Day3_SM_Prep_Assessment_answers
Day3_SM_Prep_Assessment_answers
C. Database tableTBF
D. Webserver log
1. What is a machine learning technique that uses neural networks as the underlying architecture
for training models?
A. Deep learning
B. Bigdata analytics
C. Edge computing
D. Internet of Things
2. Identify the cloud computing characteristic that controls and optimizes resource use by
leveraging a metering capability.
A. Measured services
C. Resource pooling
D. Rapid elasticity
A. Security
B. Service
C. Business continuity
D. Management
2. Which layer function provides workflows for executing automated tasks to accomplish a
wanted outcome?
A. Orchestration
B. Security
C. Services
D. Management
B. Distributed parity
C. No parity
D. Double parity
2. What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB?
A. 256 KB
B. 64 KB
C. 128 KB
D. 320 KB
C. LUN tiering
D. Sub-LUN tiering
2. Which is a process that provides data access control by defining which LUNs a compute
system can access?
A. LUN masking
B. Tiering
C. Virtual provisioning
D. Thin LUN
1. Which layer of FC protocol stack provides FC addressing, structure, and organization of data?
A. FC - 0 - Layer
B. FC - 1 - Layer
C. FC - 2 - Layer
D. FC - 4 - Layer
2. Identify the topology that requires maximum of one ISL for compute to storage communication.
Select all that applies.
B. Single-switch topology
D. Core-edge topology
B. Flow Control
C. Monitors Computers
D. Buffers packet
A. iSCSI
B. ARP
C. ICMP
D. Ethernet
1. Which file access method provides file sharing that is commonly used on UNIX systems?
A. NTFS
B. NFS
C. CIFS
D. HDFS
2. Which type of storage device stores data on a flat address space based on its content and
attributes?
A. Block-based
B. Scale-up NAS
C. Scale-out NAS
D. Object-based
B. VMware NSX
C. VMware vSphere
A. Control
B. Infrastructure
C. Application
D. API
1. Which defines the amount of data loss that a business can endure?
A. RTO
B. RPO
D. Availability zone
2. Which refers to the ability of an application to maintain limited functionality even when some of
the components, modules, or supporting services are not available?
A. Graceful degradation
B. Retry logic
D. Core-edge topology
A. Degaussing media
B. Masking
C. Backup
D. Hardening