Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EMC E20-018 Exam - Cheat-Test.com

Free E20-018 Sample Questions:

Q: 1
What is the first phase of the Virtual Data Center Design Process?
A. Evaluate technology options
B. Create plan
C. Perform initial analysis
D. Gather data
Answer: D

Q: 2
What is the key business goal when consolidating by business application?
A. Virtualize the compute environment for efficiency
B. Identify security gaps and increase security measures
C. Reduce footprint by decreasing energy and space requirements
D. Implement converged network technology for performance
Answer: A

Q: 3
A large company with multiple heterogeneous arrays would like to take advantage of the performance simplified management benefits of storage virtualization. They have a data center transformation pain that includes producing power and cooling at a high priority.
Which storage virtualization method would meet their requirements?
A. Network-based storage tiering
B. Vertical storage tiering
C. Server-based storage tiering
D. Horizontal storage tiering
Answer: B

Q: 4
When using logging to maintain server security, which is the key element for intrusion detection and should be contained the server logs?
A. Vulnerability scan that identifies susceptible services that are active on the server.
B. Results of penetration testing through uncover problem probable weaknesses.
C. An entry for each application transaction with details of the organization.
D. Alerts to suspicious activities that require further investigation.
Answer: D

Q: 5
What is a key VDC and cloud planning consideration for IT governance?
A. Change management
B. Regulations
C. Separation of duties
D. Creating trust zones
Answer: B

Q: 6
A midsize company has deployed centralized storage and is currently planning to virtualize their servers. They have considered their application into Tiers, with Tier 1 application requiring the same service and performance levels of the current servers.
They have purchased new, high capacity servers for the virtualized environment and are planning to consolidate several physical servers into a single hypervisor. They are know determining the bandwidth requirements of the application in order to purchase the current number of FCME CNAs for each server.
The results of their analysis for Tier 1 application are as follows:
Average SAN Bandwidth: 3 Gb/s
Average LAN Bandwidth: 2 Gb/s
What is the minimum number of CNAs they would need to install an each server to meet the bandwidth required for the Tier 1 application while providing CAN redundancy and high availability?
A. 1
B. 2
C. 3
D. 4
Answer: B

Q: 7
What are three attributes of a cloud services design?
A. Web-based APIs, shared resources, minimal capital expenditures
B. Static service, fixed priced access, improved economics
C. Accessed via a web portal, self-service, throttled access
D. Dedicated resources, usage-based pricing, web-based APIs
Answer: A

Q: 8
What would you identify as a business application in applying IT as a Service to IT processions?
A. Defined workflow request processes
B. Funded as a cost center
C. Virtual data center best practices
D. SLA-driven management
Answer: A

Q: 9
A development organization uses a PaaS service from a public cloud to develop and test an application. Once sending and verification are complete, the development team discovers that the cloud services uses proprietary software in the PaaS clustering mailing and deployment of the application within their production data center imposition without significant application records.
What this type of lock-in called?
A. Geographical lock-in
B. Technology lock-in
C. Cloud lock-in
D. Vendor lock-in
Answer: D

Q: 10
When applying compliance principles to your company’s VDC and cloud architectures, how should you approach your information life cycle management strategy?
A. Data of reset
B. Archival and offsite storage
C. Production and backup
D. Inception to completion
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved