Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

EMC E22-106 Exam - Cheat-Test.com

Free E22-106 Sample Questions:

1. Which statement describes the functionality of an AAM Sensor?
A. A Sensor returns the value of the data point to a trigger.
B. A Sensor fires an associated rule when the value of the data point changes.
C. A Sensor fires an associated trigger when the value of the data point changes.
D. A Sensor senses changes in the value of a data point and submits those changes to its associated rule.
Answer: A

2. When is it appropriate to configure node-specific isolation detection IP addresses instead of domain-specific isolation detection IP addresses?
A. when isolation detection IP addresses are common to all nodes
B. when a configuration has only one isolation detection IP address
C. when isolation detection IP addresses are not common to all nodes
D. when a configuration has five or more isolation detection IP addresses
Answer: C

3. Which statement is true when creating a new service resource?
A. The default response test is used to query the service status.
B. AAM discovers all services on all nodes when selecting the service to run.
C. AAM prevents the target node list from containing nodes on which the service is not installed.
D. The account information set must match the account for the service configuration in the service Control Manager applet.
Answer: B

4. What are three elements of a Resource Group? (Choose three.)
A. rules
B. delays
C. sensors
D. node proxies
E. Utility Processes
F. event messages
Answer: BEF

5. A three-node domain is configured with each of the nodes connected to two networks. A network cable attached to node A's Network Interface Card (NIC) is accidentally detached. Later that evening, the maintenance crew unplugs power to the hub on node A's remaining working network.
Which statement is true?
A. The node is considered isolated.
B. Nodes B and C will report node A as shut down.
C. The resources running on node A are taken offline.
D. When the network connection is re-established, node A will determine that its Resource Group objects have changed to a failed state.
Answer: A

6. Which is a valid IP address for private non-routed network use?
A. 37.16.256.4
B. 117.24.103.40
C. 127.0.0.1
D. 192.168.7.69
Answer: D

7. Which two networking statements are correct? (Choose two.)
A. Routing is the same on all operating systems.
B. Routing is the same on UNIX operating systems.
C. Not all switches will route multicast traffic by default.
D. To observe the routing table on a UNIX or Windows server, you should use the netstat -nr command.
Answer: CD

8. Which three options should you consider when performing a failover in a WAN environment? (Choose three.)
A. isolation detection
B. transfer of host name
C. location of DNS servers
D. transfer of IP addresses
E. secondary agents on both sides of the network
Answer: ACD

9. Which two are clustering topologies? (Choose two.)
A. ring
B. star
C. one to one
D. one to none
E. many to one
Answer: CE

10. Which two statements are true about the AAM isolation detection feature? (Choose two.)
A. All agents are responsible for isolation detection.
B. Only primary agents are responsible for isolation detection.
C. If, within half of the minimum detection time, no heartbeats are received, a ping is sent to each isolation address.
D. If, within half of the minimum detection time, no heartbeats are received, a ping is sent across the verification line.
Answer: AC

11. An administrator creates five Resource Groups in AAM. What is the number of ftPerl processes running by default?
A. 1
B. 2
C. 3
D. 5
Answer: C

12. Which two tasks can occur on a secondary agent? (Choose two.)
A. execute rules
B. restart the backbone
C. host a Resource Group
D. monitor the AAM domain
E. maintain a copy of the database
Answer: CD

13. Which statement about AAM's Network Interface Card (NIC)-to-NIC feature is true?
A. If one NIC fails, another will be configured to take its place.
B. Communications can be routed from one NIC to another NIC.
C. If one NIC is overloaded, another NIC will be configured to assist with traffic.
D. Two NICs are paired together as a single logical NIC with twice the capacity and function.
Answer: A

14. When considering the use of a dedicated Mirroring Network, which two statements are true? (Choose two.)
A. You must set the duplex mode for the adapter to AutoSelect.
B. The NetBEUI protocol must be enabled for the mirroring network.
C. You must ensure that TCP/IP is the only network protocol on that link and all other protocols are disabled.
D. The Network Interface Card (NIC) used for mirroring must appear before the NICs used for the public network.
E. You must assign a static IP address for the dedicated link that is on a separate subnet from any domain network or public network.
Answer: CE

15. Which statement is true about AAM secondary nodes?
A. Secondary nodes provide backbone fault tolerance.
B. Secondary nodes can be the last running node in an AAM domain.
C. Secondary nodes can be the preferred node to run a Resource Group.
D. Secondary Rule Interpreters can run rules for any node on the domain.
Answer: C

