What is the primary GRC concern when using a service provider's storage?
A. Where the data is stored and how it is protected
B. How many copies there are of the data
C. If there is sufficient redundancy to protect the data
D. If the data is erased when the storage is released
Which component within the array is used to create and configure secondary cache in storage arrays?
A. SSD
B. 15k rpm drives
C. DRAM
D. NL SAS drives
You are designing a VDC that uses converged networking to support both LAN and SAN traffic. FCoE is used exclusively for storage access. The access and aggregation layer switches that have been chosen support both 10 and 40 Gigabit Ethernet and Data Center Bridging.
You have determined that the traffic between the access layer and aggregation layer switches is:
-
Average SAN (FCoE) –60 Gb/s
-
Average LAN (Ethernet) –100 Gb/s
-
Burst SAN (FCoE) –80 Gb/s
-
Burst LAN (Ethernet) –130 GB/s Performance cannot be degraded due to a failure of a single switch. Which port configuration would support the average traffic between the access and aggregation layer
switches?
A. Three 40 Gb/s ports and six 10 Gb/s ports
B. Four 40 Gb/s ports
C. Three 40 Gb/s ports and four 10 Gb/s ports
D. Four 40 Gb/s ports and eight 10 Gb/s ports
Why does lock-in represent a significant threat to the business?
A. Lack of tools and procedures for migration
B. Potential for isolation failure between tenants
C. Insufficient evidence of compliance
D. Inadequate guarantees of full data erasure
Which contractual agreement represents the legal contract with a service provider?
A. Service level agreement
B. Non-binding user contract
C. Terms of service
D. End-user license agreement
An organization plans to migrate a single application from a traditional, physical infrastructure to new servers. These servers are the first of several planned for their VDC. This will be the pilot application for the VDC migration to be completed over the next 5 years. The project is well funded and the VDC has more than enough capacity to support the pilot application.
Which migration strategy will they most likely use and why?
A. A forklift approach, because they can keep the old systems running in parallel and they have the capacity to run in either the VDC or traditional data center as needed should something go wrong.
B. A phased approach, because they can keep the old systems running in parallel and they have the capacity to run in either the VDC or traditional data center as needed should something go wrong.
C. A forklift approach, because this allows them to re-purpose the old servers and add those resources to the new VDC immediately.
D. A phased approach, because this allows them to re-purpose the old servers and add those resources to the new VDC immediately.
A load balancing/firewall application is prepackaged to run on a specific hypervisor. An administrator downloads it from a vendor site, imports it into the VDC environment, then performs minimal configuration tasks. Once installed, this application will solve a specific business problem for the organization.
What is this an example of?
A. A virtual appliance
B. A web application
C. A legacy application
D. A thin appliance
Which two capacity management objectives often conflict with each other?
A. Manageability and redundancy
B. Availability and security
C. Compliance and efficiency
D. Efficiency and availability
A customer is determining whether to divest resources into a third-party cloud solution. They are concerned about what will happen should they decide to migrate their data back in-house.
Which contractual agreement defines this scenario?
A. Service-level agreement
B. End-user license agreement
C. Non-binding user contract
D. Termination agreement
A company is considering using a public cloud environment for a new HR application. However, they are concerned about the regulatory requirements for their employee data. Several of the countries in which the company operates require that personal information not flow across country borders.
What should the company do when it investigates cloud providers?
A. Evaluate the cloud provider's architecture to ensure that it meets regulatory requirements for storing, backing up, replicating, and moving data
B. Accept the cloud provider's service-level agreement for specific protections regarding employee data
C. Review the cloud provider's audit results to verify that it has never moved data across country borders
D. Create a one-off contract with the cloud provider to specify that the data will never be moved across country borders
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-018 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.