B. the share ACL C. a group on the server ACL D. a Cryptainer ACL Answer: B

29. Which two statements are true about the NAS Audit Trail log configuration from the E-Series DataFort WebUI? (Choose two.) A. They cannot be signed. B. They cannot be configured to write to the E-Series DataFort Database. C. They can be configured to audit file access. D. They cannot be sent to a Windows event log. Answer: BC

30. Which two actions remove key material? (Choose two.) A. zeroization of DataFort with destruction of its System Card B. deletion of all manually saved configdb files C. deletion of all Recovery Key Archives D. destruction of Admin Cards Answer: AB

31. Which three factors should be considered when determining the recommended number of DataFort appliances for any given SAN environment? (Choose three.) A. existing combined bandwidth
www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/NS0-530.htm

You might also like