Friday, June 28, 2013

E10-001 Question 181

E10-001 Question 181
Which security feature is available in a Microsoft Windows file sharing environment using Network Attached Storage?



A. Windows Security Identifier (SID)
B. Discretionary Access Control Lists (DACL)
C. Operating System Control Lists (OSCL)
D. Global Unique Identifier (GUID)

Answer: B

Thursday, June 27, 2013

E10-001 Question 140

E10-001 Question 140
How do VSANs work?

A. Restricts communication between nodes located within the same VSAN and zone
B. Each VSAN acts as an independent fabric with its own set of fabric services
C. Enables assigning the same WWN and MAC addresses to nodes in different VSANs
D. Fabric-related configurations are uniformly applied to all VSANs

Answer: B

E10-001 Question 139

E10-001 Question 139
What is a sequence' in a Fibre Channel (FC) data structure?

A. Group of exchanges that are sent to another port to perform certain operations
B. Contiguous set of information units that map to a frame header
C. Upper layer protocol-specific information in a FC frame
D. Contiguous set of frames that correspond to an information unit

Answer: D

E10-001 Question 138

E10-001 Question 138
In an FC SAN environment, what does a Domain ID represent?

A. Switch port ID
B. Switch ID
C. Switch port card ID
D. WWN of a switch

Answer: B

E10-001 Question 137

E10-001 Question 137
How many Domain IDs are reserved in the fabric in the Fibre Channel address space?

A. 16
B. 17
C. 239
D. 256

Answer: C

E10-001 Question 136

E10-001 Question 136
What is a benefit of block-level storage virtualization?

A. Enables users to perform nondisruptive data migrations
B. Enables users to automatically perform zoning changes
C. Reduces application downtime during backups
D. Enables hosts to perform online path management

Answer: A

E10-001 Question 135

E10-001 Question 135
A customer wants the flexibility to attach any host to any switch port without affecting the zoning configurations. Which zoning method(s) should be recommended?

A. Mixed zoning
B. Port zoning
C. Both WWN and port zoning
D. WWN zoning

Answer: D

E10-001 Question 134

E10-001 Question 134
A customer requires a highly scalable SAN environment. Which SAN topology should be recommended?

A. Token ring
B. Full mesh
C. Bridged
D. Core-edge

Answer: D

E10-001 Question 133

E10-001 Question 133
Which cache management algorithm occurs continuously, at a modest rate, when the cache utilization level is between the high and low watermark?

A. Forced flushing
B. Idle flushing
C. Vault flushing
D. High watermark flushing

Answer: B

E10-001 Question 132

E10-001 Question 132
Consider a storage array with two LUNs that store data for the engineering and marketing departments One LUN is masked to the engineering department; the second LUN is masked to the marketing department.

What is a benefit of this architecture?

A. Both departments can access all the data
B. Both departments can replicate all the data
C. Data availability and performance is increased
D. Risk to data integrity and security is reduced

Answer: D