Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EMC E20-814 Exam -

Free E20-814 Sample Questions:

Q: 1
A company's administrator has implemented Symmetrix Access Control. The motherboard in the UNIX host with ADMIN privileges was replaced. After this change, the administrator was unable to issue any Symmetrix Management commands.
What is the next step the administrator should take?
A. Regenerate the Unique ID
B. Reboot the UNIX host
C. Reset the Access Control database
D. Reinstall Solutions Enabler
Answer: A

Q: 2
All applications running on an EMC Symmetrix VMAX array are experiencing poor performance.
The environment is characterized by:
Dissimilar workloads
Inefficient resource utilization
Service levels not being met
What can be done to guarantee service levels of business critical applications?
A. Implement dynamic cache partitioning
B. Balance throughput across ports
C. Re-map devices to evenly map the workload
D. Provision new storage for applications
Answer: A

Q: 3
SRDF/EDP is running in Adaptive Copy Disk mode from the source (R1) site to the secondary (R21) site. Which SRDF mode is permitted between the R21 and the R2 sites?
A. Adaptive Copy Write Pending
B. Adaptive Copy Disk
C. Synchronous
D. Semi-synchronous
Answer: A

Q: 4
A company has activated a consistent clone replica of an Oracle database using hot backup mode on February 26th. The Oracle instance continues to run until March 6th. On March 7th, the company realizes that an application problem occurred on February 28th.
What is the most recent point to which the database can be recovered?
A. February 26th
B. February 28th
C. March 6th
D. March 7th
Answer: B

Q: 5
A company uses VMware ESXi servers and EMC Symmetrix VMAX storage arrays. The storage administrators use the VMware vSphere client on their Microsoft Windows desktops to manage the environment. They would like to use the EMC Virtual Storage Integrator Path Management plug-in.
Which path management activities will this plug-in allow?
A. Set multi-pathing policy for all Symmetrix devices
B. Set multi-pathing policy for individual Symmetrix devices
C. Change the multi-pathing ownership of all Symmetrix devices from NMP to PowerPath/VE
D. Change the multi-pathing ownership of individual Symmetrix devices from NMP to
Answer: A

Q: 6
A company has a vSphere environment consisting of eight ESXi hosts. Each host is running EMC PowerPath/VE and is connected to multiple FA ports on their Symmetrix. PowerPath/VE will not claim the disk devices presented by their storage array even though the devices are seen by the hosts.
What is the most likely solution?
A. Configure and register the PowerPath/VE license file
B. Check LUN masking on the array
C. Change the PowerPath/VE failover policy to Symopt
D. Uninstall and reinstall PowerPath/VE
Answer: A

Q: 7
An Oracle ASM disk group consists of two 50 GB LUNs and is currently in use. The Oracle database requires more storage space and has two 100 GB LUNs available.
What is the recommended way to organize ASM disk groups to make use of additional space?
A. Create a new disk group containing two 100 GB LUNs
B. Extend the current disk group to include the two 100 GB LUNs
C. Create two new disk groups containing one 100 GB LUN each
D. Double the disk group size by extending with one 100 GB LUN
Answer: A

Q: 8
A company is planning to migrate their Oracle database to EMC Symmetrix VMAX to support decision support system applications. They would like design guidelines to overcome the existing performance bottlenecks.
What is the key design guideline?
A. Redo logs and archive logs on separate spindles with RAID 5 protection
B. Redo logs and archive logs on the same spindles RAID 5 protection
C. Redo logs and archive logs on the same spindles with RAID 1 protection
D. Redo logs and archive logs on separate spindles with RAID 1 protection
Answer: D

© 2014, All Rights Reserved