Which EMC Centera design will meet this goal?
A customer is interested in archiving data for a customdeveloped application. They currently have no archive platform in place for the information used by this application and are extremely concerned about performance. They would like the archive to be designed with the fastest sustainable longterm performance. There are no regulatory concerns in this environment.
Which EMC Centera design will meet this goal?
What is your recommendation?
A customer currently has an NSX attached to a Symmetrix and would like to discuss diskbased recovery options. They have a design goal that requires a copy of the file system be accessible read/write.
This copy is independent of the production file system. In addition, the customer is out of capacity.
What is your recommendation?
Which Symmetrix feature could you discuss that will reduce the customer’s concerns?
A customer’s network security engineer has attended a lecture on the various security weaknesses of storage protocols. The security engineer is concerned about WWN spoofing attacks against their DMX3.
Which Symmetrix feature could you discuss that will reduce the customer’s concerns?
In order to define the retention period on disk, what is an important piece of information you will need to an
You have been asked to design a new centralized backup solution for a customer. The customer sent a list with the number of servers, amount of data, daily change rate, annual growth rate, and information about the backup policy. The customer needs to satisfy their operational restore requests as quickly as possible.
You have decided to design a backuptodisk solution, directing all backups to disk and then staging the data to tape after operational restore needs are satisfied. In order to define the retention period on disk, what is an important piece of information you will need to analyze?
Which alternate solution should you use to back up the Celerra?
You must design a backup solution for an existing Celerra NS80 customer. The customer has decided that the expense of expanding their tape hardware infrastructure to support the additional load is not justified because the technology is not reliable and is outdated.
The customer’s decision criteria are.
1. Performance
2. Least disruption to the production environment
3. Ease of maintenance
Which alternate solution should you use to back up the Celerra?
Which features can be designed into the existing environment to mitigate RPO exposure?
A customer has a DMX3 that is replicated using SRDF/A and is experiencing SRDF/A drops due to intermittent network link loss. Which features can be designed into the existing environment to mitigate RPO exposure?
As a best practice, which level of granularity should be used to enforce a particular security access l
One design goal for storage security is to map server access to storage. This is based on the security classification of the data utilized by the particular server. As a best practice, which level of granularity should be used to enforce a particular security access level within a storage device?
Which information must you have to ensure that the proposed solution will meet the customer’s needs?
A customer has been running a CX340 for the past year to present SAN LUNs. The customer wants to use network shares for a number of clients. You want to propose a new NS40G for the account.
Which information must you have to ensure that the proposed solution will meet the customer’s needs?
Which SRDF solution should you suggest?
A customer has a DMX3000 at Headquarters Site X. The customer currently runs two applications on the DMX3000, both of which need to be replicated for disaster recovery (DR) purposes. The customer cannot tolerate any data loss. The first application needs to be replicated to Site Y, which is 20 miles away. The second application needs to be mirrored to a different site, Site Z, which is 15 miles away.
Which SRDF solution should you suggest?
Which alternative technology should you propose that will offer the most protection for their data?
A customer has just heard about disk drives with builtin encryption capabilities. The customer is very excited about encrypting data at rest on their storage arrays. Their applications process critical data and have highavailability requirements. The customer does not want to modify any of their existing applications to take advantage of encryption capabilities.
Which alternative technology should you propose that will offer the most protection for their data?