Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network Appliance NS0-330 Exam - Cheat-Test.com

Free NS0-330 Sample Questions:

Q: 1 Which interface is used by the Setup Wizard to configure an FC-series DataFort appliance?
A. serial port
B. Ethernet port
C. host FC-port
D. storage FC-port
Answer: B

Q: 2 RedHat 2.6 kernel with GNOME is a supported platform for Decru Management Station.
A. True
B. False
Answer: B

Q: 3 California SB1386 requires businesses and government agencies to _____.
A. encrypt personal information on onsite backup tapes when reasonable alternative methods are not in place
B. encrypt all personal information on offsite backup tapes when reasonable alternative methods are not in place
C. encrypt all personal information on both disk and backup tapes, onsite or offsite, when reasonable alternative methods are not in place
D. notify individuals if their unencrypted personal information is believed to have been disclosed to an unauthorized person
E. notify the California District Attorney Office if unencrypted personal information is believed to have been disclosed to an unauthorized person
Answer: D

Q: 4 Which SCSI signaling and connector type is used by an S-Series DataFort?
A. HVD signal, VHDCI connector type
B. HVD signal, HD68 connector type
C. LVD signal, VHDCI connector type
D. LVD signal, HD68 connector type
Answer: C

Q: 5 Which defense setting requires zeroization after rebooting with a low battery condition?
A. Basic
B. Medium
C. High
D. FIPS mode
E. CC mode
Answer: C

Q: 6 Which step is automatically performed when using host virtualization?
A. WWN forwarding for virtualized hosts
B. WWN forwarding when creating Cryptainer vaults
C. masking LUNs to the base WWN on the storage side and to the virtualized host WWN
D. granting Cryptainer access to virtualized hosts
E. adding the virtualized host WWN to the storage side zoneadding the virtualized host? WWN to the storage side zone
Answer: D

Q: 7 Which five filtering options does the network capture capability on the DataFort allow? (Choose five.)
A. filter on IP address
B. filter on DNS hostname
C. filter on port number
D. filter on IP protocol
E. filter on user ID
F. filter using "and," "or" and "not"
Answer: A, B, C, D, F

Q: 8 What can the E-Series DataFort net util tcpdump command capture?
A. network packets going between two arbitrary machines
B. only network packets going between DataFort client-side NIC and arbitrary machines
C. only network packets going between DataFort server-side NIC and arbitrary machines
D. only network packets going between DataFort client-side NIC and server-side NIC
E. network packets going between DataFort client-side/server-side NIC and arbitrary machines
Answer: E

Q: 9 Which two actions remove key material? (Choose two.)
A. zeroization of DataFort with destruction of its System Card
B. deletion of all manually saved configdb files
C. deletion of all Recovery Key Archives
D. destruction of Admin Cards
Answer: A, B

Q: 10 Which setting(s) do you use to enable the tape error recovery extension to the FC protocol?
A. dfc.hostside_fc_tape; dfc.storageside_fc_tape
B. dfc.disable_host_fc_tape; dfc.disable_storage_fc_tape
C. dfc.enable_fcp_error_recovery
D. dfc.tape_recovery_buffer
Answer: B

Q: 11 Which four can be used to share key material between different DataFort clusters? (Choose four.)
A. a trustee relationship with ConfigDB export/import
B. a trustee relationship with key export/import
C. DataFort cloning
D. Key Translation in LKM software
E. DataFort SecurePort
F. Recovery Card cloning
G. Key Translation in LKM appliance
Answer: B, C, D, G

Q: 12 Which three statements are true about the DataFort appliance remote logging capabilities? (Choose three.)
A. All DataFort logs can be configured to be sent to a remote Windows-based server.
B. The DataFort will retain all critical log entries until manually cleared by a full admin.
C. DataFort log storage locations can be configured from the GUI or the CLI.
D. DataFort logging can be configured to be sent to a remote syslog server.
Answer: A, C, D

Q: 13 Which FIPS certification does the FC520 have?
A. 140-2, Level 1
B. 140-2, Level 2
C. 140-2, Level 3
D. 140-2, Level 4
Answer: C

Q: 14 Which two upgrades produce a zeroization of DataFort? (Choose two.)
A. upgrading from SAN 1.6 to SAN 2.2.0.1
B. upgrading from SAN 2.0 to SAN 2.2.0.1
C. upgrading from SAN 2.2.0.1 to SAN 2.2.0.1P1
D. upgrading from SAN 1.8 to SAN 2.1
Answer: A, D

