Emc E05 001
Emc E05 001
Emc E05 001
EMC
Exam E05-001
Information Storage and Management Version 3 Exam
Version: 6.0
A. Object-based
B. Block-based
C. File-based
D. Unified-based
Answer: A
Question No : 2
What is the minimum number of disk drives needed to meet the applications capacity and
performance requirements given a RAID 0 configuration?
A. 6
B. 16
C. 25
D. 28
Answer: D
Question No : 3
A. Facilitates moving data from primary storage to secondary storage based on pre-defined
policies
B. Creates a stub file in secondary storage pointing to data on the primary storage
C. Ensures that primary and secondary storage have identical data for compliance
D. Runs the backup agent and determines the files to be copied to the secondary storage
Answer: A
Question No : 4
Which type of digital data consists of textual data with inconsistent formats but can be
formatted with the use of software tools?
A. Quasi-structured data
B. Semi-structured data
C. Metadata
D. Unstructured data
Answer: A
Question No : 5
Which cloud computing characteristic enables multi-tenancy and abstracts the location of
provided resources?
A. Resource pooling
B. Measured service
C. Rapid elasticity
D. Broad network access
Answer: A
Question No : 6
Answer: A
Question No : 7
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
Answer: B
Question No : 8
Answer: A
Question No : 9
Answer: A
Question No : 10
Which attack is carried out by sending a spoofing e-mail and redirecting a user to a false
website?
A. Phishing
B. Man-in-the-middle
C. Denial-of-service
D. Repudiation
Answer: A
Question No : 11
Question No : 12
Which global addressing does the REST application programming interface use for the
discovery of a storage service?
Answer: A
Question No : 13
A start-up company with a limited budget is planning to adopt a hybrid cloud solution for
their operations. The company has business-critical applications that serve customers and
have strict service levels. In addition, the company has less critical applications such as
backup and archive.
Answer: A
Question No : 14
Answer: A
Question No : 15
What is an accurate statement about the Common Internet File System (CIFS) protocol?
Answer: A
Question No : 16
What contains the information about backup configuration and backup metadata?
A. Backup catalog
B. Proxy server
C. Tracking database
D. Backup image
Answer: A
Question No : 17
Which EMC product provides a software-defined storage platform that supports object
storage services?
Answer: A
Question No : 18
Answer: A
Question No : 19
Answer: A
Question No : 20
A system has three components and all three components need to be operational for 24
hours; Monday through Friday. During a particular week, failure of component 1 occurred
as follows:
Tuesday = 8 AM to 11 AM
Thursday = 8 PM to 10 PM
What is the mean time between failures on component 1 for that week?
A. 3 hours
B. 37 hours
C. 40 hours
D. 53 hours
Answer: B
Question No : 21
Which part of the Fibre Channel (FC) frame does the label X represent in the exhibit?
A. Frame Header
B. CRC
C. SOF
D. Data Field
Answer: A
Question No : 22
Which EMC block-based storage system uses a cluster design to scale both capacity and
performance?
A. XtremIO
B. Isilon
C. XtremSF
D. ScaleIO
Answer: A
What enables an administrator to create device groups in an IP-SAN for restricting device
communications to a group?
Answer: A
Question No : 24
Answer: A
Question No : 25
A. REST API
B. Metadata service
C. SDS web service
D. Storage agent
Answer: A
Question No : 26
A. Gateway
B. Scale-out
C. Unified
D. Integrated
Answer: A
Question No : 27
A. ScaleIO
B. XtremIO
C. Isilon
D. Atmos
Answer: A
Question No : 28
Answer: A
Question No : 29
Which lossless Ethernet functionality helps Converged Enhanced Ethernet (CEE) devices
to convey and configure their features with the other CEE devices in the network?
Answer: A
Question No : 30
A. Confidentiality
B. Integrity
C. Availability
D. Repudiation
Answer: A
Question No : 31
Which data center management process involves collating and presenting the utilization of
resources?
A. Reporting
B. Provisioning
C. Planning
D. Maintenance
Answer: A
Question No : 32
What is a function of the FC-1 layer of the Fibre Channel (FC) protocol stack?
Answer: A
Question No : 33
Answer: A
Question No : 34
An administrator has defined a backup policy. Full backups will be performed at 8 PM every
Monday and incremental backups performed at 8 PM the remaining days.
