Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "E20-840" Exam

Storage Management Expert Exam for Technology Architects

 Question 1.
ITCertKeys.com's environment is configured as follows:2 Symmetrix Arrays, each with 1000 Logical Volumes and 2000 Front End Mappings.2 ED-140M directors, fully populated with ports.100 Open Systems Hosts, all with dual paths.

This environment is managed with Control Center installed in a single host infrastructure configuration residing on a host that has dual 3 GHz processors, 2GB of RAM and 50 GB of available storage. 

If ITCertKeys.com wants to install the web console on the Control Center server, what would you tell them?

A. That this is not a valid configuration. To install the Web Console on the infrastructure, the  
     server needs to have more and faster processors.
B. That this is a valid configuration. The Web Console can reside on this host with the Control  
     Center infrastructure components.
C. That this is not a valid configuration. To install the Web Console on the infrastructure, the  
     server needs to have more RAM.
D. That this is not a valid configuration. To install the Web Console on this server, it needs to 
     have more available storage.

Answer: C

Question 2.
ITCertKeys.com is planning to implement Control Center to manage their SAN, which consists of 4 DMX arrays, 2 M series switches and 40 hosts. As a result of a meeting to discuss the alert capability of Control Center, they express concerns about receiving alerts on temporary conditions. 

How would you respond to these concerns?

A. By turning off alerts about which ITCertKeys.com expresses concerns.
B. By explaining Control Center does not have the ability to handle alert spikes.
C. By explaining the before/after capability for alerts.
D. By suggesting a case be opened with support so a solution can be developed.

Answer: C

Question 3.
If ITCertKeys.com plans to deploy EMC Visual SRM in their environment, what dynamic will help them to determine which backend database (Oracle or SQL Server) to use?

A. The number of Databases, Exchange Servers and Files.
B. The number of Databases, Hosts, Storage Arrays and Switch Ports.
C. The number of Databases, Exchange Servers and Hosts.
D. The number of Databases, Exchange Servers, Hosts and Storage Arrays.

Answer: A

Question 4.
Some months ago, ITCertKeys.com installed Control Center as the main management tool.

What kind of Remote Management solution ought to be developed for them, so that the staff can solve Control Center problems during the night?

A. Install Control Center Web Server with the SSL option and have them connected and  
     authenticated through the Internet
B. Install a Citrix Server on a new Server and have them start a Console through a Citrix Client
C. Install Terminal Services on the Infrastructure Server and have them start a Console through 
     Terminal Services
D. Install a Citrix Server on the Infrastructure Server and have them start a Console through a 
     Citrix client

Answer: B

Question 5.
While considering the type and protection of the storage for the Control Center database, ITCertKeys.com is looking for a recommendation. 

Which option is recommended as best practice for database storage?

A. Use software based mirroring for the Control Center database
B. Due to the daily database exports unprotected disk is recommended
C. Use RAID-1 for the Control Center database
D. Use RAID-5 for the Control Center database

Answer: C

Question 6.
ITCertKeys.com is using Storage Scope as the reporting tool for multiple sites. They have a Management LAN in place, but they are unhappy because they have to login to Storage Scope every time they want to check a report. 

What can be done to negate this problem?

A. Configure Storage Scope properties so it allows bypassing login.
B. Customer can start a Control Center console without the login process and launch Storage 
    Scope from there.
C. Nothing, authentication is always required.
D. Nothing, there is always a login screen when Storage Scope is started from a browser.

Answer: A

Question 7.
You are tasked with the planning and design for Control Center Alerting in a ITCertKeys.com environment that consists of several CX500, CX600 and CX700 CLARiiON arrays. In addition to this, they also have 10 DMX2000s in their datacenter. 

Which of the following are valid statements with regards to implementing CLARiiON Performance Alerts into Control Center?

A. Performance Alerts are automatically sent to Control Center when the array is discovered
B. There are no CLARiiON Performance Alerts in Control Center
C. Setup SNMP Traps on the CLARiiON SP to send Performance Traps to the Storage Agent for 
    CLARiiON
D. Setup SNMP Traps on the CLARiiON SP to send Performance Traps to Control Center Server

Answer: B

Question 8.
You are planning a Control Center implementation for ITCertKeys.com and they indicate that they want to include 50 of their Oracle databases in Control Center Reports. They would like to receive reports on Table space utilization. 

With those numbers in mind, what needs to be considered?

A. You need to setup a DCP for each of those databases, after they are discovered.
B. Nothing at all, all databases are automatically discovered when the Agent is installed.
C. You need to setup Alerts for the table spaces in order to report utilization numbers.
D. You need to setup a DCP for all of those databases which is specified during the discovery 
     process.

Answer: A

Question 9.
ITCertKeys.com requires a Chargeback Report, which must be based on array devices allocated to each host. The cost of each device must be calculated based on array type, array model, as well as device size and device protection. The report must also display the cost per Host and Business Unit. 

What needs to be created if Control Center Storage Scope and Storage Scope FLR are deployed?

A. A custom layout of the Host Chargeback report in the Storage Scope Web Interface.
B. File Groups in Storage Scope FLR and use the Chargeback Summary Report.
C. A custom report with data from the Storage Scope API and customer supplied data.
D. A custom layout of the Array Device Allocation report in the Storage Scope Web Interface.

Answer: C

Question 10.
Of the following, which are the three broad Control Center Alerts categories? (Choose three)

A. Monitoring
B. Performance
C. Health
D. Free Space
E. Capacity

Answer: B, C, E

Question 11.
For a Control Center review and validation by the Solutions Validation Center (SVC), which two documents are vital? (Choose two)

A. Statement of Work (SOW)
B. Scope
C. Qualifier
D. Work Breakdown Structure

Answer: A, C

Question 12.
You have designed a Control Center configuration for a client. The implementation specialist calls you while they are on site and says that they are unable to discover the ED140M switches in Control Center. They can, however, see them in Connectrix Manager. 

What is the possible source of this problem?

A. DSM-Connect is not installed on the Connectrix Service Processor.
B. Symmwin is not installed on the Connectrix Service Processor.
C. The EOS version of firmware needs to be upgraded on the switches.
D. Fibre zone Bridge is not installed on the Connectrix Service Processor.

Answer: D

Question 13.
ITCertKeys.com is increasing their environment from 2 to 4 medium sized CLARiiON arrays, for which they currently have one Storage Agent. 

Which Control Center design change is required for this to be achieved?

A. Add additional CLARiiON agents for the growth.
B. Add more servers for additional agents and more memory to the existing servers.
C. Modify the CLARiiON WLA DCP's from 15 to 20 minutes.
D. Install a second infrastructure to handle the growth.

Answer: C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-019 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-019" Exam

ES Policy Enabled Networking

 Question 1.
Authentication is used in Secure Application Provisioning to:

A. Quarantine malicious traffic
B. Persistently apply policy
C. Allow configuration of a switch's host data port
D. provide additional network access

Answer:  D

Question 2.
Saving a NetSight Atlas Policy Manager configuration to a .pmd file:

A. Writes the configuration to NVRAM on the switches
B. Allows for multiple configurations to be stored on the NMS
C. Notifies the RADIUS server that new policies have been created
D. Temporarily disables communication between all RADIUS clients until the save is complete

Answer:  B

Question 3.
Certificate services must be installed when using:

A. EAP-TLS
B. EAP-MD5
C. PWA
D. MAC authentication

Answer:  A

Question 4.
Persistent policy assignment:

A. Can be effective in an incremental deployment of acceptable use policy
B. Is dependent upon a RADIUS back-end configuration
C. Is deployed based on user authentication
D. Cannot be used on uplink ports

Answer:  A

Question 5.
A distinguishing characteristic of PEAP is:

A. It adds security by running over a VPN tunnel
B. It uses salt encryption
C. It requires that only the supplicant present a certificate
D. It creates keying material using the Pseudo-Random Function

Answer:  D

Question 6.
In the Enterasys policy-enabled network model, on-demand policy assignment:

A. Is the result of a manual configuration
B. Makes use of the Filter-ID parameter
C. Is overridden by a ports default role
D. Requires the use of 802.1X authentication mechanisms

Answer:  B

Question 7.
All of the following are services which make up the pre-configured Acceptable Use Policy service group EXCEPT:

A. Deny Spoofing
B. Permit Legacy Protocols
C. Limit Exposure to DoS attacks
D. Protocol Priority Access Control

Answer:  B

Question 8.
After configuration changes have been made in NetSight Atlas Policy Manager, what must be done before the changes take effect on the devices?

A. The NMS must be rebooted
B. The changes must be enforced
C. The changes must be verified
D. Nothing the changes take effect immediately

Answer:  B

Question 9.
In the three-level policy model, Enterasys maps:

A. The business/network level to classification rules
B. The service-provisioning level to roles
C. The device level to classification rules
D. All of the above

Answer:  C

Question 10.
The Active Edge consists of:

A. Policy-enabled switches
B. Core routers
C. SAP servers
D. User resources

Answer:  A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.