0% found this document useful (0 votes)
12 views6 pages

Day3_SM_Prep_Assessment_answers

Uploaded by

Entertain Me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views6 pages

Day3_SM_Prep_Assessment_answers

Uploaded by

Entertain Me
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Assessment

1. Which data asset is an example of unstructured data?

A. XML data file

B. News article text

C. Database tableTBF

D. Webserver log

2. Why are businesses undergoing the digital transformation?

A. To innovate more quickly

B. To avoid security risks

C. To avoid compliance penalty

1. What is a machine learning technique that uses neural networks as the underlying architecture
for training models?

A. Deep learning

B. Bigdata analytics

C. Edge computing

D. Internet of Things

2. Identify the cloud computing characteristic that controls and optimizes resource use by
leveraging a metering capability.

A. Measured services

B. On-demand self service

C. Resource pooling

D. Rapid elasticity

Internal Use - Confidential


1. Which cross-layer function enables an organization to mitigate the impact of downtime?

A. Security

B. Service

C. Business continuity

D. Management

2. Which layer function provides workflows for executing automated tasks to accomplish a
wanted outcome?

A. Orchestration

B. Security

C. Services

D. Management

1. Which one of the following is characteristic of RAID 5?

A. All parity in a single disk

B. Distributed parity

C. No parity

D. Double parity

2. What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB?

A. 256 KB

B. 64 KB

C. 128 KB

D. 320 KB

Internal Use - Confidential


1. The process of storage tiering within a storage system is called ?

A. Intra-array storage tiering – 1st choice

B. Inter-array storage tiering

C. LUN tiering

D. Sub-LUN tiering

2. Which is a process that provides data access control by defining which LUNs a compute
system can access?

A. LUN masking

B. Tiering

C. Virtual provisioning

D. Thin LUN

1. Which layer of FC protocol stack provides FC addressing, structure, and organization of data?

A. FC - 0 - Layer

B. FC - 1 - Layer

C. FC - 2 - Layer

D. FC - 4 - Layer

2. Identify the topology that requires maximum of one ISL for compute to storage communication.
Select all that applies.

A. Full mesh topology

B. Single-switch topology

C. Partial mesh topology

D. Core-edge topology

Internal Use - Confidential


Which of the following function is supported by the ICMP (Internet Control Message Protocol)

A. Handles error and control message

B. Flow Control

C. Monitors Computers

D. Buffers packet

2. Which protocol is used by IP SAN for the transport of block-level data?

A. iSCSI

B. ARP

C. ICMP

D. Ethernet

1. Which file access method provides file sharing that is commonly used on UNIX systems?

A. NTFS

B. NFS

C. CIFS

D. HDFS

2. Which type of storage device stores data on a flat address space based on its content and
attributes?

A. Block-based

B. Scale-up NAS

C. Scale-out NAS

D. Object-based

Internal Use - Confidential


1. Which product creates IP-based SAN from direct attached server storage ?

A. Dell EMC VxFlex OS

B. VMware NSX

C. VMware vSphere

D. Dell EMC NetWorker

2. Which layer represents the ‘brain’ of SDN architecture?

A. Control

B. Infrastructure

C. Application

D. API

1. Which defines the amount of data loss that a business can endure?

A. RTO

B. RPO

C. Persistent state model

D. Availability zone

2. Which refers to the ability of an application to maintain limited functionality even when some of
the components, modules, or supporting services are not available?

A. Graceful degradation

B. Retry logic

C. Partial mesh topology

D. Core-edge topology

1. How can you manage vulnerabilities in a modern data center?

A. Installing security controls

B. Maximizing the attack surface

Internal Use - Confidential


C. Minimizing work factor

D. Avoid patch updates regularly

2. What is the technique used for data shredding?

A. Degaussing media

B. Masking

C. Backup

D. Hardening

Internal Use - Confidential

You might also like