How many backup copies are required to restore the files if they were accidentally deleted
on Friday morning?
A. 1
B. 2
C. 3
D. 4
Answer: D
Question No : 35
Answer: B
Question No : 36
Answer: A
Question No : 37
An organization performs a full back up every Sunday and cumulative back ups on the
remaining days. On Thursday, a data corruption occurs that requires a data restoration
from the backup copies.
A. 1
B. 2
C. 3
D. 4
Answer: B
Question No : 38
A. Both transmitting and receiving ports agree on the number of buffers available during
Answer: A
Question No : 39
A. SW-RSCN
B. Management server
C. Zoning
D. FLOGI
Answer: A
Question No : 40
Answer: A
Question No : 41
Which type of login is performed between an N_Port and an F_Port in a Fibre Channel
SAN environment?
A. FLOGI
B. PLOGI
Answer: A
Question No : 42
What is the minimum number of disk drives needed to meet the applications capacity and
performance requirements given a RAID 0 configuration?
A. 8
B. 70
C. 110
D. 140
Answer: C
Question No : 43
Answer: A
Question No : 44
Answer: A
Question No : 45
A. ECS Appliance
B. XtremIO
C. Data Domain
D. Centera
Answer: A
Question No : 46
Which type of LUN provides full control for precise data placement and allows an
administrator to create LUNs on different RAID sets if there is workload contention?
A. Traditional
B. Thin
C. Journal
D. Bitmap
Answer: A
Question No : 47
Answer: A
Question No : 48
What is an accurate statement about VLANs and VSANs in an FCoE environment with an
existing FC SAN?
Answer: A
Question No : 49
Answer: A
Question No : 50
Which data structure enables two node ports to identify and manage a set of information
units in a Fibre Channel (FC) SAN?
A. Exchange
B. Sequence
Answer: A
Question No : 51
Which type of storage system is built specifically for storing fixed content?
Answer: A
Question No : 52
Answer: A
Question No : 53
A. ViPR SRM
B. SnapSure
C. Avamar
D. FAST VP
Question No : 54
Which method is used to establish a VPN connection between a primary and remote data
center to perform secure remote replication?
Answer: A
Question No : 55
A. Reads the data from the storage device and sends the data to the backup device
B. Reads the data from the backup server and sends the data to the backup device
C. Instructs the NAS head to startthe backup operation
D. Instructs the backup agent on the client to send the data to the backup device
Answer: A
Question No : 56
Answer: A
Question No : 57
A. NSX
B. ESXi
C. Horizon
D. AirWatch
Answer: A
Question No : 58
Which action takes place during the login phase in an FCoE SAN?
Answer: A
Question No : 59
A. Ability to pool and abstract physical storage and presentit as an open storage platform
B. Ability for multiple operating systems to run concurrently on a single physical compute
system
C. Mechanisms to automatically create application programming interfaces for centralized
management
D. Single self-contained package with integrated hardware and software components
Answer: A
An organization has several virtual machines (VMs) deployed in their data center. The VM
files are stored on a block-based storage system. The applications on the VMs are
impacted during VM backup because the backup agents on the VMs are consuming a large
amount of resources.
A. Image-based backup
B. Three-way NDMP backup
C. Two-way NDMP backup
D. Target-based deduplication backup
Answer: A
Question No : 61
Which data center characteristic ensures that data is stored and retrieved exactly as it was
received?
A. Data integrity
B. Security
C. Scalability
D. Manageability
Answer: B
Question No : 62
Which method does an intrusion detection and prevention system (IDPS) use to identify
intrusions by scanning and analyzing events to detect if they are statistically different from
normal events?
A. Anomaly-based
B. Signature-based
C. Profile-based
D. Device-based
Question No : 63
Answer: C
Question No : 64
Answer: A
Question No : 65
Answer: A
A. Combines two or more parallel interswitch links into a single logical interswitch link
B. Aggregates the data transmission rate of all HBA and storage system port pairs
C. Consolidates compute-to-compute traffic and storage traffic into a single interswitch link
D. Replaces multiple parallel interswitch links by a single physical interswitch link
Answer: A
Question No : 67
Answer: A
Question No : 68
A. Controller
B. I/O interface
C. Non-volatile memory
D. Cache
Answer: A
Question No : 69
Which data center characteristic ensures that adequate resources are provided to
efficiently store and process data?
Answer: A
Question No : 70
In an object-based storage system, data is divided into 9 data segments and 3 coding
segments using the erasure coding technique. What is the maximum number of disk drive
failures against which data is protected by this configuration?
A. 3
B. 6
C. 9
D. 12
Answer: A
Question No : 71
Answer: A
Question No : 72
Answer: A
Question No : 73
Answer: A
Question No : 74
Answer: A
Question No : 75
An application generates 8400 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 5 configuration?
A. 4800
B. 11200
C. 16800
D. A.22400
Question No : 76
Answer: A
Question No : 77
Which feature of an object-based storage system abstracts and provides a common view of
storage independent of location to applications?
A. Global namespace
B. Flexible data access
C. Multi-tenancy
D. Scale-out architecture
Answer: A
Question No : 78
Answer: A
Question No : 79
Answer: A
Question No : 80
Answer: A
Question No : 81
Which product provides an integrated IT infrastructure solution for data center deployment
by combining IT resources into a single package?
A. VCE Vblock
B. EMC VPLEX
C. EMC ViPR
D. VMware vCloud
Answer: A
Which benefit does the measured service characteristic provide to a cloud service
provider?
Answer: A
Question No : 83
Answer: A
Question No : 84
An application generates 8400 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 1/0 configuration?
A. 5600
B. 11200
C. 16800
D. 22400
Answer: B
Question No : 85
Answer: A
Question No : 86
A. SDS controller
B. REST API
C. SDS web service
D. Storage agent
Answer: A
Question No : 87
A. Ensures disaster recovery protection remains available in the event of source or remote
site failures
B. Provides the capability to recover data to any point-in-time
C. Requires low network bandwidth to perform synchronous replication
D. Enables a consistent near-zero RPO in the event of source and remote site failures
Answer: A
Question No : 88
What is the minimum number of disk drives needed to meet the applications capacity and
performance requirements given a RAID 0 configuration?
A. 8
B. 20
C. 30
D. 45
Answer: D
Question No : 89
A. Application executes remotely and its user interface is transmitted to the client
B. Application is downloaded in portions onthe client for local execution
C. Application executes on the client without the use of a locally-installed agent
D. Application is converted into a standalone package that directly executes on the client
Answer: A
Question No : 90
Answer: A
Question No : 91
Answer: D
Question No : 92
Which fabric login type enables two N_Ports to exchange service parameters to establish a
session?
A. PLOGI
B. PRLI
C. FLOGI
D. WWPN
Answer: A
Question No : 93
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
Answer: D
Question No : 94
What determines how far back the recovery points can go in a continuous data protection
(CDP) solution?
Answer: A
Question No : 95
A. Post-process
B. Source-based global deduplication
C. Variable-length segment and source-based
D. Fixed-length block and source-based
Answer: A
Question No : 96
Answer: A
Question No : 97
What is an accurate statement about the Network File System (NFS) protocol?
Answer: A
Question No : 98
Answer: A
Question No : 99
A. Secret-key cryptography
B. One-way hash function
Answer: A
Question No : 100
In continuous data protection (CDP) remote replication, where are the two split write I/Os of
an incoming write I/O directed?
A. One I/O goes to the local CDP appliance and the other I/O goes to the production
volume
B. One I/O goes to the compute system and the other I/O goes to the production volume
C. One I/O goes to the remote CDP appliance and the other I/O goes to the replica
D. One I/O goes to the journal volume and the other I/O goes to the replica
Answer: A
Question No : 101
What maps the logical path of a file system to its physical path in a file-level virtualization
implementation?
A. Global namespace
B. Remote procedure call
C. Distributed file system
D. Cache coherency
Answer: A
Question No : 102
Which fabric login type occurs between two N_Ports to exchange FC-4 upper layer
protocol-related parameters?
A. PRLI
B. FLOGI
Answer: A
Question No : 103
An organization performs a full back up every Sunday and incremental back ups on the
remaining days at 9:00 AM. However, at 10 PM on Friday, a data corruption occurs that
requires a data restoration from the backup copies.
A. 2
B. 4
C. 5
D. 6
Answer: D
Question No : 104
Answer: A
Question No : 105
An application generates 4200 small random I/Os at peak workloads with a read/write ratio
of 2:1. What is the disk load at peak activity for a RAID 6 configuration?
