|Exam Name||:||Cloud Infrastructure and Services|
|Questions and Answers||:||118 Q & A|
|Updated On||:||February 22, 2018|
|PDF Download Mirror||:||[E20-002 Download Mirror]|
|Get Full Version||:||Pass4sure E20-002 Full Version|
Which Cloud deployment model(s) is considered suitable for most start-up organizations?
Private Cloud only
Hybrid Cloud only
Both Private and Hybrid Cloud
Which Cloud deployment model(s) is considered most suitable for Tier 1 applications for the small to medium sized business (SMB) segment?
Public Cloud only
Hybrid Cloud only
Both Public and Hybrid Cloud
Which type(s) of application involves higher risk when moving to the Cloud?
Proprietary and mission critical
Backup and testing
Proprietary but not mission critical
Non-proprietary and non-mission critical
Which document defines the quality and reliability of Cloud services?
Regulatory Compliance Document
Service Charge Rate Specification
Service Level Agreement
Service Contract Agreement
An organization is planning to migrate its operations to the Cloud. There are several Cloud vendors that can provide the required services. Which is the primary factor that the organization should consider when selecting the vendor?
Ease of adding or removing services from the vendor
Identity of the vendor's existing clients
Range of value added services the vendor provides
The current market share of the vendor
Which step of the "Journey to the Cloud" allows pooling of resources?
Virtualizing the IT environment
Automating resource management processes
Which is a benefit of a virtualized environment?
Transparent Provider-to-Provider migrations
Optimized utilization of IT resources
Simplification of regulatory compliance
Reduced OPEX (Operational Expenditure)
An organization must meet government requirements prohibiting export of data outside its territory. Which Cloud deployment model would be most appropriate for this organization?
On-premise Private Cloud
External Private Cloud
Which technology provides user-level authentication and file locking functionality?
Which storage platform supports file, block, and object level access?
Which provide file-level access to storage on a NAS device?
CIFS and NFS
CIFS and FCIP
iSCSI and FCoE
SATA and SCSI
Macintosh HD: Users: iMac: Desktop: Untitled-1.jpg
The EMC Cloud Infrastructure and services examination is a well-known EMC certification examination, which is associated with a large number of promising job roles. The EMC E20-002 questions has designed the core areas of EMC Cloud Infrastructure and functions examination in a technical manner and in the wake of advanced EMC sector marketplace, the E20-002 observe examine certified experts can benefit from the diverse position and aggressive aspect of their respective niches. The EMC E20-002 observe verify software is the certification examination which requires the candidates EMC E20-002 to profit minimal marks or percent as set via the EMC Cloud Infrastructure and services exam.
benefits of passing the EMC E20-002
within the very first method, the candidates for EMC E20-002 pdf can take pleasure in a professional leverage over the EMC opponents or in cases where the individuals should hunt for a promising job function, they can quite simply at ease an edge over the other EMC Cloud Infrastructure and services exam candidates.
The EMC Cloud Infrastructure and services examination can facilitate the EMC E20-002 candidates in getting the practical publicity and comprehensive competencies of the realtime technical EMC E20-002 questions concepts.
EMC E20-002 candidates after securing the EMC Cloud Infrastructure and capabilities exam can in fact comfy more suitable salaries and profession growth as compared to the others working within the identical area of interest.
The EMC E20-002 is an impressive and accepted credential, which is famous and linked to numerous promising job roles in this respective niche. EMC E20-002 candidates effectively passing the EMC Cloud Infrastructure and services examination can assume more suitable designations, quick skilled growth and superior stage opportunities.
The candidates for EMC Cloud Infrastructure and functions examination are required to show some fingers-on adventure with the EMC provided tools, utility, and applied sciences. EMC E20-002 purposeful exposure and event can most likely lead the EMC E20-002 braindumps candidates against a comfy and successful career.Passing the EMC Cloud Infrastructure and features exam
Passing the EMC E20-002 questions has turn into rather handy for the candidates now-a-days because a a variety of advantageous online EMC Cloud Infrastructure and services examination instruction alternatives are available at low-priced costs. EMC Cloud Infrastructure and services examination exam dumps, exam mocks, apply verify software for EMC E20-002 and PDF data containing the pattern E20-002 pdf solved questions and solutions for the EMC Cloud Infrastructure and services examination. EMC E20-002 questions training tools are instant to download, convenient to hold close and facilitate the individuals to get a finished overview of the complete EMC Cloud Infrastructure and services examination. There are different reliable approaches for the EMC Cloud Infrastructure and capabilities exam training as neatly, the EMC E20-002 pdf candidates are free to register for the respectable sources or can without difficulty confer with the online EMC E20-002 guidance tools.
particular present: GET 10% OFF
Get limitless access to all ExamCollection's top rate files!
Enter Your electronic mail address to acquire Your 10% Off discount Code
Please enter a correct e mail to Get your cut price Code
download Free Demo of VCEExam Simulator
experience Avanset VCE exam Simulator for your self.
effectively put up your e-mail tackle under to get all started with our interactive software demo of your free trial.
when you have alread E20-002y earned EMCCIS certification, your credential will continue to be in effect and may additionally follow in the event you are looking to pursue EMC Cloud Architect professional and skilled certifications. Of course, as a certified EMC proven skilled, you will continue to gain entry to exclusive application advantages.
Now purchasable – CISv2 and new E10-002 examthe brand new E10-002 exam, aligns with the new version of the Cloud Infrastructure and functions (CIS) v2 ‘open’ course. read E20-002 right here to study E20-002 greater concerning the new path.
what is a key skills of pointer-primarily based virtual replication compared to pointer-based full extent replication?1. The source machine is not required for the restore operation2. The reproduction is instantly accessible3. The replica may also be used even when the supply machine has failed4. The duplicate device requires less space
four. The duplicate device requires less area
what's a drawback when the usage of a backup agent on a hypervisor for backing up virtual computing device data?1. Backing up a LUN it really is at once attached to a virtual laptop the usage of uncooked device Mapping is awfully slow2. It is not feasible to again up a LUN it's without delay attached to a virtual laptop the use of uncooked device Mapping3. Backing up records residing on a digital desktop File gadget is terribly slow4. It isn't feasible to again up facts dwelling on a digital laptop File device
three. Backing up records dwelling on a virtual desktop File equipment is terribly gradual
Which product offers a dashboard showing Vblock infrastructure configuration and useful resource utilization?1. VMware vCenter Chargeback2. VMware vCloud Director3. EMC Ionix Unified Infrastructure Manager4. Cisco Nexus 1000V
3. EMC Ionix Unified Infrastructure supervisor
you're asked to create three VLANs on a newly installed physical Ethernet change. Which operations should you operate to configure the VLANs?1. define three VLAN IDs on the switch, then assign every VLAN identity to 1 or more switch ports2. set off VLAN trunking and tagging on the swap, then outline three VLAN IDs on the switch3. Add three VLAN IDs to the hypervisor's VLAN identification pool, then assign every VLAN id to one or greater change ports4. Configure a trunk port on the change, then assign three VLAN IDs to the trunk port
1. define three VLAN IDs on the change, then assign every VLAN identification to one or more change ports
What does the recovery element purpose (RPO) define?1. period of time through which systems and applications ought to be recovered after an outage2. variety of purposes which are mission crucial for a company to restore after an outage3. duration of time essential to discover a fault and examine its cause4. volume of statistics loss that a enterprise can endure after an outage
four. quantity of information loss that a business can endure after an outage
An administrator is concerned about Denial of provider assaults on their virtual machines (VMs). What should still be your suggestion to cut back the influence of this category of attack?1. operate average hypervisor updates2. install role-primarily based access handle on the VMs3. Harden all VMs4. limit the aid consumption of a VM
four. limit the aid consumption of a VM
Which assault might permit an attacker to set up a rogue hypervisor that may take manage of the underlying server resources?1. VM escape2. VM theft3. Hyperjacking4. facet channel assault
a firm should migrate all of their functions at the identical time. Which migration approach should still the organization use?1. Hybrid2. dealer-specified3. Proprietary strategy4. Forklift
What makes it possible for a LUN that has greater potential than is bodily allocated to be presented to a compute equipment?1. international namespace mapping2. raw equipment Mapping3. automated storage tiering4. digital provisioning
4. digital provisioning
what is the foundation for settling on the size of the digital computing device swap file?1. The difference between the digital machine reminiscence restrict and the reserved memory2. The actual computing device reminiscence size only3. The sum of the virtual computing device memory restrict and the reserved memory4. The change between the actual machine reminiscence measurement and the virtual laptop memory limit
1. The difference between the virtual desktop reminiscence restrict and the reserved reminiscence
Which FC port category would simplest be used to join an FC switch to another swap?1. F_port2. N_port3. G_port4. E_port
Which product gives a computing device virtualization solution?1. VMware Workstation2. VMware Server3. VMware ThinApp4. VMware View
four. VMware View
Which parameters should be configured to control the resources consumed with the aid of virtual machines?1. Reservation, Threshold, and Priority2. limit, Reservation, and Threshold3. Share, limit, and Reservation4. Threshold, priority, and Share
three. Share, limit, and Reservation
Which is a advantage of the public Cloud?1. transparent provider-to-issuer migrations2. Self-service aid requests3. Simplification of regulatory compliance4. reduced OPEX (Operational Expenditure)
2. Self-service resource requests
through which compute virtualization method is the guest operating system kernel modified to dispose of the want for binary translation?1. application assisted virtualization2. Paravirtualization3. Hardware assisted virtualization4. Full virtualization
all the way through which phase of the Cloud migration technique may still or not it's established that an application behaves as anticipated in the Cloud?1. Optimization2. Proof of Concept3. Assessment4. Automation
2. Proof of conception
Which statement about virtual computing device (VM) fault tolerance is true?1. VM cloning happens between dissimilar hardware2. The secondary VM is in consistent synchronization with the basic VM3. It gives faster backup of VM disk files4. It doesn't use the VM file equipment for insurance plan
2. The secondary VM is in regular synchronization with the basic VM
What are the two key charges concerned in working a company from the Cloud?1. Backup and repair deployment costs2. Infrastructure and administration costs3. administration and compliance costs4. Migration and operational fees
4. Migration and operational costs
Which performance is enabled through N_Port identification Virtualization (NPIV)?1. A digital N_port can act as varied physical HBA ports2. A actual NIC port can function as assorted digital N_ports3. A actual FC HBA port can operate as multiple digital N_ports4. A digital N_port can entry the FC uncooked device Mapping LUN assigned to a actual HBA
3. A physical FC HBA port can function as diverse digital N_ports
Which statistics middle management recreation helps make sure company continuity by getting rid of single elements of failure?1. safety management2. efficiency management3. Availability management4. ability management
3. Availability management
Which block storage over IP protocol requires a pair of bridges that uses IP as the transport protocol?1. FCIP2. iSCSI3. iFCP4. FCoE
Which mechanism gives insurance plan against NIC failure?1. NIC trunking2. NIC teaming3. Port grouping4. VLAN tagging
2. NIC teaming
Which is a function of EMC PowerPath/VE?1. Dynamic Load Balancing2. Storm Control3. integrated site visitors Steering4. traffic Shaping
1. Dynamic Load Balancing
Which commentary is right about consumer access administration application?1. It gives a consolidated view of present virtual resources2. It allows for developing and publishing a carrier catalog3. It informs the consumer about incident and issue status4. It permits the consumer to configure swimming pools and virtual resources
2. It permits developing and publishing a service catalog
what's a explanation for monitoring statistics middle elements?1. To make certain that no records is misplaced if there's a catastrophe or provider disruption2. To get rid of threats to storage infrastructure security3. To examine that the accessories can be found and functioning properly4. To ensure that the IT help body of workers performs correctly
three. To verify that the components can be found and functioning accurately
what's a key performance consideration for migrating operations to the Cloud?1. Latency of the network between buyer and service provider2. Availability of target based de-duplication capability3. Availability of different storage efficiency tiers4. aid utilization matrix
1. Latency of the community between buyer and service provider
an organization is deploying desktop virtualization using the digital desktop Infrastructure approach. Which can charge part raises for the firm?1. application deployment2. IT management3. computer hardware4. Compute infrastructure
four. Compute infrastructure
How does a site identify server stability client traffic throughout a cluster of servers?1. by mapping the area name to the IP handle of servers in round-robin fashion2. via sending client site visitors to every server that uses a driver to filter customer traffic3. via mapping the domain identify to the IP tackle of a load balancing device4. through translating the domain identify to the IP tackle of higher throughput servers
1. by mapping the area identify to the IP address of servers in round-robin fashion
