Which technology decouples the OS, applications, and user state from a physical compute system?
Which technology decouples the OS, applications, and user state from a physical compute system?A . Application virtualizationB . Storage virtualizationC . Thin client virtualizationD . Desktop virtualizationView AnswerAnswer: D
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?A . Dell InTrustB . Dell Change AuditorC . VMware AppDefenseD . VMware AirWatchView AnswerAnswer: A
Which cloud service model provides the highest level of control over operating systems, applications, and storage?
Which cloud service model provides the highest level of control over operating systems, applications, and storage?A . Platform as a Service (PaaS)B . Software as a Service (SaaS)C . Infrastructure as a Service (IaaS)D . Function as a Service (FaaS)View AnswerAnswer: C
What is an advantage of performing capacity monitoring in a storage infrastructure environment?
What is an advantage of performing capacity monitoring in a storage infrastructure environment?A . Automatically identifying configuration changes to the storage infrastructure elementsB . Rapidly identifying component failures that may lead to storage unavailabilityC . Efficiently tracking unauthorized access to the storage infrastructure elementsD . Proactively preventing service outages due...
What accurately describes an attack surface in an IT infrastructure?
What accurately describes an attack surface in an IT infrastructure?A . Various entry points that can be used to launch an attackB . Series of steps that must be followed in order to complete an attackC . Amount of effort required to exploit a vulnerability in the infrastructureD . Process...
What information is available in a capacity planning report for storage infrastructure?
What information is available in a capacity planning report for storage infrastructure?A . number of units of storage available, used and the costB . current and historic information about the utilization of storage, file systems, and portsC . equipment purchase dates, licenses, lease status, and maintenance recordsD . current and...
What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?
What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?A . Utilizes preconfigured preinstalled and prepackaged vendor ready solutionsB . Combines the datacenter components into a single standalone computing platform managed by softwareC . Utilizes products and services from the vendors that provide specific functions with more...
Which of the following are key characteristics of Big Data? (Choose two)
Which of the following are key characteristics of Big Data? (Choose two)A . VarietyB . VelocityC . VeracityD . VulnerabilityView AnswerAnswer: AB
What does the "variability" characteristic of big data signify?
What does the "variability" characteristic of big data signify?A . Importance in obtaining the right information from data at all possible contextsB . Cost-effectiveness and business value obtained from massive volumes of dataC . Diversity in the formats and types of data generated from various sourcesD . mportance in the...
What is the availability of Port 5 in that week?
A Fibre Channel switch has eight ports and all ports must be operational 24 hours 7 days. However, a failure of Port 5 occurs on a particular week as follows: - Monday = 11 AM to 3 PM - Thursday = 6 AM to 11 AM - Saturday = 11...