E05-001: Information Storage and Management Sample Questions

  1. Home
  2. E05-001: Information Storage and Management Sample Questions
E05-001: Information Storage and Management Sample Questions
Question 1: What are the most accurate statements about VSAN trunking?
  • A. Allowing network traffic from multiple VSANs to traverse a single Interswitch link
  • B. Enabling F_Port to transfer multiple VSAN traffic over a single port channel
  • C. Providing VSAN IDs to F_Ports for including them in the VSANs
  • D. Forwarding FC frames between F_Ports belonging to the same VSAN

Correct Answer: A

Question 2: Software-defined storage (SDS) environments manage and provision storage through what component?
  • A. SDS controller
  • B. REST API
  • C. SDS web service
  • D. Storage agent

Correct Answer: A

Question 3: Which of the given statements is the most accurate one regarding remote desktop services?
  • A. Operating system and applications which are hosted on a remote computing system are all shared by multiple users
  • B. Users are provided with dedicated virtual machines running operating systems and applications and are hosted on a client system
  • C. Users can have the flexibility for installing applications and modifying the operating system settings on the remote computing system
  • D. Users’ interfaces of the remote desktop are directly transmitted to the client without using a remote display protocol

Correct Answer: A

Question 4: Which among the following is a function of the orchestration layer in a data center infrastructure?
  • A. Providing workflows for automated execution of management tasks
  • B. Aggregating the physical infrastructure components into resource pools
  • C. Measuring the consumption of IT resources by various services
  • D. Decoupling an operating environment from the underlying hardware

Correct Answer: A

Question 5: Which statement correctly describes an attack vector in an IT infrastructure?
  • A. It is a series of steps to be followed for completing an attack
  • B. It refers to the various entry points used for launching an attack
  • C. It is the amount of effort for exploiting the vulnerabilities in an infrastructure
  • D. It is the process of identifying the system components under attack

Correct Answer: A

Question 6: Which among the following is a benefit of Defense deployment in Depth strategy?
  • A. Providing additional time for organizations for detecting and responding to an attack
  • B. Eliminating the attack vector from the IT infrastructure
  • C. Eliminating the attack surface from the IT infrastructure
  • D. Enabling organizations for deploying a unified security solution

Correct Answer: A

Question 7: Which of the given would be a suitable example of an active attack on an IT infrastructure?
  • A. Attempting a modification of the information for malicious purposes
  • B. Attempting to copy the data from the storage system
  • C. Attempting to gain unauthorized access to the system
  • D. Attempting to gain access to the data in transit

Correct Answer: A

Question 8: In computing, what term refers to an IT infrastructure’s ability to operate according to business expectations?
  • A. Information availability
  • B. Disaster recovery
  • C. Compliance adherence
  • D. Business agility

Correct Answer: A

Question 9: Regarding an integrated NAS controller, which statement is correct?
  • A. It contains a specialized operating system that is dedicated to file serving
  • B. Striping the data across multiple NAS systems for data protection
  • C. Abstracting and pooling the NAS controllers across multiple NAS systems
  • D. It contains an FC Forwarder, optimized for file sharing functions

Correct Answer: A

Question 10: About a software RAID implementation, which statement is correct?
  • A. Makes use of the CPU cycles of a computing system for performing RAID calculations
  • B. It supports the upgrade of RAID software on incompatible O/S
  • C. Makes use of a specialized hardware controller for performing RAID calculations
  • D. It supports all RAID levels

Correct Answer: A

Question 11: In which stage of the business continuity planning lifecycle is it necessary to identify and prioritize critical business processes?
  • A. Analyzing
  • B. Establishing objectives
  • C. Designing and developing
  • D. Implementing

Correct Answer: A

Question 12: Which of the given benefits is provided by the measured service characteristic to a cloud service provider?
  • A. Enabling control and optimization of resource use
  • B. Enabling cloud services for communicating with each other
  • C. Enabling availability of specific resources depending on the policy
  • D. Enabling the reduction and/or elimination of upfront IT expenditure

Correct Answer: A

Question 13: What is the correct statement about infrastructure discovery?
  • A. Creating an inventory of infrastructure components and providing information about the components
  • B. Standardising the ongoing infrastructure management activities and assessing the potential risks of the activities
  • C. Classifying, organizing, and analyzing all infrastructure management best practices stored in data lakes
  • D. Detecting the potential security attacks on storage infrastructure and deploying specialized tools for eliminating the attacks

Correct Answer: A

Question 14: How do you determine how far back the recovery points could go in continuous data protection (CDP) solution?
  • A. Amount of space that is configured for the journal
  • B. Size of the CDP appliance used for replication
  • C. Size of the source and replica volumes
  • D. Type of write splitter used for replication

Correct Answer: A

Question 15: Write coalescing is performed by which of the given solid state drive component?
  • A. Controller
  • B. I/O interface
  • C. Non-volatile memory
  • D. Cache

Correct Answer: A

Question 16: What is the most suitable statement regarding the Challenge Handshake Authentication Protocol (CHAP) control?
  • A. Enabling initiators and targets for authenticating each other using a shared secret code
  • B. Providing strong authentication for client-server applications using secret-key cryptography
  • C. Allowing clients to access protected resources from a resource server on behalf of a resource owner
  • D. Enabling an organization to utilize authentication services from an identity provider

Correct Answer: A

Question 17: Which of the given type of digital data doesn’t have a defined format but a self-describing structure enabling its analysis?
  • A. Semi-structured data
  • B. Structured data
  • C. Metadata
  • D. Quasi-structured data

Correct Answer: A

Question 18: For a “recovery-in-place” backup approach, what component is required?
  • A. Disk-based backup target
  • B. Agent-based backup client
  • C. NDMP server
  • D. Data deduplication server

Correct Answer: A

Question 19: In which process are multiple physical drives grouped and presented to a computing system as a single logical volume?
  • A. Concatenation
  • B. Partitioning
  • C. Striping
  • D. Orchestration

Correct Answer: A

Question 20: Which statement is true about the denial-of-service attack?
  • A. Preventing legitimate users from accessing resources or services
  • B. Intentionally misusing the privileges for compromising data security
  • C. Gaining unauthorized access to a user’s accounts and data
  • D. Capturing a user’s credentials and then sending them to the attacker

Correct Answer: A

Menu