Sei sulla pagina 1di 14

Looking for Real Exam Questions for IT Certification Exams!

We guarantee you can pass any IT certification exam at your first attempt with just 10-12
hours study of our guides.

Our study guides contain actual exam questions; accurate answers with detailed explanation
verified by experts and all graphics and drag-n-drop exhibits shown just as on the real test.

To test the quality of our guides, you can download the one-fourth portion of any guide from
http://www.certificationking.com absolutely free. You can also download the guides for retired
exams that you might have taken in the past.

For pricing and placing order, please visit http://certificationking.com/order.html


We accept all major credit cards through www.paypal.com

For other payment options and any further query, feel free to mail us at
info@certificationking.com
EMC E20-020 : Practice Test

Question No : 1

A cloud architect is designing a private cloud for an organization. The organization has no
existing backup infrastructure. They want to offer consumers the ability to backup virtual
machine instances using image-based backups.

What should the cloud architect look for when selecting a backup application for this
environment?

A. Virtual machine hardware is on the backup application vendors compatibility list


B. Hypervisor servers hardware is on the backup application vendors compatibility list
C. Backup application can be integrated with the selected CMP components
D. Backup application supports a cloud gateway for accessing the cloud-based virtual
machines

Answer: D
Explanation:

A cloud storage gateway provides basic protocol translation and simple connectivity to
allow the incompatible technologies to communicate transparently. The gateway can make
cloud storage appear to be a NAS filer, a block storage array, a backup target or even an
extension of the application itself.
References: http://searchcloudstorage.techtarget.com/definition/cloud-storage-gateway

Question No : 2

When implementing QoS across a cloud network, how is storage traffic usually prioritized?

A. Most important
B. More important than tenant traffic but less important than management traffic
C. More important than management traffic but less important than tenant traffic
D. Least improtant

Answer: C

Question No : 3

Which set of general criteria should the cloud architect consider when selecting a cloud
management platform?

A. Multi-tenancy, API version, and cross-platform awareness

www.CertificationKing.com 2
EMC E20-020 : Practice Test
B. Hypervisor, hybrid cloud capabilities, and authentication
C. Geographic region, networked storage, and Internet access
D. Network storage, operating system drivers, and update services

Answer: B
Explanation:

At a bare minimum, new clouds must be able to access all the physical and virtual
infrastructure within an organizationWindows, AIX, or mainframe; hypervisors like
vSphere, KVM, and Hyper-V; as well as public clouds including Microsoft Azure, Amazon
Web Services (AWS), IBM SoftLayer, and more.
References: http://www.bmc.com/blogs/3-fundamental-requirements-for-cloud-
management-platforms/

Question No : 4

You are designing consumer compute resources in an onsite private cloud. During an
assessment, you discover that the organizations IT staff wants secure access to the
underlying host OS. What should be included in the design to support this requirement?

A. Host IDS configurationSecure key infrastructure


Bridged management network
B. Perimeter firewall configuration
VPN encryption
Separate management network
C. Host OS firewall configuration
Central logging
Physically isolated management network
D. Host OS firewall configuration
Secure key infrastructure
Separate management network

Answer: B

Question No : 5

A cloud architect is designing a distributed block storage solution that will support
application HA. The solution will consist of 10 nodes with all SAS devices. There are five
racks available in the data center. Each rack has a single top-of-rack access layer switch

www.CertificationKing.com 3
EMC E20-020 : Practice Test
with sufficient bandwidth to the aggregate layer. Each node will have multiple connections
to the local top-of-rack switch.

The architect wants to provide a design that has the fewest number of storage pools
maximizing the number of fault domains. How should the storage pools be designed?

A. One pool with SSD nodes located in one rackOne pool with all SAS nodes located in a
different rack
B. One pool with 50% SSD and 50% SAS nodes distributed equally across five racks
C. One pool with SSD nodes distributed equally across five racksOne pool with all SAS
nodes distributed equally across five racks
D. One pool with 50% SSD and 50% SAS nodes located in one rackOne pool with 50%
SSD and 50% SAS nodes located in a different rack

Answer: C

Question No : 6

A cloud design contains multiple hosts that are running a hypervisor. Each host has only
two physical 10 Gb network adapters that are aggregated for bandwidth and failover. The
physical switch ports for each host are configured as access ports. Each host will support
numerous virtual machines and network segments. These virtual machines will
communicate with other virtual machines on the same network segments. Why would
overlay networks be required for this design?

