How many additional FC-switch ports are required for an inline direct-attached FC-5XX DataFort?
A. 0
B. 1
C. 2
D. 4
E. 10
Answer: A
What is the purpose of the Key Policy setting for tapes?
A. It determines whether or not each tape has a unique key.
B. It determines whether or not tape encryption keys can be shared by DataFort appliances.
C. It determines whether or not tape encryption keys are written to tape.
D. It determines how frequently tape keys are backed up.
Answer: A
Which property must be set to prevent overlapped SCSI commands?
A. dfc.serialize_storage_cmds
B. dfc.disable_overlapped_cmds
C. dfc.disable_host_LIP
D. dfc.isp.enableTaskMgmtPassUp
Answer: A
What are three valid forced media type and duplex mode settings on the DataFort? (Choose
three.)
A. 1000baseTX, full-duplex
B. 1000baseTX, half-duplex
C. 100baseTX, full-duplex
D. 100baseTX, half-duplex
E. 10baseTX, half-duplex
Answer: A, C, D
What can the E-Series DataFort net util tcpdump command capture?
A. network packets going between two arbitrary machines
B. only network packets going between DataFort client-side NIC and arbitrary machines
C. only network packets going between DataFort server-side NIC and arbitrary machines
D. only network packets going between DataFort client-side NIC and server-side NIC
E. network packets going between DataFort client-side/server-side NIC and arbitrary machines
Answer: E
Which three switches support FL ports? (Choose three.)
A. Cisco 9513
B. Brocade 48000
C. McData 4700
D. McData 6140
Answer: A, B, C
The primary and disaster recovery sites are connected through IP across a WAN connection.
Which two key replication methods are supported between DataFort appliances at these sites?
(Choose two.)
A. Cryptainer Key File
B. clustering the DataFort appliances across sites
C. manual key translation through LKM
D. establishing trustee relationships
Answer: C, D
If your recovery schema is two out of five, how many Recovery Cards do you need to remove a
cluster member?
A. 0
B. 1
C. 2
D. 3
E. 5
Answer: A
In a 4-node DataFort cluster, how many distinct nodes can you perform global administrative
tasks on?
A. One, the member with the lowest ID
B. One, just the current cluster coordinator
C. Two, the head and first cluster member
D. Four
Answer: D
Which step is automatically performed when using host virtualization?
A. WWN forwarding for virtualized hosts
B. WWN forwarding when creating Cryptainer vaults
C. masking LUNs to the base WWN on the storage side and to the virtualized host WWN
D. granting Cryptainer access to virtualized hosts
E. adding the virtualized host WWN to the storage side zone
Answer: D
Which is an advantage of an asymmetric cryptosystem as compared to a symmetric
cryptosystem?
A. stronger asymmetric keys of the same length
B. public key distribution
C. better performance
D. truly random keys
Answer: B
What is the purpose of the Recovery Card schema?
A. It defines the number of Recovery Cards needed to form a quorum.
B. It determines where Recovery Cards must be presented.
C. It specifies the authentication mechanism used with Recovery Cards.
D. It determines where Recovery Card information is stored in the configuration database.
Answer: A
How many additional FC-switch ports are required for an inline direct-attached FC-5XX DataFort?A. 0B. 1C. 2D. 4E. 10Answer: AWhat is the purpose of the Key Policy setting for tapes?A. It determines whether or not each tape has a unique key.B. It determines whether or not tape encryption keys can be shared by DataFort appliances.C. It determines whether or not tape encryption keys are written to tape.D. It determines how frequently tape keys are backed up.Answer: AWhich property must be set to prevent overlapped SCSI commands?A. dfc.serialize_storage_cmdsB. dfc.disable_overlapped_cmdsC. dfc.disable_host_LIPD. dfc.isp.enableTaskMgmtPassUpAnswer: AWhat are three valid forced media type and duplex mode settings on the DataFort? (Choosethree.)A. 1000baseTX, full-duplexB. 1000baseTX, half-duplexC. 100baseTX, full-duplexD. 100baseTX, half-duplexE. 10baseTX, half-duplexAnswer: A, C, DWhat can the E-Series DataFort net util tcpdump command capture?A. network packets going between two arbitrary machinesB. only network packets going between DataFort client-side NIC and arbitrary machinesC. only network packets going between DataFort server-side NIC and arbitrary machinesD. only network packets going between DataFort client-side NIC and server-side NICE. network packets going between DataFort client-side/server-side NIC and arbitrary machinesAnswer: EWhich three switches support FL ports? (Choose three.)A. Cisco 9513B. Brocade 48000C. McData 4700D. McData 6140Answer: A, B, CThe primary and disaster recovery sites are connected through IP across a WAN connection.Which two key replication methods are supported between DataFort appliances at these sites?(Choose two.)A. Cryptainer Key FileB. clustering the DataFort appliances across sitesC. manual key translation through LKMD. establishing trustee relationshipsAnswer: C, DIf your recovery schema is two out of five, how many Recovery Cards do you need to remove acluster member?A. 0B. 1C. 2D. 3E. 5Answer: AIn a 4-node DataFort cluster, how many distinct nodes can you perform global administrativetasks on?A. One, the member with the lowest IDB. One, just the current cluster coordinatorC. Two, the head and first cluster memberD. FourAnswer: DWhich step is automatically performed when using host virtualization?A. WWN forwarding for virtualized hostsB. WWN forwarding when creating Cryptainer vaultsC. masking LUNs to the base WWN on the storage side and to the virtualized host WWND. granting Cryptainer access to virtualized hostsE. adding the virtualized host WWN to the storage side zoneAnswer: DWhich is an advantage of an asymmetric cryptosystem as compared to a symmetriccryptosystem?A. stronger asymmetric keys of the same lengthB. public key distributionC. better performanceD. truly random keysAnswer: BWhat is the purpose of the Recovery Card schema?A. It defines the number of Recovery Cards needed to form a quorum.B. It determines where Recovery Cards must be presented.C. It specifies the authentication mechanism used with Recovery Cards.D. It determines where Recovery Card information is stored in the configuration database.Answer: A
No comments:
Post a Comment
Leave Your Valuable Opinion