If a DataFort 2.x or later appliance fails, which three information sources can be used with the
DataFort Wizard to recreate the configuration information on a replacement? (Choose three.)
A. *.xdf file from LKM software/appliance
B. mysqldump of DataFort configDB
C. *.xdf file from manual backup
D. *.lkm file from LKM software/appliance
E. surviving cluster member
Answer: A, C, E
If you have an 8-node cluster, how many members must be online in the cluster in order to create
Cryptainer vaults?
A. 1
B. 4
C. 5
D. 8
Answer: C
Which two key policies allow for all keys to be pre-generated and replicated to the DR site?
(Choose two.)
A. Key per tape
B. Key per pool
C. Global Pool with single key
D. Periodic disk rekey
Answer: B, C
What is the maximum number of hosts supported by an FC525?
A. 16
B. 32
C. 160
D. 256
Answer: B
Which property must be set to prevent overlapped SCSI commands?
A. dfc.serialize_storage_cmds
B. dfc.disable_overlapped_cmds
C. dfc.disable_host_LIP
D. dfc.isp.enableTaskMgmtPassUp
Answer: A
How many Recovery Card(s) are required to change the password of a single card if the recovery
schema is 2 out of 5?
A. 0
B. 1
C. 2
D. 5
Answer: B
The tape drives are operating at maximum throughput at 2:1 compression. How many LTO2 tape
drives can be used with an FC1020 before becoming throughput limited?
A. 3
B. 5
C. 15
D. 25
E. 35
Answer: C
Which three switches support FL ports? (Choose three.)
A. Cisco 9513
B. Brocade 48000
C. McData 4700
D. McData 6140
Answer: A, B, C
In SAN 2.x, how many targets can be virtualized on an FC520?
A. 1
B. 7
C. 8
D. 31
Answer: B
Which two statements are true if a System Card is removed in a functional, fully initialized
DataFort? (Choose two.)
A. Encryption services are disabled after a reboot.
B. Encryption services halt within five minutes of card removal.
C. Recovery Card replacement does not work.
D. DataFort sends SNMP trap and initiates shutdown to protect access to encrypted data.
Answer: A, C
The E-Series DataFort Local ACL feature is designed to prevent unauthorized Windows
administrators from gaining Cryptainer access by adding themselves to _____.
A. The DataFort Local ACL
B. The share ACL
C. A group on the server ACL
D. A Cryptainer ACL
Answer: B
Which two statements are true? (Choose two.)
A. One Cryptainer is created per LUN.
B. The original LUN ordering is always preserved for LUN Mapped Cryptainer vaults.
C. The Cryptainer cannot be deleted if it is mapped to host devices.
D. The original LUN ordering is always preserved for Port Mapped Cryptainer vaults.
Answer: A, D
If a DataFort 2.x or later appliance fails, which three information sources can be used with theDataFort Wizard to recreate the configuration information on a replacement? (Choose three.)A. *.xdf file from LKM software/applianceB. mysqldump of DataFort configDBC. *.xdf file from manual backupD. *.lkm file from LKM software/applianceE. surviving cluster memberAnswer: A, C, EIf you have an 8-node cluster, how many members must be online in the cluster in order to createCryptainer vaults?A. 1B. 4C. 5D. 8Answer: CWhich two key policies allow for all keys to be pre-generated and replicated to the DR site?(Choose two.)A. Key per tapeB. Key per poolC. Global Pool with single keyD. Periodic disk rekeyAnswer: B, CWhat is the maximum number of hosts supported by an FC525?A. 16B. 32C. 160D. 256Answer: BWhich property must be set to prevent overlapped SCSI commands?A. dfc.serialize_storage_cmdsB. dfc.disable_overlapped_cmdsC. dfc.disable_host_LIPD. dfc.isp.enableTaskMgmtPassUpAnswer: AHow many Recovery Card(s) are required to change the password of a single card if the recoveryschema is 2 out of 5?A. 0B. 1C. 2D. 5Answer: BThe tape drives are operating at maximum throughput at 2:1 compression. How many LTO2 tapedrives can be used with an FC1020 before becoming throughput limited?A. 3B. 5C. 15D. 25E. 35Answer: CWhich three switches support FL ports? (Choose three.)A. Cisco 9513B. Brocade 48000C. McData 4700D. McData 6140Answer: A, B, CIn SAN 2.x, how many targets can be virtualized on an FC520?A. 1B. 7C. 8D. 31Answer: BWhich two statements are true if a System Card is removed in a functional, fully initializedDataFort? (Choose two.)A. Encryption services are disabled after a reboot.B. Encryption services halt within five minutes of card removal.C. Recovery Card replacement does not work.D. DataFort sends SNMP trap and initiates shutdown to protect access to encrypted data.Answer: A, CThe E-Series DataFort Local ACL feature is designed to prevent unauthorized Windowsadministrators from gaining Cryptainer access by adding themselves to _____.A. The DataFort Local ACLB. The share ACLC. A group on the server ACLD. A Cryptainer ACLAnswer: BWhich two statements are true? (Choose two.)A. One Cryptainer is created per LUN.B. The original LUN ordering is always preserved for LUN Mapped Cryptainer vaults.C. The Cryptainer cannot be deleted if it is mapped to host devices.D. The original LUN ordering is always preserved for Port Mapped Cryptainer vaults.Answer: A, D
No comments:
Post a Comment
Leave Your Valuable Opinion