What is a characteristic of software-defined networking?
A. Abstracts and separates the control plane from the data plane
B. Data plane sends instructions to the control plane to handle network traffic
C. Controller in network switches takes over data plane functions
D. External software combines both data plane and control plane functions
In an object-based storage system, data is divided into 9 data segments and 3 coding segments using the erasure coding technique. What is the maximum number of disk drive failures against which data is protected by this configuration?
A. 3
B. 6
C. 9
D. 12
What is a function of the metadata manager in a compute-based storage area network (SAN)?
A. Controls load balancing and data migration in a compute-based SAN
B. Provides an interface to the software-defined storage controller
C. Controls all data read and write operations in a compute-based SAN
D. Performs the I/O operations on the local storage of a compute system as requested by a client
What is an accurate statement about a virtual desktop infrastructure?
A. Each user is provided a dedicated desktop VM with its own operating system and applications
B. Operating system and applications hosted on a client system are shared by multiple users
C. Each user has an individual desktop session on the remote compute system in which applications execute
D. Operating system and applications on the remote desktop are downloaded on the client for local execution
What is an accurate statement about Infrastructure as a Service?
A. Consumer has control over the operating systems and the deployed applications
B. Consumer only has control over user-specific application configuration settings
C. Consumer has control over network devices, compute systems, and storage systems
D. Consumer only has control over the configuration settings of the application-hosting environment
What is a benefit of a "recovery-in-place" backup approach in a virtualized data center?
A. Provides instant recovery of a failed virtual machine
B. Reduces the recovery point objective
C. Eliminates redundant data during virtual machine backups
D. Eliminates the backup window
What is an accurate statement about hypervisor-based continuous data protection (CDP)?
A. Write splitter is embedded in the hypervisor
B. Journal is stored in a virtual machine
C. Journal and replica use the same storage volume
D. Virtual appliance runs on a storage system
An organization plans to deploy a deduplication solution by retaining their legacy backup application. They are concerned about the application servers' performance and a long backup window during backups.
Which deduplication solution(s) should be recommended to the organization?
A. Post-process
B. Source-based global deduplication
C. Variable-length segment and source-based
D. Fixed-length block and source-based
Which type of fabric topology does the exhibit represent?
A. Partial mesh
B. Full mesh
C. Single core-edge
D. Dual core-edge
An organization performs a full back up every Sunday and incremental back ups on the remaining days at
9:00 AM. However, at 10 PM on Friday, a data corruption occurs that requires a data restoration from the backup copies.
How many backup copies are required to perform this restoration?
A. 2
B. 4
C. 5
D. 6