which information is required to mask Symmetrix volumes to a host?
When using Solutions Enabler, which information is required to mask Symmetrix volumes to a
host?
What is indicated by the No in the Logged in column of the displayed symmask command?
Click the Exhibit button. What is indicated by the No in the Logged in column of the displayed
symmask command? Practice exams also include self assessment and reporting
features!**Exhibit Missing**
Which EMC application can be used to manage a SRDF/Asynchronous replication between the sites?
A financial company has a local site with a Symmetrix system running Enginuity 5568 and a
remote site with a Symmetrix system running Enginuity 5571. Which EMC application can be used
to manage a SRDF/Asynchronous replication between the sites?
what are the two methods used to discover B-Series switches and directors?
On EMC Control Center, what are the two methods used to discover B-Series switches and
directors?
Which Control Center Agent collects performance, frame flow, error, and operational statistics for connectivit
Which Control Center Agent collects performance, frame flow, error, and operational statistics for
connectivity device ports and generates alerts when specified thresholds are reached?
which agents must be present in the Control Center environment?
A customer has a SAN made up of one DMX, one MDS 9506, and 20 Solaris hosts. They will be
installing Control Center in the environment. In order to use Control Center to perform masking
operations on the DMX, which agents must be present in the Control Center environment?
Which step must be taken in order to discover the new Linux hosts?
A customer has an existing SAN that is being managed by Control Center. Five new Linux hosts
have been deployed to the SAN. Which step must be taken in order to discover the new Linux
hosts?
which view shows only ports and fabrics that have viable connectivity?
In Control Center, which view shows only ports and fabrics that have viable connectivity?
which folder?
In Control Center, imported zones are copied to which folder?
What is a security best practice that should be established?
A data center contains the equipment and software required for a three-tier web application: a
public-facing web server and an Oracle database, both of which are connected to storage via a
SAN. The management server that hosts all required management applications is not connected
to the SAN. What is a security best practice that should be established?