6 Tips For E20-020 candidates

Exam Code: E20-020 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Cloud Infrastructure Specialist Exam for Cloud Architects
Certification Provider: EMC
Free Today! Guaranteed Training- Pass E20-020 Exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for EMC E20-020 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW E20-020 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/E20-020-exam-dumps.html

Q31. An organization wants to include performance monitoring in their cloud environment. However, they want to minimize the number of accounts and passwords that must be created on target devices and sent across the network. Which monitoring solution should a cloud architect recommend to meet this requirement?

A. Proxy

B. Agent-based

C. Agentless

D. Central

Answer:


Q32. An organization plans to build a cloud using some of the existing data center infrastructure. Specifically, they want to use the existing FC storage infrastructure to support cloud hosts. However, they want to logically separate the cloud storage traffic from the existing data center storage traffic within this infrastructure. Which mechanism can be used to meet this requirement?

A. MPIO

B. VLAN

C. VSAN

D. Masking

Answer: D

Explanation: The use of VSANs allows the isolation of traffic within specific portions of the network. If a problem occurs in one VSAN, that problem can be handled with a minimum of disruption to the rest of the network. VSANs can also be configured separately and independently.

Note: Virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Ports within a single switch can be partitioned into multiple VSANs, despite sharing hardware resources. Conversely, multiple switches can join a number of ports to form a single VSAN.

Incorrect:

Not A: Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware-specific information needed to optimize connectivity with their storage arrays.

MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server® 2008, Windows Server 2008 R2 and Windows Server 2012.

Not D: Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical Unit Number available to some hosts and unavailable to other hosts. LUN masking operates at Layer 4 of the Fibre Channel protocol.

Reference: https://en.wikipedia.org/wiki/VSAN


Q33. In a cloud design, an architect has defined a separate trust zone for host management. The hosts will be running open source hypervisors.

What should be included in the design deliverables to support this separate trust zone?

A. Isolated management network and a common super-user account

B. Separate PKI and encrypted CMI portal access

C. Separate authentication source and a preferred zone set

D. Isolated management network and a separate authentication source

Answer:


Q34. What needs to be considered when designing a distributed storage solution?

A. Multiple management tools

B. Fault domain detection and isolation to ensure data availability

C. RAID configuration to ensure a drive failure is avoided

D. Automated storage tiering to enable efficient use of drive

Answer: B

Explanation: A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Distributed data stores typically use an error detection and correction technique. Some distributed data stores (such as Parchive over NNTP) use forward error correction techniques to recover the original file when parts of that file are damaged or unavailable. Others try again to download that file from a different mirror. Explanation:

References: https://en.wikipedia.org/wiki/Distributed_data_store


Q35. Which aspect of the project definition does the cloud design scope provide?

A. Broad directions for the project

B. Boundaries of what the project should and should not include

C. Sales figures that must be met when designing the project

D. Specific features or functions that must be included in the project

Answer:


Q36. A cloud architect is designing a hybrid cloud for an organization. A requirement for this environment is that the private cloud user credential be trusted by both cloud provisioning APIs. Which type of authentication will meet this requirement?

A. Federated authentication

B. Asymmetric encryption

C. Symmetric encryption

D. Shared-key authentication

Answer: A

Explanation: A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

Explanation: References:

https://en.wikipedia.org/wiki/Federated_identity