Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EMC E20-011 Exam -

Free E20-011 Sample Questions:

1. In a requirements analysis, what are classified as external requirements?
A. Availability and reliability
B. Delivery and standards
C. Portability and interoperability
D. Privacy and legislative
Answer: D

2. In a FC SAN, what is an advantage of using copper media instead of optical media?
A. Better signal-to-noise ratio for short distances
B. Higher speed
C. Larger frame payload
D. Longer distances are supported
Answer: A

3. A pair of ISLs is configured between two Fibre Channel switches with trunking enabled. The trunk is carrying the I/O traffic from multiple hosts generating a total of 3,200 IOPS each, with a block size of 4 KB.
Assuming 2 Gb links, which percentage represents the best estimate of ISL utilization?
A. 1
B. 3
C. 10
D. 20
Answer: B

4. A pair of ISLs is configured between two Fibre Channel switches with trunking enabled. The trunk is carrying the I/O traffic from several hosts generating a total of 3,000 IOPS with a block size of 32 KB. Assuming 2 Gb links, what is the ISL utilization?
A. 3%
B. 25%
C. 50%
D. 90%
Answer: B

5. What is a benefit of Kerberos over other authentication protocols?
A. Client can provide its own privilege information, reducing authentication traffic
B. Ensures a user will not be disconnected from a share because tickets do not expire
C. Stores file system ACLs for the domain environment
D. User ID and password information is never stored on the Kerberos server
Answer: A

6. A company has a PC with an IP address of The PC needs to communicate with a NAS device at the IP address
Which OSI protocol layer is responsible for directing the packets from the client to the NAS device?
Answer: A

7. A company has several servers accessing an in-house application on iSCSI storage using NICs and iSCSI initiator software. Processor utilization on several of the servers is excessively high and is beginning to impact performance.
What can alleviate the performance problem?
A. Increase the cache on the storage array
B. Increase the network bandwidth
C. Install an additional network card in the hosts
D. Install iSCSI HBAs in the hosts
Answer: D

8. What is the most important design consideration when sizing the disk capacity requirements?
A. Amount of cache available
B. Disk space required by the application
C. IOPS required by the application
D. Remote replication requirements
Answer: C

9. Which risk poses the greatest threat to the implementation of a storage infrastructure?
A. Lack of vendor support for the rollout
B. No security policy for remote support procedures
C. No standardized tools, templates, or methodologies
D. The new application does not provide the expected functionality
Answer: C

10. Which process ensures that storage service exceptions are identified, tracked, and resolved?
A. Availability Management
B. Capacity Management
C. Configuration Management
D. Incident Management
Answer: D

11. Which storage software stack functionality addresses high availability and continuous operations requirements of a storage networking environment?
A. Device discovery and management
B. Heterogeneous device interoperability
C. Intelligent caching
D. Real time replication
Answer: D

12. What is classified as an externally networked application?
A. An application shared on a common server and used by a group of developers working on an animation project for a global project launch
B. An online ticket reservation system deployed by a transportation company that enables the customers to purchase tickets
C. A workflow application deployed by a multinational organization to authorize purchases made in its global branch offices
D. Real time replication of an ERP database to another country (3,000 km away) for mitigating sovereign risk
Answer: B

13. N represents the number of I/Os in the queue. X represents the arrival rate of I/Os. R represents the response time. According to Little's Law, what is the relationship between N, X, and R?
A. N = X/R
B. N = X*R
C. R = X/N
D. X = N*R
Answer: B

14. A 200 GB database is currently hosted on an enterprise storage subsystem. The application requires three point-in-time copies to be presented to three other hosts that perform different types of reporting on the database. A pointer-based point-in-time copy is estimated to use 25% of the original capacity per copy of the database.
What is the additional storage demand this application has generated to meet the requirement?
A. 75 GB
B. 150 GB
C. 200 GB
D. 600 GB
Answer: B

15. A host generates 7,200 IOPS of which 60% are writes. In a RAID 5 configuration, what is the number of IOPS on the disk?
A. 7,200 IOPS
B. 11,400 IOPS
C. 15,840 IOPS
D. 20,160 IOPS
Answer: D

16. A company must decide whether to introduce a new product line. The new product will have startup costs, operational costs, and incoming cash flows over 5 years.
This project will have an immediate (T=0) cash outflow of $100,000 that may include machinery and employee training costs. Other cash outflows for years 1-5 are expected to be $5,000 per year. Cash inflows are expected to be $30,000 per year for years 1-5. The required rate of return is 10 percent. The present value (PV) can be calculated for each year:
T=0 -$100,000 / 1.10^0 = -$100,000 PV
T=1 ($30,000 - $5,000)/ 1.10^1 = $22,727 PV
T=2 ($30,000 - $5,000)/ 1.10^2 = $20,661 PV
T=3 ($30,000 - $5,000)/ 1.10^3 = $18,783 PV
T=4 ($30,000 - $5,000)/ 1.10^4 = $17,075 PV
T=5 ($30,000 - $5,000)/ 1.10^5 = $15,523 PV
What is the recommendation to the company?
A. The company should invest in the project since it will gain $125,000 in profit.
B. The company should not invest in the project. It will not see any gain from the investment.
C. The project will break even and it should not be considered.
D. The project will break even and should be considered.
Answer: B

17. The results of an SRM Implementation Study are:
1. Software license costs: $150,000
2. Software customization and installation: $50,000
The current projection of a new storage hardware requirement over the next 5 years is estimated at 85 TB.
SRM implementation will reduce the storage requirements to 55 TB. The cost of storage is $50,000 per TB.
The 3-year total cost of ownership (TCO) without SRM implementation = 85*(50,000)
The 3-year total cost of ownership (TCO) with SRM implementation = 150,000 + 50,000 + 55*(50,000)
What is the return on investment (ROI) with the SRM implementation?
A. 6.5%
B. 65%
C. 650%
D. 6,500%
Answer: B

18. What represents a capital cost savings?
A. Improved asset utilization and recovery of stranded assets
B. Number of staff/managed TB of storage
C. Revenue retention and customer loyalty
D. Reduction in regulatory penalties
Answer: A

19. A host generates 7,500 IOPS of which 60% are reads. In a RAID 1 configuration, what is the number of IOPS on the disk?
A. 7,500 IOPS
B. 10,500 IOPS
C. 15,000 IOPS
D. 15,840 IOPS
Answer: B

20. What are the three key elements of business value analysis?
A. Availability, reliability, serviceability
B. Increased revenue, cost avoidance, reduced costs
C. Regulatory requirements, SLA penalties, competitive offerings
D. Storage performance, throughput, bandwidth
Answer: B

21. SAN availability is specified as 99.999 percent.
What is the maximum allowable unplanned downtime per week?
A. 0 seconds
B. 5.26 minutes
C. 6.05 seconds
D. 25.9 minutes
Answer: C

22. If G represents the gain from an investment and C represents the cost of an investment, What is the return on investment (ROI)?
A. G-C
B. G/C
C. (G-C)/C
D. (G-C)/G
Answer: C

23. What are examples of direct costs?
A. Capital and operational expenditure
B. Downtime and disappointing user experience
C. Insufficient capacity and data corruption
D. Lost data and delay in time to market
Answer: A

24. What are examples of indirect costs?
A. Capital and operational expenditure
B. Capital write-off and bandwidth provisioning
C. Installation and staffing
D. Lost data and delay in time to market
Answer: D

© 2014, All Rights Reserved