A. 2800
Answer: D
Question No : 106
A. Ethernet Bridge
B. Virtual N_Port
C. Converged Network Adapter
D. FCIP Forwarder
Answer: A
Question No : 107
Answer: A
Question No : 108
A. Partial mesh
B. Full mesh
C. Single core-edge
D. Dual core-edge
Answer: A
Question No : 109
An organization plans to deploy a new backup device in their data center. The organization
wants the new backup device to support their legacy backup software without requiring any
changes to the software. In addition, the organization wants the backup device to provide
random data access for better performance.
Answer: A
Question No : 110
Answer: A
Question No : 111
Answer: A
Question No : 112
Answer: A
Question No : 113
Question No : 114
Answer: A
Question No : 115
A system has three components and all three components need to be operational for 24
hours; Monday through Friday. During a particular week, failure of component 3 occurred
as follows:
Tuesday = 8 AM to 1 PM
Thursday = 5 PM to 10 PM
Friday = 5 AM to 10 AM
What is the mean time between failures on component 3 for that week?
A. 5 hours
B. 35 hours
C. 40 hours
D. 51 hours
Answer: B
Question No : 116
Answer: A
Question No : 117
Which type of digital data has no defined format but has a self-describing structure that
enables its analysis?
A. Semi-structured data
B. Structured data
C. Metadata
D. Quasi-structured data
Answer: A
Question No : 118
In an object-based storage system, data is divided into 10 data segments and 4 coding
segments using the erasure coding technique. What is the maximum number of disk drive
failures against which data is protected by this configuration?
A. 4
B. 6
C. 10
D. 14
Answer: A
Question No : 119
Answer: A
Question No : 120
What provides the ability to automatically relocate extents across physical storage drives
over the entire pool when new drives are added to the pool?
Answer: A
Question No : 121
A. Enables initiators and targets to authenticate each other by using a shared secret code
B. Provides strong authentication for client-server applications by using secret-key
cryptography
C. Allows a client to access protected resources from a resource server on behalf of a
resource owner
D. Enables an organization to use authentication services from an identity provider
Answer: A
Question No : 122
Answer: A
Question No : 123
Answer: A
Question No : 124
To improve performance, which EMC product allows a PCIe flash card to be deployed in a
compute system?
A. XtremSF
B. XtremCache
C. ScaleIO
D. XtremIO
Answer: A
Question No : 125
Answer: A
Question No : 126
Which process groups multiple physical drives and presents them to a compute system as
a single logical volume?
A. Concatenation
B. Partitioning
C. Striping
D. Orchestration
Answer: A
Question No : 127
Which data access method enables a compute system to access a file system that resides
on a storage system?
A. File-based
B. Block-based
C. Object-based
D. Sector-based
Answer: A
Question No : 128
Answer: A
Question No : 129
What does the transformation of an operating model for third platform adoption involve?
Answer: A
Question No : 130
A. Operating system and applications hosted on a remote compute system are shared by
multiple users
B. Users are provided dedicated virtual machines running operating system and
applications, and hosted on a client system
C. Users have the flexibility to install applications and modify operating system settings on
the remote compute system
D. Users' interface of the remote desktop is transmitted to the client without the use of a
remote display protocol
Answer: A
Question No : 131
Answer: A
Question No : 132
A. Information availability
B. Disaster recovery
C. Compliance adherence
D. Business agility
Answer: A
Question No : 133
Answer: A
Question No : 134
Answer: A
Question No : 135
In which stage of the business continuity planning lifecycle does an organization identify
critical business processes and assign recovery priorities?
A. Analyzing
B. Establishing objectives
C. Designing and developing
D. Implementing
Answer: A
Question No : 136
Which EMC product provides a software-defined platform that supports both block and file
storage services?
A. ViPR Controller
B. ScaleIO
C. Elastic Cloud Storage
D. XtremIO
Answer: A
Question No : 137
Question No : 138
A customer has a requirement to perform a backup each night. However, the customer has
a limited amount of time for backups to run on week nights,Monday through Friday
evenings.
Which backup granularity type is recommended to meet the backup window for those
nights?
A. Incremental
B. Cumulative
C. Full
D. Differential
Answer: C
Question No : 139
A. Abstracts and separates the control plane from the data plane
B. Data plane sends instructions to the controlplane to handle network traffic
C. Controller in network switchestakes over data plane functions
D. External software combines both data plane and control plane functions
Answer: A
Question No : 140
Answer: A
Question No : 141
What improves the performance of multi-threaded large block I/O workloads on a solid
state drive?
Answer: A
Question No : 142
Answer: A
Question No : 143
Question No : 144
Answer: A
Question No : 145
Answer: A
Question No : 146
A. Each user is provided a dedicated desktop VM with its own operating system and
applications
B. Operating system and applications hosted on a client system are shared by multiple
users
C. Each user has an individual desktop session on the remote compute system in which
applications execute
D. Operating system and applications on the remote desktop are downloaded on the client
for local execution
Answer: A
Question No : 147
Which operation is performed by a scale-out NAS cluster when clients send data to the
cluster?
Answer: A
Question No : 148
Answer: A
Question No : 149
Answer: A
Question No : 150
Answer: A
Question No : 151
Answer: A
Question No : 152
Which LUN expansion technique provides both capacity expansion and performance
improvement?
A. Striped metaLUN
B. Partitioned metaLUN
C. Virtual metaLUN
D. Concatenated metaLUN
Answer: A
Question No : 153
A. Full mesh
B. Partial mesh
C. Single core-edge
D. Dual core-edge
Answer: A
Which type of Fibre Channel (FC) ports do the labels "X" and "Y" represent in the exhibit?
Answer: D
Question No : 155
Answer: A
Question No : 156
A. Write-back cache
B. Write-through cache
C. Read miss
D. Read hit
Answer: A
Question No : 157
Answer: D
Question No : 158
A. Allows network traffic from multiple VSANs to traverse a single interswitch link
B. Enables an F_Port to transfer multiple VSAN traffic over a single port channel
C. Provides VSAN IDs to F_Ports to include them in the VSANs
D. Forwards FC frames between F_Ports that belong to the same VSAN
Answer: A
A. Vaulting
B. Mirroring
C. Cache tiering
D. Idle flushing
Answer: A
Question No : 160
The exhibit illustrates a software-defined storage environment. What do the labels X and
Y represent in the exhibit?
Answer: A
Question No : 161
In an FC SAN environment, which security mechanism prevents a switch port from being
enabled even after a switch reboot?
A. Port locking
B. Port type locking
C. Port binding
D. Fabric binding
Answer: A
Question No : 162
A. Supports data and application portability for load balancing between clouds
B. Allows organizations with common concerns to share the cost of deploying the cloud
C. Enables the entire cloud infrastructure to be controlled by the consumers IT staff
D. Allows an organization to outsource the implementation of a private cloud to a cloud
provider
Answer: A
Question No : 163
Answer: A
Question No : 164
Which EMC product provides a remote replication solution for EMC VMAX3 storage
systems?
A. SRDF
B. SnapSure
C. MirrorView
D. ProtectPoint
Answer: A
Question No : 165
What is a benefit of configuring EX_Ports on each Fibre Channel over IP (FCIP) gateway in
an FCIP tunnel implementation?
A. Enables FC-FC routing through the FCIP tunnel without merging the fabrics
B. Merges the fabrics at either end of the FCIP tunnelto create a single large fabric
C. Transfers VSAN tagged traffic over the FCIP tunnel without FC protocol overhead
D. Creates eight virtual FC links on the FCIP tunnel that can be paused and restarted
independently
Answer: A
Question No : 166
In which data access method does the file system access an iSCSI storage system over a
network?
A. Block-based
B. File-based
C. Object-based
D. Sector-based
Answer: A
A. Infrastructure as a Service
B. Platform as a Service
C. Database as a Service
D. Software as a Service
Answer: A
Question No : 168
Which fabric service distributes SW-RSCNs to the other switches in a Fibre Channel SAN?
A. Fabric controller
B. Fabric login server
C. Name server
D. Fabric management server
Answer: A
Question No : 169
Answer: A
Question No : 170
The exhibit represents an FCIP tunnel configuration that merges the two FC SANs at either
Answer: A
Question No : 171
Which process uses a file-level storage tiering technique to perform policy-based data
movement?
A.
Archiving
B.
Deduplication
C.
Replication
D.
Backup
Answer: A