which techniques represent risk mitigation?
In addition to encryption, which techniques represent risk mitigation?
How should you justify the increased cost of the iSCSI Adapters?
You are meeting with the CIO to discuss your VDC design. They question the amount of capital
that is being invested in iSCSI adapters. They state that, because of the number of adapters
required, it is more cost-effective to purchase 10 Gigabit Ethernet NICs and use the integrated
hypervisor software stack.
How should you justify the increased cost of the iSCSI Adapters?
What is this an example of?
An application processes test results from a manufacturing facility, then generates and archives
quality reports. The application runs on an old, but still supported UNIX system. It was developed
by an organization’s IT department 10 years ago.
While it has not been changed in over five years, the application source code and skills needed to
modify it are still available internally.
What is this an example of?
what are the components of a Tier 3 trust tier?
In addition to hypervisor hardening, what are the components of a Tier 3 trust tier?
Which key area(s) of investment is required for successful transition to IaaS?
A company is considering converting their VDC to IaaS. They realize to do this they will also have
to implement several new technologies and create several new functions: service operations and
service management. Previously the organization thought they were service oriented because
they had a service desk in IT to provide support.
Which key area(s) of investment is required for successful transition to IaaS?
which situation should you consider implementing hypervisor over-provisioning?
In which situation should you consider implementing hypervisor over-provisioning?
Which is an example of a hypervisor that performs binary translation of sensitive non-virtualized instruction
Which is an example of a hypervisor that performs binary translation of sensitive non-virtualized
instruction requests, but allows for direct execution of user requests?
Which migration strategy will they most likely use and why?
A small organization plans to migrate a critical application from a traditional, physical infrastructure
to the first servers in their VDC. This will be one of several applications the organization plans to
migrate over the next 2-3 years.
As this is a new VDC implementation, they have not yet realized any of the benefits of a fully
virtualized infrastructure. They have retained an experienced consulting service to help them build
a detailed migration plan.
Which migration strategy will they most likely use and why?
What does using the cloud for a DR site offer protection against?
What does using the cloud for a DR site offer protection against?
Which array feature should be implemented to reduce the quantity of SSDs required to service the high I/O burs
An organization with 25,000 employees moved to a new building that contains a fully virtualized
data center with a virtual desktop infrastructure (VDI) instituted for all employees.
Each morning between 9:00 and 9:30, the help desk receives a large number of calls concerning
slow performance and timeout issues. The IT department determines that the storage arrays Fibre
Channel drives are the bottleneck. IT proposes purchasing solid state disks (SSDs) to store the
entire VDI environment. Unfortunately, their proposal is rejected because of the cost of the drives.
Which array feature should be implemented to reduce the quantity of SSDs required to service the
high I/O bursts of their VDI environment?