Certbus > EMC > EMC Specialist > E05-001 > E05-001 Online Practice Questions and Answers

E05-001 Online Practice Questions and Answers

Questions 4

Which EMC product provides a software-defined storage platform that supports object storage services?

A. Elastic Cloud Storage

B. ViPR Controller

C. ScaleIO

D. XtremIO

Browse 186 Q&As
Questions 5

What is an accurate statement about the Common Internet File System (CIFS) protocol?

A. Enables a CIFS server to maintain connection information regarding every connected client

B. Uses a Remote Procedure Call mechanism to provide access to the CIFS supported file systems

C. Contains an open variation of the stateless user datagram protocol that stores information about open files

D. Uses file system locking to enable users to simultaneously overwrite all metadata of a file system

Browse 186 Q&As
Questions 6

What maps the logical path of a file system to its physical path in a file-level virtualization implementation?

A. Global namespace

B. Remote procedure call

C. Distributed file system

D. Cache coherency

Browse 186 Q&As
Questions 7

In which data access method does the file system access an iSCSI storage system over a network?

A. Block-based

B. File-based

C. Object-based

D. Sector-based

Browse 186 Q&As
Questions 8

Which global addressing does the REST application programming interface use for the discovery of a storage service?

A. Uniform Resource Identifier

B. Namespace

C. Extensible Markup Language

D. Controller-provided MAC address

Browse 186 Q&As
Questions 9

What does the transformation of an operating model for third platform adoption involve?

A. Provisioning IT resources through a self-service portal

B. Establishing new roles and responsibilities to manage IT services

C. Adopting virtualization technologies to enable automation

D. Building new technical and business skills in the IT staff

Browse 186 Q&As
Questions 10

Which data access method enables a compute system to access a file system that resides on a storage system?

A. File-based

B. Block-based

C. Object-based

D. Sector-based

Browse 186 Q&As
Questions 11

What is determined by the recovery point objective in a business continuity solution?

A. Frequency of the backup

B. Type of backup devices

C. Type of disaster recovery site

D. Distance between the primary and disaster recovery sites

Browse 186 Q&As
Questions 12

What accurately describes the flow control mechanism in an FC SAN?

A. Both transmitting and receiving ports agree on the number of buffers available during port login

B. Negotiation occurs between an E_Port and an F_Port, and between two N_Ports

C. Credit value is incremented when a frame is transmitted and decremented upon receiving a response

D. Receiver Ready (R_RDY) is sent from the receiving port if available credits reach zero

Browse 186 Q&As
Questions 13

What is a function of a Fibre Channel Forwarder in an FCoE SAN?

A. Applies zoning configurations and provides fabric services

B. Transfers FCoE traffic over an FC SAN

C. Encapsulates IP packets into FC frames

D. Provides both NIC and FC HBA functionality

Browse 186 Q&As
Questions 14

Which elements are associated with an object in an object-based storage system?

A. Data, metadata, object ID, and attributes

B. LUN ID, data, metadata, and object ID

C. Metadata, object ID, attributes, and file path

D. Object ID, attributes, LUN ID, and file path

Browse 186 Q&As
Questions 15

What is an advantage of a software-based object storage implementation?

A. Provides the flexibility to reuse the existing infrastructure

B. Requires less storage capacity to store a large number of objects

C. Provides the flexibility to create more than one object ID for an object

D. Requires less hardware to support scalable architecture

Browse 186 Q&As
Questions 16

What is a benefit of source-based deduplication over target-based deduplication?

A. Backup processing is offloaded from the backup client

B. Less backup data is stored on the backup server

C. Backup data can be retained longer

D. Only unique data is sent over the network to be backed up

Browse 186 Q&As
Questions 17

In a copy on first access (CoFA) technique, when is data copied from the source to the target?

A. All writes are issued to a location on the source

B. All writes are issued to a location on the target

C. A read or write is issued for the first time to a location on the target

D. A read is issued for the first time from a location on the source

Browse 186 Q&As
Questions 18

Which type of fabric topology does the exhibit represent?

A. Full mesh

B. Partial mesh

C. Single core-edge

D. Dual core-edge

Browse 186 Q&As
Exam Code: E05-001
Exam Name: Information Storage and Management v3
Last Update: Mar 19, 2024
Questions: 186 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99