A. Support for more than two virtual switches


B. Support for more than one virtual segment
C. Support for more than two virtual machines
D. Support for more than one distributed virtual switch

Answer: B
Explanation:

An overlay network is a computer network that is built on top of another network. Nodes in
the overlay network can be thought of as being connected by virtual or logical links, each of
which corresponds to a path, perhaps through many physical links, in the underlying
network.
Virtual overlay networks use tunneling protocols to extend isolated network segments
between servers for multi-tenant data center networks.
References: http://searchsdn.techtarget.com/tip/Virtual-overlay-networks-Tunneling-
protocols-enable-multi-tenancy

www.CertificationKing.com 4
EMC E20-020 : Practice Test

Question No : 7

What describes the storage categories represented by OpenStack Swift and EMC XtremIO
requirements?

A. Swift = Distributed Object StorageXtremIO = Central Storage


B. Swift = Central Storage
XtremIO = Distributed File Storage
C. Swift = Distributed Block StorageXtremIO = Distributed Object Storage
D. Swift = Distributed File StorageXtremIO = Distributed Block Storage

Answer: A
Explanation:

OpenStack Swift is a globally-distributed object storage with a single namespace thats


durable enough for the most demanding private clouds and now brought to you in an easy-
to-deploy/scale/manage system.
XtremIO is a flash-based Storage Array.
References:
https://www.swiftstack.com/#testimonial/2 http://www.emc.com/collateral/white-
papers/h11752-intro-to-XtremIO-array-wp.pdf

Question No : 8

An organization plans to deploy a spine/leaf network topology to support a cloud design.


Leaf switches will use layer-3 protocols to communicate with the spine switches. Hosts will
each connect to two leaf switches using layer-2 protocols.

Which technology must be enabled between the host and leaf switches to provide the
maximum throughput for a single data stream?

A. Generic Network Virtualization Encapsulation


B. Spanning Tree Protocol
C. Equal-Cost Multi-Path Routing
D. Multi-Chassis Aggregation

Answer: A
Explanation:

Generic Network Virtualization Encapsulation (Geneve) is the peacemaking protocol


drafted to unify VXLAN, NVGRE, and whatever other tunneling protocols emerge for
network virtualization. Geneve doesnt exactly replace VXLAN and other protocols. Rather,

www.CertificationKing.com 5
EMC E20-020 : Practice Test
it provides a common superset among them, so that outside software can provide hooks to
Geneve rather than having to accommodate multiple encapsulation standards.
Note: NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network
virtualization technology that attempts to alleviate the scalability problems associated with
large cloud computing deployments. It uses Generic Routing Encapsulation (GRE) to
tunnel layer 2 packets over layer 3 networks. Its principal backer is Microsoft.
References: https://www.sdxcentral.com/articles/news/intel-supports-geneve-unify-vxlan-
nvgre/2014/09/

Question No : 9

In addition to the operating system, what other components does the consumer manage in
an IaaS cloud service model?

A. Application, data, storage, and physical networking


B. Data, middleware, application, and runtime
C. Runtime, physical servers, application, and middleware
D. Middleware, runtime, hypervisor, and application

Answer: B
Explanation:

In the case of IaaS the computing resource provided is specifically that of virtualised
hardware, in other words, computing infrastructure.
IaaS clouds often offer additional resources such as a virtual-machine disk-image library,
raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual
local area networks (VLANs), and software bundles.
Figure: Cloud-computing layers accessible within a stack

Incorrect:
Not A: not Physical networking not C: Not physical servers. Not D: Not Hypervisors.
References: http://www.interoute.com/what-iaas

Question No : 10

An organization is implementing a backup solution for their private cloud. They are
concerned that having the backup data stored onsite will expose them to lose in the event
of a site-wide disaster. They are considering replicating the backup storage to an external
site.

www.CertificationKing.com 6
EMC E20-020 : Practice Test
What are the design considerations involved with this replication solution?

A. Ensuring proper hypervisor support and the availability of a federated single sign-on
solution
B. Ensuring network traffic encryption is considered and ensuring proper hypervisor
support
C. Ensuring sufficient network bandwidth is available and network traffic encryption is
considered
D. Ensuring proper hypervisor support and sufficient network bandwidth is available

Answer: B

Question No : 11

A cloud architect is designing a hybrid cloud for an organization. A requirement for this
environment is that the private cloud user credential be trusted by both cloud provisioning
APIs. Which type of authentication will meet this requirement?

A. Federated authentication
B. Asymmetric encryption
C. Symmetric encryption
D. Shared-key authentication

Answer: A
Explanation:

A federated identity in information technology is the means of linking a person's electronic


identity and attributes, stored across multiple distinct identity management systems.
References: https://en.wikipedia.org/wiki/Federated_identity

Question No : 12

An organization wants to deploy cloud applications using block storage. The architect has
included a hyperscale storage solution in the cloud design.

Which requirements led to including this solution in the design?