16. Node alias names must _____. (Choose two.)
A. be unique
B. be listed in DNS
C. be fewer than 16 characters
D. disable NetBIOS over TCP/IP
E. be assigned to a Resource Group
Answer: AC

17. What does the mirroring for Windows 2000 Data Source require?
A. a dynamic disk
B. a private network
C. a shared disk array
D. a hardware RAID controller
Answer: B

18. Which three resource objects can be contained within a Resource Group? (Choose three.)
A. rule
B. process
C. IP address
D. Utility process
E. Network Interface Card (NIC)
Answer: BCD

19. Which three options can only be defined in a Resource Group? (Choose three.)
A. delays
B. scripts
C. event messages
D. environment variables
E. Network Interface Cards (NICs)
Answer: ABC

20. Which statement describes an AAM Utility Process?
A. A Utility Process runs using the account of the user that started it.
B. A Utility Process can transition to the failed state if its existence monitor is incorrectly written.
C. A Utility Process is an unmanaged process that can be started from the Management Console, from a Resource Group, or from a rule.
D. When contained within a Resource Group, a Utility Process will typically run while the group is brought online, and be stopped when the resource group is taken offline.
Answer: C

21. Which two are valid features of AAM? (Choose two.)
A. automatic failover among the nodes
B. static load balancing among the nodes
C. enabling nodes to simultaneously share resources
D. ability to scale the system up to handle more clients
Answer: AB

22. Which management capability of AAM allows for actions based on changes in the environment?
A. rules
B. triggers
C. sensors
D. actuators
Answer: A

23. Which two conditions must be validated before installing the AAM 5.X agent on the Solaris operating system? (Choose two.)
A. Motif 1.2 installed
B. any user with a UID = 0
C. minimum of two networks
D. Sparc system running Solaris 2.6 or later
Answer: BD

24. You are planning an AAM domain for nine servers. What is the maximum number of servers that should be configured as primary nodes?
A. 3
B. 5
C. 7
D. 8
E. 9
Answer: B

25. Which three are reasons for testing filesystem data source attachment and detachment on all applicable nodes prior to implementing AAM? (Choose three.)
A. to ensure that filesystem mount points exist on all applicable nodes
B. to ensure that shared storage devices are properly shared to all applicable nodes
C. to ensure that data sources can be mounted and accessed without error on all applicable nodes
D. to ensure that filesystem owner usernames or accounts and groups exist on all applicable nodes
E. to ensure that AAM is capable of setting filesystem permissions correctly on all applicable nodes
Answer: ABC

26. An administrator is preparing two systems for implementation of AAM. The administrator has physically connected both systems to one physical disk via SCSI cables. The application that AAM will control will access flat-file data that resides on this disk.
How should the administrator ensure data integrity and be able to access the data?
A. configure the two SCSI controller cards so that they have different SCSI IDs
B. configure the two SCSI controller cards so that they have the same controlling SCSI ID
C. partition the disk into two so that mirroring can be established between the two systems
D. disconnect one of the systems from the SCSI disk and establishing a redundant data source network link between the two systems
Answer: A

27. Which three UNIX configuration files should you check and possibly modify prior to implementing and starting AAM, to ensure proper name resolution? (Choose three.)
A. /etc/hosts
B. /etc/profile
C. /etc/resolv.conf
D. /etc/password or /etc/group
E. /etc/named.conf or /etc/named.boot
F. /etc/nsswitch.conf or /etc/netsvc.conf
Answer: ACF

28. How should you determine which ports to use for the AAM installation?
A. run ftcli to verify ports
B. use system tools to check port availability
C. run the verify_install script to check for port conflicts
D. use the ft_setup script to view available ports during installation
Answer: B

29. Which two tasks should be performed before installing AAM to verify that an application will failover correctly? (Choose two.)
A. set the application services to manual on Windows operating systems
B. create an entry in DNS or the local host file linking the domain name to a managed IP address
C. create a duplicate IP address on each node in the domain for use as a managed IP address for application connection
D. verify that the application is installed and running correctly on every node defined in the preferred node list for the AAM domain
Answer: AD

30. You are installing the AAM agent and console on a Solaris node. Which two environment variables should be set? (Choose two.)
A. FT_DIR
B. FT_SETUP
C. FT_DOMAIN
D. FT_STARTUP
E. FT_CONSOLE
Answer: AC


© 2014 Cheat-Test.com, All Rights Reserved