CIS-Dumbs

20
A 1) Which iSCSI topology does the graphic represent? ( ) Bridged ( ) Native ( ) Combined ( ) Isolated Answer: Bridged 2) Which EMC backup and recovery product provides source-based data deduplication? ( ) Avamar ( ) PowerPath/VE ( ) HomeBase ( ) Unisphere Answer: Avamar 3) Which type of port does label ‘A’ in the graphic represent? ( ) E_port ( ) N_port ( ) F_port ( ) NL_port Answer: E_port

Transcript of CIS-Dumbs

  • A

    1) Which iSCSI topology does the graphic represent?

    ( ) Bridged

    ( ) Native

    ( ) Combined

    ( ) Isolated

    Answer: Bridged

    2) Which EMC backup and recovery product provides source-based data deduplication?

    ( ) Avamar

    ( ) PowerPath/VE

    ( ) HomeBase

    ( ) Unisphere

    Answer: Avamar

    3) Which type of port does label A in the graphic represent?

    ( ) E_port

    ( ) N_port

    ( ) F_port

    ( ) NL_port

    Answer: E_port

  • 4) Which type of storage system does the graphic represent?

    ( ) Unified storage

    ( ) Block-based storage

    ( ) File-based storage

    ( ) Object-based storage

    Answer: Unified storage

    5) Which component of an FCoE network performs the function of both a NIC and an FC HBA?

    ( ) Converged Network Adapter

    ( ) Enhanced Ethernet Adapter

    ( ) Fibre Channel Forwarder

    ( ) Ethernet Forwarder

    Answer: Converged Network Adapter

    6) Which EMC product offers CDP functionality?

    ( ) RecoverPoint

    ( ) TimeFinder

    ( ) MirrorView

    ( ) SnapView

    Answer: RecoverPoint

  • 7) Which type of zoning does Zone 3 represent in the graphic?

    ( ) WWN

    ( ) Port

    ( ) Mixed

    ( ) Domain

    Answer: Mixed

    8) Which RAID technique does the graphic represent?

    ( ) Parity

    ( ) Mirroring

    ( ) Striping

    ( ) Nested

    Answer: Mirroring

    9) Why is a bare-metal hypervisor more efficient than a hosted hypervisor?

    ( ) Allows applications to run directly on physical hardware

    ( ) Allows binary translation to be performed by applications

    ( ) Allows binary translation to be performed directly by a guest OS

    ( ) Provides direct access to the hardware resources

  • Answer: Provides direct access to the hardware resources

    10) Which hypervisor component is responsible for performing binary translation of

    instructions that can NOT be virtualized?

    ( ) Guest OS

    ( ) Virtual machine

    ( ) Kernel

    ( ) Virtual machine monitor

    Answer: Virtual machine monitor

    11) An administrator wants to install a guest OS on a newly created virtual machine. What

    enables the administrator to perform the installation?

    ( ) Virtual machine monitor

    ( ) Virtual machine console

    ( ) Virtual machine template

    ( ) Virtual machine manager

    Answer: Virtual machine console

    12) Which statement best describes the function of a hypervisor?

    ( ) Encapsulates VMs inside applications

    ( ) Allows applications to run directly on physical hardware resources

    ( ) Creates a virtualization layer between applications and VMs

    ( ) Provides hardware resources to VMs

    Answer: Provides hardware resources to VMs

    13) What enables a virtual machine to be portable across physical machines running the same

    hypervisor?

    ( ) Guest OS running on a virtual machine

    ( ) Standardized virtual machine hardware

    ( ) Virtual machine monitor

    ( ) Hardware assisted virtualization technique

  • Answer: Standardized virtual machine hardware

    14) Which cloud computing characteristic enables consumers to get computing resources

    without any human intervention?

    ( ) Broad network access

    ( ) Measured service

    ( ) Rapid elasticity

    ( ) On-demand self-service

    Answer: On-demand self-service

    15) Which technique can be used to cluster a virtual machine with a physical machine?

    ( ) Raw Device Mapping

    ( ) File-level virtualization

    ( ) Storage Tiering

    ( ) Block-level virtualization

    Answer: Raw Device Mapping

    16) The graphic shows three thin LUNs with their allocated and reported capacities. The total

    usable capacity of the storage system is 1500 GB. What is the available capacity of the storage

    system?

    ( ) 300 GB

    ( ) 750 GB

    ( ) 900 GB

    ( ) 1050 GB

    Answer: 1050 GB

    17) What is a storage group in automated storage tiering?

    ( ) Logical collection of LUNs that are managed together

    ( ) Physical collection of RAID-protected storage drives

  • ( ) Logical collection of LUNs created only from storage drives of the same type

    ( ) Physical collection of storage drives over which data is uniformly distributed

    Answer: Logical collection of LUNs that are managed together

    18) What best describes a thin LUN extent?

    ( ) Minimum amount of storage allocated at a time to a thin LUN from a thin Pool

    ( ) Collection of physical drives that provide the actual physical storage used by thin LUNs

    ( ) Maximum amount of storage that can be allocated at a time to dynamically expand a thin

    LUN

    ( ) Total amount of physical storage allocated to the thin LUN from the thin pool

    Answer: Minimum amount of storage allocated at a time to a thin LUN from a thin Pool

    19) What is a benefit of NIC teaming?

    ( ) Improves network security

    ( ) Increases switch port availability

    ( ) Provides fault tolerance

    ( ) Avoids physical NIC failure

    Answer: Provides fault tolerance

    20) What is a component of VM network?

    ( ) Virtual switch

    ( ) Virtual IDE Controller

    ( ) Virtual machine monitor

    ( ) Virtual SCSI controller

    Answer: Virtual switch

    21) Which networking component does the label X represent in the graphic?

    ( ) Physical NIC

    ( ) Virtual NIC

  • ( ) Physical HBA

    ( ) Virtual HBA

    Answer: Physical NIC

    22) What is a feature of a VSAN?

    ( ) Each VSAN has its own fabric services

    ( ) Multiple VSAN can be members of a zone

    ( ) Each VSAN has its own, dedicated trunk link

    ( ) VSAN ID must be unique for each trunk port

    Answer: Each VSAN has its own fabric services

    23) What is a benefit of a VLAN?

    ( ) Increases security level

    ( ) Standardized networking

    ( ) Reduced OPEX

    ( ) Increased broadcast activity

    Answer: Increases security level

    24) An organization requires that each user needs to access their own copy of OS and

    applications installed on a centralized location. Which virtualization solution will you

    recommend?

    ( ) Virtual Desktop Infrastructure

    ( ) Application Encapsulation

    ( ) Remote Desktop Services

    ( ) Application Streaming

    Answer: Virtual Desktop Infrastructure

    25) What is explored during the proof of concept phase for cloud adoption?

    ( ) Ensure the provider supports the open virtual machine format

    ( ) Ensure the provider has the capability to meet the service level objectives

  • ( ) Ensure the provider can provide the RPO

    ( ) Ensure the provider stores the data in a geographic location that the organization chooses

    Answer: Ensure the provider supports the open virtual machine format

    26) What is updated when attributes of a cloud service change?

    ( ) Incident history log file

    ( ) Problem resolution document

    ( ) Chargeback report

    ( ) Configuration management database

    Answer: Configuration management database

    27) Which cloud deployment model is typically preferred by an individual who is least

    concerned about the security or availability risks and most concerned about reducing cost?

    ( ) Public

    ( ) Private

    ( ) Community

    ( ) Hybrid

    Answer: Public

    28) The slower data transfer rate between a compute cluster and a storage array has been

    adversely impacting multiple cl oud services. Which service management process helps to

    mitigate this impact?

    ( ) Service catalogue management

    ( ) Service asset and configuration management

    ( ) Performance management

    ( ) Compliance management

    Answer: Performance management

    29) Which product provides cloud user access management capability?

    ( ) EMC Unified Infrastructure Manager

    ( ) EMC Unisphere

  • ( ) VMware Service Manager

    ( ) VMware vCloud Director

    Answer: VMware vCloud Director

    30) An administrator wants to use a single management interface to interact with all

    standalone virtual infrastructure components for creating virtual pools. These components

    include compute, network, and storage devices from multiple vendors.

    Which software will you recommend to the administrator?

    ( ) Unified management

    ( ) User access management

    ( ) Virtual infrastructure management

    ( ) Element management

    Answer: Unified management

    31) What is a key activity in problem management?

    ( ) Transfers error correction activity to incident management

    ( ) Prioritizes incidents based on the timestamp

    ( ) Documents the incident history or all services

    ( ) Analyzes the incident history and identifies the impending service failures

    Answer: Analyzes the incident history and identifies the impending service failures

    32) What does integrity ensure in an information system?

    ( ) Only authorized changes to data are allowed

    ( ) Only authorized users have access to data

    ( ) Authorized users have reliable access to data

    ( ) Specific access rights to data is given to authorized users

    Answer: Only authorized changes to data are allowed

  • 33) What is a feature of multi-factor authentication?

    ( ) Access is granted only when all the specified factors are validated

    ( ) Multiple specified factors enable elimination of attackers even if one factor fails

    ( ) A single credential is used to provide access to multiple services

    ( ) Enables multiple clients to be serviced by the same set of resources

    Answer: Access is granted only when all the specified factors are validated

    34) What best describes the authorization process in information security?

    ( ) A process to give a user specific access rights to resources

    ( ) A process to ensure that a users credentials are genuine

    ( ) A process to ensure that users have reliable and timely access to data

    ( ) A process to ensure that only legitimate users have access to data

    Answer: A process to give a user specific access rights to resources

    35) Which security mechanism enables organizations to authenticate their users of cloud

    services using a chosen provider?

    ( ) Federated Identity Management

    ( ) One-time passwords

    ( ) Open virtualization format

    ( ) Directory services

    Answer: Federated Identity Management

    36) Which remote replication mode provides a near-zero recovery point objective (RPO)?

    ( ) Asynchronous replication

    ( ) Synchronous replication

    ( ) Database log shipping

    ( )Differential replication

  • Answer: Synchronous replication

    37) Which management activity ensures adequate availability of resources based on a service

    level objective?

    ( ) Capacity

    ( ) Availability

    ( ) Performance

    ( ) Security

    Answer: Capacity

    38) What is a function of a backup server?

    ( ) Manages backup operations

    ( ) Sends backup data to the storage node

    ( ) Sends backup data to the storage device

    ( ) Stores deduplicated data

    Answer: Manages backup operations

    39) In which circumstance is a converter boot CD used for a P2V conversion?

    ( ) Perform a hot P2V conversion within a data center

    ( ) Perform a cold P2V conversion

    ( ) Perform a hot P2V conversion between two data centers

    ( ) Perform a hot P2V conversion in the cloud

    Answer: Perform a cold P2V conversion

    40) Which statement is true about VM-to-VM affinity?

    ( ) VMs running the same guest OS should always run on different hypervisors

    ( ) Selected VMs should run on different hypervisors

    ( ) Selected VMs should run on the same hypervisor

    ( ) VMs running a different guest OS should always run on the same hypervisors

  • Answer: Selected VMs should run on the same hypervisor

    41) Which cloud characteristic enables the consumers to use cloud services from a wide range

    of client platforms?

    ( ) On-demand self service

    ( ) Resource pooling

    ( ) Broad network access

    ( ) Rapid elasticity

    Answer: Broad network access

    42) What is a feature of a linked clone?

    ( ) Shares the virtual disk with its parent VM

    ( ) Uses the network identity of its parent VM

    ( ) Copies changes made to its parent VM

    ( ) Contains a symbolic link that enables raw device mapping

    Answer: Shares the virtual disk with its parent VM

    43) What best describes the VM snapshot?

    ( ) Preserves the state and data of a VM at a specific point-in-time

    ( ) Creates a child VM from the configuration file of its parent VM

    ( ) Reverts the configurations of a VM to a later point- in-time

    ( ) Creates a master copy of a powered-off VM

    Answer: Preserves the state and data of a VM at a specific point-in-time

    44) What best describes a VM template?

    ( ) A reusable image created from a VM

    ( ) A point-in-time replica of VM log file

    ( ) A protected copy of a VM snapshot

    ( ) an online VM with a hardened guest OS

  • Answer: A reusable image created from a VM

    45) What is a feature of DNS server load balancing?

    ( ) IP addresses of application servers are mapped to a domain name

    ( ) IP addresses of the load balancers are mapped to a virtual IP address

    ( ) Domain names of application servers are mapped to the IP address of the load balancer

    ( ) IP addresses of the clients are mapped to the IP addresses of the application servers

    Answer: IP addresses of application servers are mapped to a domain name

    46) Three types of network traffic -VM, IP storage, and management share a total bandwidth

    of 300 Mbps of a NIC team. The management traffic should not be allowed to use more than 50

    Mbps of the NIC teams bandwidth. Which parameter helps in controlling the bandwidth for the

    management traffic?

    ( ) Limit

    ( ) Share

    ( ) Burst size

    ( ) Average bandwidth

    Answer: Limit

    47) Which statement is true about Remote Desktop Services (RDS)?

    ( ) RDS provides individual OS sessions to the client systems

    ( ) Each RDS session has its own OS and applications installed

    ( ) A user has full control to the resources of the virtualized desktop

    ( ) Resources of the client system is consumed to run applications on the virtual desktop

    Answer: RDS provides individual OS sessions to the client systems

    48) An organization is planning to migrate a tightly coupled application to the cloud. Which

    migration strategy is recommended?

  • ( ) Forklift

    ( ) Hybrid

    ( ) Differential

    ( ) Multi-step

    Answer: Forklift

    49) What is considered during the optimization phase for cloud adoption?

    ( ) Usage pattern of consumed resources

    ( ) Option to relinquish tightly coupled applications

    ( ) Cost of the existing software licenses

    ( ) Optimum effort needed to migrate applications

    Answer: Usage pattern of consumed resources

    50) What is considered during the optimization phase for cloud adoption?

    ( ) Usage pattern of consumed resources

    ( ) Option to relinquish tightly coupled applications

    ( ) Cost of the existing software licenses

    ( ) Optimum effort needed to migrate applications

    Answer: Usage pattern of consumed resources

    51) What is determined during the compliance assessment for cloud adoption?

    ( ) Contractual obligations to store data in specific jurisdictions

    ( ) Cost of the in-house infrastructure and using the cloud infrastructure

    ( ) Issues related to performance of the cloud infrastructure

    ( ) Compatibility of consumer applications with the cloud infrastructure

    Answer: Contractual obligations to store data in specific jurisdictions

  • 52) What should an organization consider before migrating its applications and operating

    system to the public cloud to prevent vendor lock-in?

    ( ) Ensure the provider supports the open virtual machine format

    ( ) Ensure the provider has the capability to meet the service level objectives

    ( ) Ensure the provider can provide the RPO

    ( ) Ensure the provider stores the data in a geographic location that the organization chooses

    Answer: Ensure the provider supports the open virtual machine format

    53) Which storage array-based security mechanism helps restricting unauthorized host access

    to storage volumes?

    (X) LUN masking

    ( ) Sandboxing

    ( ) Intrusion detection system

    ( ) Demilitarized zone

    Answer: LUN masking

    54) What best describes a VM theft?

    ( ) An attacker copies or moves a VM in an unauthorized manner

    ( ) An attacker installs a rogue Virtual Machine Monitor to take control of cloud resources

    ( ) An attacker installs unauthorized applications on the guest OS of a VM

    ( ) An attacker controls the interaction between a VM and the application

    Answer: An attacker copies or moves a VM in an unauthorized manner

    55) An attacker has carried out a denial-of-service attack in a cloud environment. In this attack,

    the attacker causes several virtual machines to consume a large amount of network bandwidth.

    This has resulted in unavailability of bandwidth for storage and virtual machine migration

    traffic.

    What will you recommend to minimize the impact due to this attack?

  • ( ) Configure limit for the virtual machine traffic

    ( ) Configure reservation for the virtual machine traffic

    ( ) Encrypt all the data transfer mitted over the network

    ( ) Reduce network bandwidth for storage and migration traffic

    Answer: Configure limit for the virtual machine traffic

    56) Which management activity ensures adequate availability of resources based on a service

    level objective?

    ( ) Capacity

    ( ) Availability

    ( ) Performance

    ( ) Security

    Answer: Capacity

    57) What is the impact on RAID set performance when higher revolutions per minute (RPM)

    drives are mixed with lower RPM drives?

    ( ) Lowers the overall performance

    ( ) Improves the overall performance

    ( ) No impact on the overall performance

    ( ) Provides overall performance equivalent to the highest RPM drive

    Answer: Lowers the overall performance

    58) Which cloud characteristic enables the consumers to use cloud services from a wide range

    of client platforms?

    ( ) On-demand self service

    ( ) Resource pooling

    ( ) Broad network access

    ( ) Rapid elasticity

  • Answer: Broad network access

    59) Which component(s) of a cloud infrastructure framework helps automating the creation

    and delivery of computing resources to the consumers?

    ( ) Service management tools

    ( ) Physical infrastructure

    ( ) Virtual infrastructure

    ( ) Application and platform software

    Answer: Service management tools

    60) In which circumstance is a converter boot CD used for a P2V conversion?

    ( ) Perform a hot P2V conversion within a data center

    ( ) Perform a cold P2V conversion

    ( ) Perform a hot P2V conversion between two data centers

    ( ) Perform a hot P2V conversion in the cloud

    Answer: Perform a cold P2V conversion

    61) What is a feature of Virtual Machine File System (VMFS)?

    ( ) Enables multiple compute systems to access a shared volume

    ( ) Managed only by a NAS system

    ( ) Maps the logical path of a file to the physical path name

    ( ) Maps the file metadata to the object ID

    Answer: Enables multiple compute systems to access a shared volume

    62) What is a feature of a linked clone?

    ( ) Shares the virtual disk with its parent VM

    ( ) Uses the network identity of its parent VM

  • ( ) Copies changes made to its parent VM

    ( ) Contains a symbolic link that enables raw device mapping

    Answer: Shares the virtual disk with its parent VM

    63) What can be backed up if a backup agent is installed on a VM?

    ( ) Data stored on virtual disk

    ( ) VM configuration files

    ( ) VM image

    ( ) Virtual machine file system

    Answer: Data stored on virtual disk

    64) What is a feature of DNS server load balancing?

    ( ) IP addresses of application servers are mapped to a domain name

    ( ) IP addresses of the load balancers are mapped to a virtual IP address

    ( ) Domain names of application servers are mapped to the IP address of the load balancer

    ( ) IP addresses of the clients are mapped to the IP addresses of the application servers

    Answer: IP addresses of application servers are mapped to a domain name

    65) Which statement is true about application encapsulation?

    ( ) Application package contains built-in agents

    ( ) Application requires locally-installed agents for execution

    ( ) Encapsulated application overwrites the already existing application

    ( ) Application requires a local installation

    Answer: Application package contains built-in agents

    66) Which cloud service management process monitors and reports on allocation and utilization

    of resources by consumers in order to generate a chargeback report?

    ( ) Financial management

    ( ) Capacity management

    ( ) Service catalogue management

  • ( ) Performance management

    Answer: Financial management

    67) Which software allows an administrator to create and publish a service catalogue?

    ( ) Unified management

    ( ) User access management

    ( ) Virtual infrastructure management

    ( ) Element management

    Answer: User access management

    68) What is an example of cloud vendor lock-in?

    ( ) Application built on a PaaS model cannot be moved to an IaaS model

    ( ) A software vendor does not offer its software as a service

    ( ) Organization cannot move its existing licensed software into the cloud

    ( ) On-disk locking prevents simultaneous powering on of the same VM

    Answer: Application built on a PaaS model cannot be moved to an IaaS model

    69) What is true about the Trusted Computing Base in information security?

    ( ) Defines the boundary between security-critical and non-critical parts of an information

    system.

    ( ) Defines the policies of confidentiality, integrity, and availability of an information system

    ( ) Defines the boundary between internal and external networks in an organization

    ( ) Defines the policies of authentication, authorization, and auditing of an information system

    Answer: Defines the boundary between security-critical and non-critical parts of an information

    system

    70) Which storage array-based security mechanism helps restricting unauthorized host access

    to storage volumes?

  • ( ) LUN masking

    ( ) Sandboxing

    ( ) Intrusion detection system

    ( ) Demilitarized zone

    Answer: LUN masking