A. Organization wants to purchase a storage array


Organization will use a full mesh topology to combine storage and application processing
B. Organization wants to purchase a storage array
Organization will use a spine/leaf topology to combine storage and application processing

www.CertificationKing.com 7
EMC E20-020 : Practice Test
C. Organization wants to purchase a storage array
Organization wants to keep storage processing separate from the application processing
D. Organization does not want to purchase a storage array
Organization wants to use a full mesh topology to combine storage and application
processing

Answer: B
Explanation:

When customers want converged/hyper-converged infrastructure appliances (or rack scale


systems) - what customers ask for is this:
They want a management and orchestration stack that spans the domains of
compute/storage/virtualization (in appliances), and this extends to the top-of-rack network
and spine/leaf network (in rack-scale systems that must scale to and beyond rack
boundaries operationally).
Note: Hyperscale storage is the storage of vast quantities of information in media capable
of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale
storage capacity commonly runs into the petabytes.
References:http://virtualgeek.typepad.com/virtual_geek/page/4/

Question No : 13

An organization wants to include performance monitoring in their cloud environment.


However, they want to minimize the number of accounts and passwords that must be
created on target devices and sent across the network.

Which monitoring solution should a cloud architect recommend to meet this requirement?

A. Proxy
B. Agent-based
C. Agentless
D. Central

Answer: D

Question No : 14

An organization wants to deploy a block storage in the cloud using a storage array that is
accessible through the iSCSI protocol. The hosts support iSCSI.

www.CertificationKing.com 8
EMC E20-020 : Practice Test
Why would network segmentation be included in the design to support this requirement?

A. Secure all traffic between the storage array and the hosts
B. Enable CHAP between the array and hosts
C. iSCSI traffic is not supported on networks with other types of traffic
D. Enable LUN masking capabilities of the array

Answer: D
Explanation:

LUN masking is a further constraint added to LUN zoning to ensure that only devices
authorized to access a specific server can access the corresponding port.
A logical unit number (LUN) is a unique identifier that designates individual hard disk
devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre
Channel (FC) or similar interface. LUNs are central to the management of block storage
arrays shared over a storage area network (SAN).
References: http://searchvirtualstorage.techtarget.com/definition/LUN-masking

Question No : 15

Ian organization wants to protect the cloud management platform (CMP) from loss due to a
site disaster. To support this requirement, the completed cloud design deliverables include
the processes and procedures for restoring CMP functionality.

What other item should be included in the deliverables to support this requirement?

A. Recovery validation and verification processes


B. Data abstraction keys
C. List of all consumer service IP addresses
D. Document containing the data encryption keys

Answer: A

Question No : 16

Which cloud services are typically responsible for automatically scaling applications?

A. Orchestration and monitoring


B. Metering and service catalog
C. Monitoring and metering
D. Service catalog and orchestration

www.CertificationKing.com 9
EMC E20-020 : Practice Test
Answer: A
Explanation:

Orchestration is the automated arrangement, coordination, and management of complex


computer systems, middleware and services. This usage of orchestration is often
discussed in the context of service-oriented architecture, virtualization, provisioning,
converged infrastructure and dynamic datacenter topics. Orchestration in this sense is
about aligning the business request with the applications, data, and infrastructure.
References: https://en.wikipedia.org/wiki/Orchestration_(computing)

Question No : 17

Which type of storage is optimal for high performance and low latency applications?

A. File
B. Object
C. Block
D. Cluster

Answer: C
Explanation:
Block storage has been king of the hill for performance-centric applications.
References: http://searchcloudstorage.techtarget.com/feature/How-an-object-store-differs-
from-file-and-block-storage

Question No : 18

A cloud design contains multiple hosts that are running a hypervisor. Each host has only
two physical 10 Gb network adapters. The hosts reside in different subnets but can
communicate with each other. Each host will support numerous virtual machines and
network segments.

What is needed to support a network segmentation in the current configuration?

A. IDS
B. NVGRE
C. MLAG
D. VLAN

Answer: B

www.CertificationKing.com 10
EMC E20-020 : Practice Test
Explanation:

NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network


virtualization technology that attempts to alleviate the scalability problems associated with
large cloud computing deployments. It uses Generic Routing Encapsulation (GRE) to
tunnel layer 2 packets over layer 3 networks.
Incorrect:
Not C: MLAG is the ability of two and sometimes more switches to act like a single switch
when forming link bundles. This allows a host to uplink to two switches for physical
diversity, while still only having a single bundle interface to manage.
References:
https://en.wikipedia.org/wiki/Network_Virtualization_using_Generic_Routing_Encapsulation

Question No : 19

What are key benefits of ITaaS compared to traditional IT processes?

