<< Prev Question Next Question >>

Question 88/106

Which management process ensures business continuity by eliminating single points of failure in a data center?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (106q)
Question 1: What is the correct sequence of steps in asynchronous remote...
Question 2: What is a benefit of defining a service template?...
Question 3: What is a function of service asset and configuration manage...
Question 4: An administrator plans to perform scheduled maintenance of a...
Question 5: Which type of zoning reduces the risk of WWPN spoofing on a ...
Question 6: What provides an on-demand self-service capability to consum...
Question 7: Which process enables a cloud service provider to ensure tha...
Question 8: Which VMware product automates performance, capacity, and co...
Question 9: An organization has a private cloud infrastructure. They wan...
Question 10: Which statement is true about the native file system of a hy...
Question 11: What is a virtual appliance?
Question 12: What describes the operation of the write-through cache in a...
Question 13: What is the correct sequence of steps in synchronous remote ...
Question 14: What is the Cloud Application Management for Platforms (CAMP...
Question 15: When configuring an authentication mechanism using Challenge...
Question 16: A cloud service provider plans to implement data deduplicati...
Question 17: What information is included in the service request issued b...
Question 18: Which mechanism in a Fibre Channel SAN prevents illegitimate...
Question 19: Which statement is true about virtual machine (VM) snapshots...
Question 20: In which step of the service enablement roadmap is the exist...
Question 21: In a FC SAN, which FC port type does an N_Port connect to?...
Question 22: What is a function of the service layer of a cloud infrastru...
Question 23: Which management process involves approving requests for exp...
Question 24: Refer to the Exhibit. (Exhibit) Which type of Fibre Channel ...
Question 25: Which technique of an intrusion detection and prevention sys...
Question 26: What could be a possible cause for the degradation in the pe...
Question 27: What is a characteristic of Simple Object Access Protocol (S...
Question 28: What is an accurate statement about reporting?...
Question 29: Which statement characterizes the software-defined approach ...
Question 30: An organization plans to deploy a community cloud on their p...
Question 31: Which document specifies the quality and reliability of Clou...
Question 32: Which product can automatically restart virtual machines on ...
Question 33: A storage system is configured with erasure coding. The data...
Question 34: Which role in a cloud provider organization is responsible f...
Question 35: Which resource management technique identifies and eliminate...
Question 36: Which statement describes the service portfolio management f...
Question 37: Who maintains the credential information of consumers when a...
Question 38: What is the Open Cloud Computing Interface (OCCI) standard?...
Question 39: Which security product enables detection and investigation o...
Question 40: Which image represents the correct sequence of steps in an O...
Question 41: Which image represents the correct sequence of steps in a Ke...
Question 42: What is included in service templates?...
Question 43: Which activity is carried out during the service termination...
Question 44: Which RAID type uses parity to protect against data loss?...
Question 45: Which cloud service model enables an organization to deploy ...
Question 46: What is a function of financial management?...
Question 47: Which EMC product discovers infrastructure components and de...
Question 48: Which entities are involved in the OAuth mechanism?...
Question 49: What is an advantage of synchronous remote replication?...
Question 50: Which security product enables an organization to manage ris...
Question 51: Dynamic virtual machine (VM) load balancing across storage v...
Question 52: What is a function of the control layer of a cloud infrastru...
Question 53: Which mechanism in a Fibre Channel SAN prohibits a disabled ...
Question 54: Which RSA product enables multi-factor authentication?...
Question 55: Which EMC product enables the backing up of data directly fr...
Question 56: Which encapsulation function is performed by a Fibre Channel...
Question 57: A service is offered to a consumer from 9 A.M. to 6 P.M. Mon...
Question 58: A compute system is configured to access data from a block-b...
Question 59: What is graceful degradation of an application?...
Question 60: An organization plans to migrate an application that has loo...
Question 61: What is a service contract?
Question 62: What is used to prioritize the latency-sensitive network tra...
Question 63: A cloud service provider is concerned about an attacker gain...
Question 64: What is a benefit of standardizing the cloud interface?...
Question 65: What is a benefit of hyper-threading?...
Question 66: Which network virtualization technique enables nodes at two ...
Question 67: In the event of a virtual machine failure, which technique p...
Question 68: What is a benefit of the discovery operation in a cloud?...
Question 69: Which EMC product offers customers a choice of hypervisor, c...
Question 70: Refer to the Exhibit. (Exhibit) Which type of Fibre Channel ...
Question 71: A provider offers a 24x7 online service to consumers. The se...
Question 72: What enables a cloud service provider to determine if a requ...
Question 73: Which Fibre Channel switch mechanism logically segments node...
Question 74: In which chargeback model do consumers commit up-front on th...
Question 75: Which factors should be considered when establishing a billi...
Question 76: What helps in analyzing the utilization and the consumption ...
Question 77: What needs to be considered before performing the discovery ...
Question 78: Which layer of a cloud infrastructure includes tools that op...
Question 79: Consider a virtual machine (VM) with 2 GB memory capacity an...
Question 80: What is an OpenID mechanism?
Question 81: What is an advantage of asynchronous remote replication?...
Question 82: Which solution would improve the performance of an applicati...
Question 83: What operation is supported by Representational State Transf...
Question 84: A storage system is configured with erasure coding. The data...
Question 85: An attacker eavesdrops on a network to capture a consumer's ...
Question 86: An organization wants to leverage the infrastructure resourc...
Question 87: What is a characteristic of cloud service management?...
Question 88: Which management process ensures business continuity by elim...
Question 89: What is the effect of network broadcast traffic reaching the...
Question 90: A cloud service provider is concerned about the security ris...
Question 91: When virtual machines (VMs) are running on a compute cluster...
Question 92: Which activity is carried out during the 'Plan' step of the ...
Question 93: Which process ensures that users are who they claim to be?...
Question 94: What principle is supported by Representational State Transf...
Question 95: In a cloud infrastructure, the computer systems of multiple ...
Question 96: What is enabled by cache tiering?...
Question 97: What is a benefit of service orchestration?...
Question 98: What is a benefit of personalizing a cloud portal?...
Question 99: Refer to the Exhibit. (Exhibit) Which step in the service ca...
Question 100: What is the role of a proxy server in an image-based backup ...
Question 101: In which phase of the cloud service lifecycle are service in...
Question 102: What is provided by an uplink NIC used in a virtual machine ...
Question 103: Which EMC product provides a solution for software-defined s...
Question 104: Which protocol is most commonly used for compute-to-computer...
Question 105: What is a benefit of server-flash cache technology?...
Question 106: What is a function of the management interface of cloud serv...