Dell E20-020 Exam Practice Questions (P. 4)
- Full Access (70 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
An organization plans to build a cloud using some of the existing data center infrastructure. Specifically, they want to use the existing FC storage infrastructure to support cloud hosts. However, they want to logically separate the cloud storage traffic from the existing data center storage traffic within this infrastructure.
Which mechanism can be used to meet this requirement?
Which mechanism can be used to meet this requirement?
- AMPIO
- BVLAN
- CVSAN
- DMasking
Correct Answer:
C
The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single
VSAN.
Incorrect:
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware- specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server 2008,
Windows Server 2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.
Reference:
https://en.wikipedia.org/wiki/VSAN
C
The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.
Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single
VSAN.
Incorrect:
Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware- specific information needed to optimize connectivity with their storage arrays.
MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server 2008,
Windows Server 2008 R2 and Windows Server 2012.
Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.
Reference:
https://en.wikipedia.org/wiki/VSAN
send
light_mode
delete
Question #17
A cloud architect is evaluating an organization’s need for encryption. Which type of encryption eliminates the requirement for key management?
- AEmbedded
- BFile-based
- CFile system-based
- DVirtual disk
Correct Answer:
D
The most convenient form of encryption is disk/volume encryption. If you have any data on an existing Virtual Machine (VM), you can easily add an encrypted disk or volume. Then, when you unmount the encrypted volume (or power off the server), as long as you dont store the encryption key on the server, your data is safe.
The drawback with this type of encryption however is that if your server gets compromised somehow, there is a possibility that the attacker could capture your passphrase/key (and/or data) the next time you mount the disk image.
Incorrect:
Not C: Filesystem-level encryption, often called file/folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. Each file can be and usually is encrypted with a separate encryption key.
References:
https://www.cloudsigma.com/securing-your-data-in-the-cloud-with-encryption/
D
The most convenient form of encryption is disk/volume encryption. If you have any data on an existing Virtual Machine (VM), you can easily add an encrypted disk or volume. Then, when you unmount the encrypted volume (or power off the server), as long as you dont store the encryption key on the server, your data is safe.
The drawback with this type of encryption however is that if your server gets compromised somehow, there is a possibility that the attacker could capture your passphrase/key (and/or data) the next time you mount the disk image.
Incorrect:
Not C: Filesystem-level encryption, often called file/folder encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself. Each file can be and usually is encrypted with a separate encryption key.
References:
https://www.cloudsigma.com/securing-your-data-in-the-cloud-with-encryption/
send
light_mode
delete
Question #18
What is a benefit of a service catalog?
- AHandles every IT request simultaneously
- BAllows users to customize tenant roles
- CServices do not have to meet the standards set by the business
- DEnables the application of quotas on resources to control cost
Correct Answer:
D
D
send
light_mode
delete
Question #19
An organization wants to deploy SaaS applications in their cloud. The SaaS applications will be using application HA to maintain up-time levels of 99.9%.
What should the cloud architect include in the design to support this up-time requirement?
What should the cloud architect include in the design to support this up-time requirement?
- ASufficient host capacity
- BQuorum disks
- CReplication licenses for hypervisors
- DHA licenses for hypervisors
Correct Answer:
A
A
send
light_mode
delete
Question #20
A company wants to build an IaaS cloud to host cloud-native applications. On which areas should a cloud architect focus when gathering requirements for this cloud design?
- AAutomation, multi-tenancy, and hardware availability
- BAutomation, hardware availability, and policy compliance
- CHardware availability, policy compliance, and multi-tenancy
- DPolicy compliance, automation, and multi-tenancy
Correct Answer:
C
* Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database-related multi-tenant service.
* Hardware
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
References:
http://www.interoute.com/what-iaas
http://searchtelecom.techtarget.com/answer/How-do-Infrastructure-as-a-Service-and-multi-tenant-services-differ
C
* Multi-tenancy
Infrastructure as a Service is very similar to what we've known as hosting or collocation services, just painted with bright cloudy colors. Multi-tenant services are any services that you offer to multiple customers, or "tenants." In most cases, IaaS and multi-tenant services mean the same thing, although you could also implement storage- or database-related multi-tenant service.
* Hardware
In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
Note: Infrastructure as a Service (IaaS) is a form of cloud computing that provides virtualized computing resources over the Internet.
References:
http://www.interoute.com/what-iaas
http://searchtelecom.techtarget.com/answer/How-do-Infrastructure-as-a-Service-and-multi-tenant-services-differ
send
light_mode
delete
All Pages