E10-001-ENG

Embed Size (px)

Citation preview

  • 8/13/2019 E10-001-ENG

    1/2

    1. cache management algorithm [lrim] is based on the assumption that...

    2. organization performs a local replica of application data,what should be considered

    3. host component eliminates[ilimineit]the need to deploy separate adaptersFC and Ethernet communications?

    4. provides the capability to

    5. a function of unified management software

    6. non-disruptive migration

    7. requirement refers to,[]applying mechanisms[meknizm]]that ensstored and retrieved[ritri:v]as it was received?

    8. characteristic of unified storage

    9. key benefit of ... over ...

    10. accurate statement (about) describes a denial[dinail of service attack

    11. Improve utilization / Enhance interoperability / Unlimit resource scaling

    infrastructure[infrstrkt] integrity[interiti]/security implementationvirtualization[v:tla'zen] /advantage of synchronous[skrns]consolidate[kn'sldet]/data deduplication[ddju:pl'ken]concatenate[kn'ktnet]near-zero Recovery Time Objective[bdektv]/provision[pr'vn]policy /hybrid['habrd]cloud /bandwidth10000 revolutions[rev'lu:n] per minute / average rotational latency,!restrict unauthorized access / active-passivetriangle/multitarget replication / optimized['ptmazd]integrated / integrityAuthentication[:qent'ken]"and authorization[:qrazen] #capacity and performance requirementsuncommitted / increase / reduce /topology

    target - initiator[niet(r)]multitenancy['tennt]$%&/synchronization[skrna'zen]

    12. and vice[vais] versa

    13. grow and shrink the demand for resources dynamically / Rapid elasticity [lsts]

    14. In the context[kntekst]'()*+,*of doing ...

    15. Which process minimizes the exposure[ikspu]-.to a loss of uncommitted cached

    16. elements of [elimnts]/01*23...the risk triad[traid]45from sec

    17. responsible for managing and distributing

    18. a key advantage of data striping across multiple disks as compared to a single disk

    19. approximate['prksmt];amount of downtime allowed per week

    20. performance is not a constraint[knstrent]

  • 8/13/2019 E10-001-ENG

    2/2

    21. repudiation[rpju:d'en]>attack =An attempt to compromise ['kmprmaz]?..accountability[kant'blt]ABCgoals of the security

    22. be employed to address threats of user identity spoofing

    23. recommended DEin a CPU-intensiveFapplicationenvironment

    24. sending an acknowledgement to the host

    25. isolate[aslet]?GHother department traffic from the finance department traff

    26. address threats of elevating['elvet]user privileges['prvld]I

    27. Breaks the dependency between the application and the underlying platform

    28. utilization level is between the high and low watermark

    29. at a modest[mdst]*Jrate

    30. wants the flexibility[fleks'blt]KCto ... without affecting...configuration

    31. Contiguous[kntgjus]Lset of frames that correspond[kr'spnd]M,Nt

    32. Which factor is a measurement['memnt]BJof system reliabilityAO33. challenge to consumers in adopting[dpt] a public cloud

    34. collect and analyze ISL traffic metrics[metrk]JB

    35. Replica will be behind the source by at least the size of the buffer