Q: 15 A customer disaster recovery configuration should _____.
A. be verified as functional before DataFort appliances are installed
B. have the disaster recovery site in the same time zone as the primary site
C. have a disaster recovery site with network connectivity to the primary site
D. have data path connectivity to the primary site
Answer: A

Q: 16 Which two methods allow movement of keys to two standalone LKM servers/appliances (LKM1 and LKM2)? (Choose two.)
A. establish link between LKM1 and LKM2 appliances
B. register DataFort to both LKM servers and manually initiate a backup to LKM2
C. save the configdb manually from DataFort and import the configdb onto LKM2
D. translate the keys from LKM1 to LKM2 using a quorum of Recovery Cards
Answer: A, B

Q: 17 How do you ensure that operation trace logging is enabled? (Choose two.)
A. through the Logging Configuration page of the WebUI
B. through the Setup Logging page of the WebUI
C. by using the CLI log config show command
D. by using the CL sys prop get command to view the setting of the sys.proc.syslogd.conf.op_trace property
Answer: A, D

Q: 18 What happens when the DataFort detects an intrusion?
A. The DataFort denies all logins and shuts down.
B. The DataFort begins beeping.
C. The DataFort deletes all data on the servers and iSCSI portals.
D. The DataFort stops encrypting and decrypting data.
Answer: D

Q: 19 When should you use DataFort cloning as a key-sharing best practice?
A. global default pool deployment
B. key per Tape policy with key expiration
C. key per Pool policy
D. disk Rekey
Answer: A

Q: 20 Which Solaris-specific file is used for target discovery for tape devices?
A. /dev/rmt/0cbn
B. /opt/qlogic/qla.conf
C. /etc/tape.conf
D. /kernel/drv/st.conf
Answer: D

Q: 21 Which two FC DataFort deployment options are supported? (Choose two.)
A. both storage and host ports connected to the same switch
B. the storage port connected to an edge switch and the host port connected to a core switch
C. as a switch ISL
D. as a Fibre Channel bridge to a SCSI tape drive
Answer: A, B

Q: 22 In FC-Series 2.x, which two applications recognize application pool labels? (Choose two.)
A. CommVault Galaxy
B. Symantec/Veritas NetBackup
C. EMC/Legato NetWorker
D. Tivoli Storage Manager
E. CA BrightStor ARCServe
Answer: B, C

Q: 23 When you have sufficient rack space and maximum appliance heat output, what is the maximum number of FC1020s that you can deploy in a rack with a cooling capacity of 20,000 BTU/hr? (Hint: BTU = watts * 3.42)
A. 1
B. 5
C. 9
D. 16
E. 21
Answer: C

Q: 24 Which two operations use Recovery Cards? (Choose two.)
A. Key Translation
B. configuration database backup
C. establishing trust relationship
D. creating a specialty administrator
Answer: A, C

Q: 25 How is a key secured in transit between DataFort trustees?
A. The key is password-encrypted on export from the source DataFort, and then decrypted by the same password on import at the destination DataFort.
B. The key is encrypted by the trustee Link Key on export from the source DataFort, and then decrypted by the same Link Key on import at the destination DataFort.
C. The key is encrypted by the trustee private key on export from the source DataFort, and then decrypted by the trustee public key on import at the destination DataFort.
D. The key is encrypted by the trustee public key on export from the source DataFort, and then decrypted by the trustee private key on import at the destination DataFort.
Answer: B

Q: 26 How do you capture log and configuration information for a DataFort?
A. use the Config Info button on the Backup page of the WebUI
B. use the Config Info button on the Status page of the WebUI
C. use the CLI system config show command
D. use the CLI system util techdump os command
Answer: D

Q: 27 Which are three conditions when Port Mapped Cryptainer vaults can be created on all the devices connected to DataFort? (Choose three.)
A. when storage-side and host-side virtualization are turned ON
B. when host-side and storage-side virtualization are turned OFF with a single device connected to each board
C. when host-side and storage-side virtualization are turned OFF with multiple devices connected to each board
D. when storage-side virtualization is turned ON and host-side virtualization is turned OFF with multiple devices connected to each board
E. when storage-side virtualization is turned OFF and host-side virtualization is turned ON with multiple devices connected to each board
Answer: A, B, E

Q: 28 What is the function of the Recovery Key Archive?
A. key translation in LKM
B. DataFort Recovery Wizard
C. Recovery Card replacement
D. DataFort zeroization
Answer: A

Q: 29 Which DataFort command generates a syslog message without disrupting I/O?
A. disk rescan
B. host rescan
C. system log restart
D. system reboot -p
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved