Which statement describes the full set of enhancements of IBM Spectrum Protect for the IBM Storwize Family?
A. IBM data encryption and security data solutions provide protection for virtual, physical, cloud and software defined environments, as well as crash consistent snapshots.
B. IBM data protection and data recovery solutions provide protectionfor cloud and software defined environments, as well as core applications and remote facilities.
C. IBM data duplication and data reduction solutions provide protection for virtual, physical, cloud and software defined environments, as well as multisite copies.
D. IBM data protection and data recovery solutions provide protection for virtual, physical, cloud and software defined environments, as well as application consistent snapshots.
When using IBM Storwize family, which IBM software provides application consistent point- in-time copies?
A. IBM Cloud Object Storage
B. IBM Spectrum Protect Snapshot
C. IBM Spectrum Protect for Space Management
D. IBM Spectrum Control Base Edition
What is the minimum of connections that an IBM Storwize node canister should have to a host according to best practices?
A. 4
B. 1
C. 2
D. 6
Which component of the IBM Spectrum family helps a customer manage application-aware point-in-time copies on EMC, HDS, and the IBM Storwize family?
A. IBM Spectrum Protect Snapshot
B. IBM Copy Services Manager
C. IBM Spectrum Control with External Virtualization
D. IBM Spectrum Protect for SAN
A customer has a requirement for highly available data in their IBM Storwize environment and currently uses IBM Spectrum Virtualize Software V7.5. The process to enable a volume to be addressed by two I/O groups simultaneously is challenging.
How can the customer benefit from upgrading to V7.6 of the software?
A. HyperSwap GUI support
B. Two I/O groups supported by two nodes
C. Remote mirroring cluster support
D. Stretch cluster wizard
A customer wants to encrypt some of the data implementing a clustered IBM Storwize V7000-524 solution, possibly utilizing an existing model 324 keep costs down.
How should the desired solution be implemented?
A. IBM Storwize V7000-324s and IBM Storwize V7000-524s cannot be clustered together, so two IBM Storwize V7000-524s with encryption enabled on both should be implemented.
B. Cluster the existing IBM Storwize V7000-324 with a new model 324 ensuring IBM Storwize version 7.4 is installed on both systems, as it is needed to enable encryption.
C. Cluster the existing IBM Storwize V7000-324 with an IBM Storwize V7000-524, enabling encryption of the RAID arrays/MDisks on the Model 524 enclosures.
D. Cluster the existing IBM Storwize V7000-324 with an IBM Storwize V7000-524, enabling encryption on all the enclosures for maximum protection.
Which network authentication protocol is supported on the IBM Storwize V7000 Unified storage system, is used for client/server applications, and provides symmetric key cryptography?
A. Network Information Service (NIS)
B. Kerberos
C. Services for UNIX (SFU)
D. POSIX
A customer has purchased an IBM Storwize solution and needs to externally virtualize a Dell EqualLogic PS6210E.
Which connection protocol is required?
A. FCoE
B. iSCSI
C. SAS
D. FCIP
A customer is concerned that its volumes would not have access to the full system cache but wants to create pools to limit the amount of space that different departments use.
Which activity allows the customer to meet these requirements?
A. Create several small pools that correspond to LUN size policies
B. Create a single storage pool that contains all the MDisks
C. Create LUN size policy in the GUI and set system cache to global via the CLI
D. Create a single parent pool that contains smaller child pools
An IBM i customer decided to take advantage of the performance of flash-based storage and is implementing an IBM FlashSystem V9000. The customer plans to move all data to the V9000 with native IBM i attachment.
Which connection protocol is required for this environment?
A.FC
B. FTP
C. 10 Gb FCoE
D. InfiniBand