What is indicated by the No in the Logged in column of the displayed symmask command?
What is indicated by the No in the Logged in column of the displayed symmask command?
Which EMC application can be used to manage a SRDF/Asynchronous replication between the sites?
A financial company has a local site with a Symmetrix system running Enginuity 5568 and a
remote site with a Symmetrix system running Enginuity 5571. Which EMC application can
be used to manage a SRDF/Asynchronous replication between the sites?
what are the two methods used to discover B-Series switches and directors?
On EMC Control Center, what are the two methods used to discover B-Series switches and
directors?
Which Control Center Agent collects performance, frame flow, error, and operational statistics…?
Which Control Center Agent collects performance, frame flow, error, and operational
statistics for connectivity device ports and generates alerts when specified thresholds are
reached?
which agents must be present in the Control Center environment?
A customer has a SAN made up of one DMX, one MDS 9506, and 20 Solaris hosts. They
will be installing Control Center in the environment. In order to use Control Center to
perform masking operations on the DMX, which agents must be present in the Control
Center environment?
Which step must be taken in order to discover the new Linux hosts?
A customer has an existing SAN that is being managed by Control Center. Five new Linux
hosts have been deployed to the SAN. Which step must be taken in order to discover the
new Linux hosts?
which view shows only ports and fabrics that have viable connectivity?
which folder?
In Control Center, imported zones are copied to which folder?
What is a security best practice that should be established?
A data center contains the equipment and software required for a three-tier web application:
a public-facing web server and an Oracle database, both of which are connected to storage
via a SAN. The management server that hosts all required management applications is not
connected to the SAN. What is a security best practice that should be established?
what may have caused the performance issue of the existing servers?
Your customer has an existing multiple switch fabric environment, and they purchased new
FAs for this project. You have been requested to add five additional servers to the
environment. After your setup and configuration of all five servers, other servers in the
environment experience performance problems. Based on EMC best practice what may
have caused the performance issue of the existing servers?