What are the two primary reasons for creating services in a service catalog?
A. Providing consumers with business relevant options, standardization
B. Providing consumers with templates for selection, standardization
C. Setting prices, limiting resource consumption
D. Setting prices, deploying security policies
Consider the following: virus scanning software, email clients, and word processing software. Which type of application are they?
A. Horizontal
B. Mobile
C. Enterprise
D. Legacy
What are the two primary reasons for creating services in the service catalog?
A. Standardization, providing consumers with business relevant options
B. Standardization, providing consumers with templates for selection
C. Setting prices, limiting resource consumption
D. Setting prices, deploying security policies
Why is there a need for a full risk assessment if a quick risk assessment has already been performed?
A. A full assessment can help find operational exposures after implementation
B. A full assessment is usually conducted by a third party to get an unbiased version of the risk profile
C. A full assessment details all the exposures in high value/high risk assets
D. A full assessment is always executed by internal auditing
Which solution should be the primary choice for protection against a site-wide failure?
A. Remote replication
B. Array-based snapshots
C. Local replication
D. Hypervisor-based snapshot
When using logging to maintain server security, which is the key element for intrusion detection and should be contained the server logs?
A. Vulnerability scan that identifies susceptible services that are active on the server.
B. Results of penetration testing through uncover problem probable weaknesses.
C. An entry for each application transaction with details of the organization.
D. Alerts to suspicious activities that require further investigation.
As part of a VDC deployment, you are examining the existing storage configurations. On one storage system, you discover over fifty storage pools. The pools contain a single type of drive (SSD, SAS or NL SAS), but many of them contain only a few drives and share the same RAID configuration. The Storage Administrator admits that they have been creating separate pools for each application because they did not want the applications contending for the disks.
As part of the design, you propose to consolidate the existing pools into larger pools of mixed drive types and RAID configurations.
What technology will you need to implement to utilize the new pool design?
A. Virtual Provisioning
B. Caching Tier
C. Storage Virtualization
D. Storage Tiering
Which properties define a cloud environment?
A. Self-service, dedicated leased services in-house
B. Dedicated, but privatized, virtualized data center technologies in-house
C. Power, connectivity, physical security
D. Self-service, Internet served computing, shared resources, pay as you use
Which mode of IPSec encrypts the entire IP packet?
A. Tunnel
B. Transport
C. Transparent
D. Trusted
What is IT's approach to addressing performance issues during the IT-as-a-Service phase of the Cloud Maturity Model?
A. Selective
B. Investigative
C. Proactive
D. Reactive
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-018 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.