Which remark is true a couple of Trunk hyperlink in a VLAN atmosphere?1. it is a single network connection that contains diverse VLAN traffic2. it is a link between two virtual switches that incorporates tagged Ethernet frames3. it is a dedicated hyperlink for transferring site visitors belonging to a single VLAN4. It transfers untagged Ethernet frames from diverse VLANs
1. it is a single network connection that carries distinct VLAN traffic
Which RAID type uses a dedicated parity disk?1. RAID 12. RAID 33. RAID fifty four. RAID 6
2. RAID 3
Which issues are addressed through RAID applied sciences?1. efficiency and data backup2. loss of information as a result of disk drive hardware disasters and data corruption3. lack of facts due to disk power hardware failure and performance4. facts corruption and backup
three. loss of records due to disk pressure hardware failure and performance
what is a first-rate purpose of incident management?1. Reporting incidents to the Cloud provider provider2. picking the root reason behind recurring incidents that display standard symptoms3. Restoring Cloud services to consumers as rapidly as possible4. analyzing incident heritage and selecting impending carrier screw ups
three. Restoring Cloud services to buyers as straight away as viable
an organization performs full backup of its records a week. they are experiencing lengthy backup home windows and large network bandwidth consumption all the way through the backup procedure.What may still the company do?1. Use backup to tape2. trade the backup software3. Use goal-primarily based deduplication4. Use source-based deduplication
4. Use supply-based mostly deduplication
Which is used to statically identify a hardware port gadget in an FC SAN?1. WWN2. Channel3. IP4. MAC
Which is a most efficient practice for opting for drives for a thin pool?1. Drives should run at the same RPM2. Drives may still be offered by way of the same vendor3. force pace may still be 15000 rpm or higher4. The pool may still be made from mixture of FC, SATA, and Flash drives
1. Drives should run on the same RPM
Which remark is true about person State virtualization?1. consumer States are preserved as temporary files2. typical person States are used for the entire desktops3. operating equipment refreshes and migrations become less demanding to deploy4. Templates are used to create user States
three. working equipment refreshes and migrations turn into less demanding to installation
Which is chargeable for creating Cloud services?1. digital infrastructure management2. Unified management3. Cloud deployment4. user entry administration
2. Unified management
What needs to be assessed through a firm before migrating business operations to the Cloud?1. economic strength of the provider provider2. Required first-class of service (QoS) level3. price added capabilities provided by using the service provider4. skill of the carrier company's actual infrastructure
2. Required great of provider (QoS) degree
Which parameter defines the optimum amount of CPU and reminiscence substances that a digital desktop or child resource pool can eat?1. Reservation2. Share3. Threshold4. restrict
If a firm leverages greater materials from Cloud carrier suppliers, which price could be anticipated to grow better?1. Infrastructure costs2. Capital expenditures3. Operational expenditures4. administration fees
three. Operational bills
Which is a advantage of records striping in RAID?1. stronger safety via developing distinct identical copies of data2. effective allocation of random read E20-002s and writes3. independent disks allow distinct read E20-002s and writes to take place simultaneously4. productive allocation of sequential read E20-002s and writes
three. independent disks permit dissimilar read E20-002s and writes to take location simultaneously
A storage administrator needs to understand concerning the current and ancient utilization of storage of their statistics middle. Which file will provide this counsel?1. Chargeback report2. efficiency report3. skill planning report4. movements report
3. ability planning fileclick the calculator icon in the higher left-hand nook.
An administrator has configured the following Share values for several types of site visitors on the distributed digital switch:
virtual machine traffic: 3000IP storage traffic: 1000Virtual laptop migration site visitors: 2000Management traffic: a thousand
The purchasable community bandwidth is 10 Gb/s, and the listed traffic forms contend for the bandwidth.
How lots bandwidth can be allotted to the digital laptop traffic?
1. 4.2 Gb/s2. 10.0 Gb/s3. 1.four Gb/s4. 2.eight Gb/s
1. four.2 Gb/s
What are the three constructing blocks of computerized storage tiering?1. Storage classification, storage group, policy2. Storage pool, policy, storage type3. Storage pool, coverage, storage group4. Storage type, storage community, storage pool
1. Storage type, storage community, policywhat is the correct sequence of steps for performing a scorching conversion from a physical desktop to a virtual computer (VM)?
1. The converter server creates a VM on the vacation spot machine2. The converter server installs the agent on the source physical machine3. The agent synchronizes the facts and installs the necessary drivers to permit the OS in addition from the VM and customize the VM4. The agent clones the physical disk of the supply desktop to the virtual disk of the destination VM
2. The converter server installs the agent on the source physical machine1. The converter server creates a VM on the vacation spot machine4. The agent clones the actual disk of the supply desktop to the virtual disk of the vacation spot VM3. The agent synchronizes the statistics and installs the mandatory drivers to allow the OS as well from the VM and personalize the VM
A Cloud provider issuer is given that offering both a SaaS and a PaaS carrier to their consumers.Would their protection considerations about virtualization vary in the event that they have been to choose only one of those functions, and why?1. sure; PaaS implementations require an API for authenticating users with external identity systems; SaaS implementations do not2. No; SaaS and PaaS implementations each require the identical consideration to virtualization security3. sure; SaaS implementations require an API to encrypt facts at leisure; PaaS implementations do not4. No; SaaS and PaaS implementations each require that the customer is answerable for records protection
2. No; SaaS and PaaS implementations both require the identical attention to virtualization security
Which Cloud deployment mannequin gives the highest level of security and control?1. Public Cloud2. On-premise deepest Cloud3. exterior private Cloud4. Hybrid Cloud
2. On-premise inner most Cloud
Which is a consideration for a Cloud person who is drafting a Cloud carrier Termination agreement?1. facts migration plan2. charge of transferring the ownership of infrastructure back to the client3. Time required for the server issuer to restart operations4. carrier efficiency ranges
1. information migration plan
Which is a characteristic of channel expertise?1. Low protocol overhead2. long distance transmission3. unfastened coupling4. Dynamic connection establishment
1. Low protocol overhead
Which Cloud provider administration manner continues suggestions about used and accessible skill of configuration gadgets within the Configuration administration Database (CMDB)?1. service Catalog Management2. Availability Management3. means Management4. service Asset and Configuration management
4. provider Asset and Configuration management
What permits the storage of digital machine info on a NAS device?1. network File System2. virtual computer File System3. guest working system4. virtual laptop monitor
1. community File equipment
what is a difficulty of a server-based Intrusion Detection gadget (IDS)?1. It monitors community traffic for dissimilar hosts2. It can't study E20-002 encrypted traffic3. It can't entry logs written with the aid of privileged processes4. It runs on the equal system with malicious software
four. It runs on the same equipment with malicious application
Which process categorizes useful resource pools in accordance with their performance and capacity?1. aid Cataloging2. aid Distribution3. resource Bundling4. useful resource Grading
four. aid Grading
Which commentary about Cache tiering is right?1. It makes it possible for the stream of facts at the sub-LUN level2. It increases the dimension of the fundamental cache3. It raises the efficiency of the simple cache4. It allows for the use of solid state drives as secondary cache
four. It allows the use of strong state drives as secondary cache
Which Cloud provider model comprises the complete stack offered as a carrier, including all of the layers of the provider model?1. Platform-as-a-Service2. IT-as-a-Service3. Infrastructure-as-a-Service4. utility-as-a-service
Which is a advantage of computerized site failover capacity in a data center atmosphere?1. reduced recovery aspect Objective2. decreased recovery Time Objective3. elimination of website failures4. elimination of digital computing device File system failures
2. reduced recovery Time goalaccept as true with here steps:
1. Harden the VM picture to create a general security baseline2. eradicate unneeded instruments and functions3. utilize up-to-date VM patches and security updates4. Configure access permissions for a select group of administrators
Which of the steps are particular to making VM templates more proof against assault?1. 1 and 32. 1 and forty three. 2 and forty four. three and four
1. 1 and three
Which mechanism makes it possible for a digital desktop to at once entry LUNs in a storage device?1. raw machine Mapping2. thin provisioning3. digital computer File System4. Block-stage virtualization
1. raw gadget Mapping
Which Governance, risk and Compliance procedure needs to be carried out by way of a client to check the scope of adoption of Cloud features?1. risk assessment2. Regulatory compensation assessment3. Enlisting anti-virus insurance plan measures4. Compliance penalty evaluation
1. possibility assessment
Which backup answer gives assist only for supply-based deduplication?1. EMC Avamar2. EMC SourceOne3. EMC Networker4. EMC information domain
1. EMC Avamar