E05-001: Information Storage and Management Sample Questions

Question 1: What are the most accurate statements about VSAN trunking?
- A. Allowing network traffic from multiple VSANs to traverse a single Interswitch link
- B. Enabling F_Port to transfer multiple VSAN traffic over a single port channel
- C. Providing VSAN IDs to F_Ports for including them in the VSANs
- D. Forwarding FC frames between F_Ports belonging to the same VSAN
Correct Answer: A
Question 2: Software-defined storage (SDS) environments manage and provision storage through what component?
- A. SDS controller
- B. REST API
- C. SDS web service
- D. Storage agent
Correct Answer: A
Question 3: Which of the given statements is the most accurate one regarding remote desktop services?
- A. Operating system and applications which are hosted on a remote computing system are all shared by multiple users
- B. Users are provided with dedicated virtual machines running operating systems and applications and are hosted on a client system
- C. Users can have the flexibility for installing applications and modifying the operating system settings on the remote computing system
- D. Users’ interfaces of the remote desktop are directly transmitted to the client without using a remote display protocol
Correct Answer: A
Question 4: Which among the following is a function of the orchestration layer in a data center infrastructure?
- A. Providing workflows for automated execution of management tasks
- B. Aggregating the physical infrastructure components into resource pools
- C. Measuring the consumption of IT resources by various services
- D. Decoupling an operating environment from the underlying hardware
Correct Answer: A
Question 5: Which statement correctly describes an attack vector in an IT infrastructure?
- A. It is a series of steps to be followed for completing an attack
- B. It refers to the various entry points used for launching an attack
- C. It is the amount of effort for exploiting the vulnerabilities in an infrastructure
- D. It is the process of identifying the system components under attack
Correct Answer: A
Question 6: Which among the following is a benefit of Defense deployment in Depth strategy?
- A. Providing additional time for organizations for detecting and responding to an attack
- B. Eliminating the attack vector from the IT infrastructure
- C. Eliminating the attack surface from the IT infrastructure
- D. Enabling organizations for deploying a unified security solution
Correct Answer: A
Question 7: Which of the given would be a suitable example of an active attack on an IT infrastructure?
- A. Attempting a modification of the information for malicious purposes
- B. Attempting to copy the data from the storage system
- C. Attempting to gain unauthorized access to the system
- D. Attempting to gain access to the data in transit
Correct Answer: A
Question 8: In computing, what term refers to an IT infrastructure’s ability to operate according to business expectations?
- A. Information availability
- B. Disaster recovery
- C. Compliance adherence
- D. Business agility
Correct Answer: A
Question 9: Regarding an integrated NAS controller, which statement is correct?
- A. It contains a specialized operating system that is dedicated to file serving
- B. Striping the data across multiple NAS systems for data protection
- C. Abstracting and pooling the NAS controllers across multiple NAS systems
- D. It contains an FC Forwarder, optimized for file sharing functions
Correct Answer: A
Question 10: About a software RAID implementation, which statement is correct?
- A. Makes use of the CPU cycles of a computing system for performing RAID calculations
- B. It supports the upgrade of RAID software on incompatible O/S
- C. Makes use of a specialized hardware controller for performing RAID calculations
- D. It supports all RAID levels
Correct Answer: A
Question 11: In which stage of the business continuity planning lifecycle is it necessary to identify and prioritize critical business processes?
- A. Analyzing
- B. Establishing objectives
- C. Designing and developing
- D. Implementing
Correct Answer: A
Question 12: Which of the given benefits is provided by the measured service characteristic to a cloud service provider?
- A. Enabling control and optimization of resource use
- B. Enabling cloud services for communicating with each other
- C. Enabling availability of specific resources depending on the policy
- D. Enabling the reduction and/or elimination of upfront IT expenditure
Correct Answer: A
Question 13: What is the correct statement about infrastructure discovery?
- A. Creating an inventory of infrastructure components and providing information about the components
- B. Standardising the ongoing infrastructure management activities and assessing the potential risks of the activities
- C. Classifying, organizing, and analyzing all infrastructure management best practices stored in data lakes
- D. Detecting the potential security attacks on storage infrastructure and deploying specialized tools for eliminating the attacks
Correct Answer: A
Question 14: How do you determine how far back the recovery points could go in continuous data protection (CDP) solution?
- A. Amount of space that is configured for the journal
- B. Size of the CDP appliance used for replication
- C. Size of the source and replica volumes
- D. Type of write splitter used for replication
Correct Answer: A
Question 15: Write coalescing is performed by which of the given solid state drive component?
- A. Controller
- B. I/O interface
- C. Non-volatile memory
- D. Cache
Correct Answer: A
Question 16: What is the most suitable statement regarding the Challenge Handshake Authentication Protocol (CHAP) control?
- A. Enabling initiators and targets for authenticating each other using a shared secret code
- B. Providing strong authentication for client-server applications using secret-key cryptography
- C. Allowing clients to access protected resources from a resource server on behalf of a resource owner
- D. Enabling an organization to utilize authentication services from an identity provider
Correct Answer: A
Question 17: Which of the given type of digital data doesn’t have a defined format but a self-describing structure enabling its analysis?
- A. Semi-structured data
- B. Structured data
- C. Metadata
- D. Quasi-structured data
Correct Answer: A
Question 18: For a “recovery-in-place” backup approach, what component is required?
- A. Disk-based backup target
- B. Agent-based backup client
- C. NDMP server
- D. Data deduplication server
Correct Answer: A
Question 19: In which process are multiple physical drives grouped and presented to a computing system as a single logical volume?
- A. Concatenation
- B. Partitioning
- C. Striping
- D. Orchestration
Correct Answer: A
Question 20: Which statement is true about the denial-of-service attack?
- A. Preventing legitimate users from accessing resources or services
- B. Intentionally misusing the privileges for compromising data security
- C. Gaining unauthorized access to a user’s accounts and data
- D. Capturing a user’s credentials and then sending them to the attacker
Correct Answer: A
Prepare for Assured Success
Want to pass the Information Storage and Management (E05-001) exam? Learn MoreAre you preparing for the Information Storage and Management (E05-001) exam?Take a Quiz