A. Tiered services, integrated inventory management, and SLA-driven profit model


B. Service catalog, SLA-driven management, and chargeback
C. Strong policies, DevOps, and software licensing
D. Ticket-based service model, cost, and chargeback

Answer: B
Explanation:

*In the ITaas model, corporate IT offers a menu of SaaS, PaaS and IaaS options for
business users via acentralized service catalog. Business users are free to pick and
choose cloud services that corporate IT has vetted, or provide themselves. These users
can make informed decisions based on service pricing and SLAs, and can in many cases
can provision services on their own.
*ITaas can be implemented through new consumption models leveraging self-service
catalogs offering bothinternal and external services; providing IT financial transparency for
costs and pricing; offering consumerized IT such as bring your own device (BYoD) to
meet the needs of users. All of which simplify and encourage consumption of services.
*A service-level agreement (SLA) is a part of a standardized service contract where a
service is formallydefined. Particular aspects of the service scope, quality, responsibilities
are agreed between the service provider and the service user.
References: http://leverhawk.com/is-itaas-really-a-new-concept-20130628321

www.CertificationKing.com 11
EMC E20-020 : Practice Test

Question No : 20

A cloud architect has determined that the cloud management infrastructure requires an
authentication and PKI environment. In addition, each tenant will require its own
authentication and PKI environment. What describes these separate environments in a
cloud design document?

A. Availability zones
B. Fault domains
C. Multi-tenancy
D. Trust zones

Answer: C
Explanation:
The term "software multitenancy" refers to a software architecture in which a single
instance of software runs on a server and serves multiple tenants. A tenant is a group of
users who share a common access with specific privileges to the software instance.
Incorrect:
Not A: Availability zones (AZs) are isolated locations within data center regions from which
public cloud services originate and operate.
Not B: A fault domain is a set of hardware components computers, switches, and more
that share a single point of failure.
Not D: Zones of trust are a defined area of the system where by by necessity, by the
presence of key information assets and by the wider environmental context the connections
within the zone are treated as at the same level of trust. This effectively couples the
components within that subsystem for security purposes.
References: https://en.wikipedia.org/wiki/Multitenancy

Question No : 21

Which authentication and authorization feature is critical for service providers when
supporting multi-tenancy?

A. Integration with external authentication services


B. Integration with external directory services
C. Portal authentication services
D. Single sign-on capability

Answer: A

www.CertificationKing.com 12
EMC E20-020 : Practice Test

Question No : 22

Which additional considerations must a cloud monitoring system address compared to a


traditional monitoring system?

A. Tenant isolation, orchestration, and elastic workloads


B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration

Answer: C
Explanation:

* Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with
the right keys locking out anyone who doesnt have them.

Question No : 23

An organization uses Microsoft Active Directory (AD) for service authentication in their
private cloud. They want to use the same authentication source for services in the public
cloud. External employees access services in both clouds and need to authenticate with
AD.

The organization wants to minimize and secure network traffic. Which solution will address
these requirements?

A. Connect the two clouds through IPsec VPNPlace AD controllers in the private cloud only
B. Connect the two clouds through IPsec VPNPlace AD controllers in the private and public
clouds
C. Configure perimeter firewalls to allow AD traffic
Place AD controllers in the private and public clouds
D. External users connect with IPsec VPNPlace AD controllers in the private cloud only

Answer: B
Explanation:

References:
https://blogs.technet.microsoft.com/keithmayer/2013/01/20/step-by-step-extending-on-
premise-active-directoryto-the-cloud-with-windows-azure-31-days-of-servers-in-the-cloud-
part-20-of-31/

www.CertificationKing.com 13
EMC E20-020 : Practice Test

Question No : 24

In a cloud design, an architect has defined a separate trust zone for host management. The
hosts will be running open source hypervisors.

What should be included in the design deliverables to support this separate trust zone?

A. Isolated management network and a common super-user account


B. Separate PKI and encrypted CMI portal access
C. Separate authentication source and a preferred zone set
D. Isolated management network and a separate authentication source

Answer: D

Question No : 25

After developing prototype applications in the public cloud, developers determined that they
want softwaredefined network functionality. Which ability will this requirement provide for
the developers?

A. Programmatically provision an IPsec VPN tunnel between the public and private clouds
B. Programmatically migrate layer-3 access from aggregate to access switches
C. Programmatically control physical core network topologies
D. Programmatically provision physical network segments and services

Answer: D
Explanation:

Software-defined networking (SDN) is an approach to computer networking that allows


network administrators to manage network services through abstraction of higher-level
functionality. This is done by decoupling the system that makes decisions about where
traffic is sent (the control plane) from the underlying systems that forward traffic to the
selected destination (the data plane).
Reference: https://en.wikipedia.org/wiki/Software-defined_networking

Question No : 26

www.CertificationKing.com 14

Potrebbero piacerti anche