Dell E20-020 Exam Practice Questions (P. 4)
- Full Access (70 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
Which mechanism can be used to meet this requirement?
- AMPIO
- BVLAN
- CVSAN
- DMasking
C
The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single
VSAN.
Incorrect:
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware- specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server 2008,
Windows Server 2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.
Reference:
https://en.wikipedia.org/wiki/VSAN

Hi! Do you need help with this question ?
- Why isn't the A the right answer?
- Traducir la pregunta al español
Contributor get free access to an augmented ChatGPT 4 trained with the latest IT Questions.
Question #17
- AEmbedded
- BFile-based
- CFile system-based
- DVirtual disk
D
The most convenient form of encryption is disk/volume encryption. If you have any data on an existing Virtual Machine (VM), you can easily add an encrypted disk or volume. Then, when you unmount the encrypted volume (or power off the server), as long as you dont store the encryption key on the server, your data is safe.
The drawback with this type of encryption however is that if your server gets compromised somehow, there is a possibility that the attacker could capture your passphrase/key (and/or data) the next time you mount the disk image.
Incorrect:
Not C: Filesystem-level encryption, often called file/folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. Each file can be and usually is encrypted with a separate encryption key.
References:
https://www.cloudsigma.com/securing-your-data-in-the-cloud-with-encryption/

Hi! Do you need help with this question ?
- Why isn't the A the right answer?
- Traducir la pregunta al español
Contributor get free access to an augmented ChatGPT 4 trained with the latest IT Questions.
Question #18
- AHandles every IT request simultaneously
- BAllows users to customize tenant roles
- CServices do not have to meet the standards set by the business
- DEnables the application of quotas on resources to control cost
D

Hi! Do you need help with this question ?
- Why isn't the A the right answer?
- Traducir la pregunta al español
Contributor get free access to an augmented ChatGPT 4 trained with the latest IT Questions.
Question #19
What should the cloud architect include in the design to support this up-time requirement?
- ASufficient host capacity
- BQuorum disks
- CReplication licenses for hypervisors
- DHA licenses for hypervisors
A

Hi! Do you need help with this question ?
- Why isn't the A the right answer?
- Traducir la pregunta al español
Contributor get free access to an augmented ChatGPT 4 trained with the latest IT Questions.
Question #20
- AAutomation, multi-tenancy, and hardware availability
- BAutomation, hardware availability, and policy compliance
- CHardware availability, policy compliance, and multi-tenancy
- DPolicy compliance, automation, and multi-tenancy
C
* Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database-related multi-tenant service.
* Hardware
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
References:
http://www.interoute.com/what-iaas
http://searchtelecom.techtarget.com/answer/How-do-Infrastructure-as-a-Service-and-multi-tenant-services-differ

Hi! Do you need help with this question ?
- Why isn't the A the right answer?
- Traducir la pregunta al español
Contributor get free access to an augmented ChatGPT 4 trained with the latest IT Questions.
All Pages