QUESTION 131
A company is planning the backup strategy for their virtual machine environment. They are considering migrating to an image-based backup model.
Where would image-based backups be processed in this environment?
A. On a separate physical or virtual server
B. On the tape library
C. On the storage array
D. On the SAN switch
Answer: A
QUESTION 132
From which resource are virtually provisioned LUNs allocated?
A. Thin pool
B. Physical pool
C. Virtual pool
D. Unallocated pool
Answer: A
QUESTION 133
A small law firm that does not currently have any virtualization technologies implemented has recently merged with another firm of approximately the same size. They are planning to consolidate into a single location. They have decided to virtualize their servers and they would like to consolidate storage. It has been determined that 80% of the file server data has not been accessed in over 90 days.
What can they implement to achieve higher storage efficiency?
A. A file archiving plan, to leverage inter-array storage tiering
B. Quotas, to limit the amount of capacity users or groups can consume
C. File extension filters, to prevent non-business related data from being stored in home directories
D. Vertical storage tiering, to ensure data is placed on the appropriate drive technology
Answer: A
QUESTION 134
You are designing a new VDC and are planning to use iSCSI for storage connectivity from the hypervisors. The network infrastructure is 10 Gigabit Ethernet, and the hypervisor hardware can support only two NICs. Your networking design on the hypervisor must provide the highest level of performance, security, and fault tolerance.
What should you recommend?
A. Bond the NICs together and connect them to different access layer switches.
Configure a separate VLAN for the iSCSI traffic.
B. Leave the NICs independent and connect them to different access layer switches.
Configure a separate VLAN for iSCSI traffic on each NIC.
C. Bond the NICs together and connect them to different access layer switches.
Use the same VLAN for SCSI traffic as for management traffic.
D. Leave the NICs independent and connect them to different access layer switches.
Use the same VLAN for SCSI traffic as for management traffic.
Answer: A
QUESTION 135
What are the components of a GRC profile?
A. Risk level, assessment date, regulations, security requirements
B. Healthcare and financial audits, security requirements, terms of service, service termination agreement
C. Availability reporting, risk level, regulations, security requirements
D. Risk level, security requirements, terms of service, service termination agreement
Answer: A
QUESTION 136
An application processes test results from a manufacturing facility, then generates and archives quality reports. The application has been in production for five years.
The application was developed by an outsourced company that is no longer in business. The
source code is not available. It can run on any current Microsoft Windows Server operating system.
What is this an example of?
A. Vendor lock-in
B. A legacy application
C. An enterprise application
D. Service-oriented architecture
Answer: A
QUESTION 137
An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan?
A. Control and containment of IP
B. Reduced impact on network infrastructure
C. No change in desktop management methods and tools
D. Immediate cost savings
Answer: A
QUESTION 138
Which aspect of data security does TLS address?
A. Secure data transport to and from the application over the network
B. Secure block data transfer between the host and storage array
C. Encryption of data at rest on a storage device
D. Centralized key management for data encryption
Answer: A
QUESTION 139
Which solution should be the primary choice for protection against accidental data deletion?
A. Backup
B. Local replication
C. Remote replication
D. Fault-tolerant cluster with hot standby VM
Answer: A
QUESTION 140
Which solution would address your requirement to encrypt data that will be stored in several SAN- attached storage systems, including both disk arrays and tape libraries?
A. Cisco SME
B. VMAX D@RE
C. PowerPath/VE with RSA Encryption
D. EMC VPLEX
Answer: A
If you want to pass EMC E20-018 successfully, donot missing to read latest lead2pass EMC E20-018 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.