Which tool provides this capability?

A customer has expressed difficulty in proactively monitoring and reviewing performance data for multiple core-edge topology SAN fabrics consisting of IBM branded SAN switches. Which tool provides this capability?A . IBM Storage Management ToolB . IBM Network AdvisorC . IBM Storage Configuration ManagerD . Brocade SAN HealthView AnswerAnswer: B Explanation:...

March 22, 2019 No Comments READ MORE +

How does IBM Spectrum Control do this?

IBM has proposed IBM Spectrum Control for a customer who is currently using multiple vendor tools to manage a complex heterogeneous storage environment How does IBM Spectrum Control do this?A . Large-scale single name spaceB . Enabled cloud-based managementC . Simplified single-pane of glass managementD . Heterogeneous data migrationView AnswerAnswer:...

March 22, 2019 No Comments READ MORE +

Which two additional components are required to make the monitoring systems ready?

A customer has chosen vRealize Operations Manager for Horizon as its monitoring solution. The customer’s requirements are:  Monitor the PCoIP metrics to address user experience complaints.  Minimum required resources should be used for monitoring purposes. Recent project updates include:  vRealize Operations Manager is already in use for...

March 22, 2019 No Comments READ MORE +

Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)

Which statements about the firmware upgrade process on an active-active HA cluster are true? (Choose two.)A . The firmware image must be manually uploaded to each FortiGate.B . Only secondary FortiGate devices are rebooted.C . Uninterruptable upgrade is enabled by default.D . Traffic load balancing is temporally disabled while upgrading...

March 22, 2019 No Comments READ MORE +

Which key point should the technical specialist address?

A customer asks about the implication of replacing a current tape library with a single disk-only IBM TS7760. Which key point should the technical specialist address?A . Identify the current provision for tape vaulting and disaster recovery.B . Check whether current tape media is encrypted.C . Confirm the compression ratio...

March 22, 2019 No Comments READ MORE +

What else should the cloud architect consider to meet this requirement?

During an assessment for an organization’s cloud design, a cloud architect discovers that developers will be creating applications for tenants. The applications will self-scale based on an internal trigger. The architect has included CMP components in the design that will support this requirement. What else should the cloud architect consider...

March 22, 2019 No Comments READ MORE +

The form of corrosion that has the largest potential for unexpected catastrophic failure is:

The form of corrosion that has the largest potential for unexpected catastrophic failure is:A . General CorrosionB . Atmospheric CorrosionC . Galvanic CorrosionD . Localized CorrosionView AnswerAnswer: C

March 22, 2019 2 Comments READ MORE +

Which tool provides information on the number of spare drives included in the system?

A solution architect has determined the amount of spindles needed to satisfy performance and RAID level requirements for an IBM DS8886. Which tool provides information on the number of spare drives included in the system?A . Capacity Magic B Disk MagicB . e-configC . STATView AnswerAnswer: A Explanation: Capacity Magic...

March 22, 2019 No Comments READ MORE +

Which of the following attacks could capture network user passwords?

Which of the following attacks could capture network user passwords?A .  Data diddlingB .  SniffingC .  IP SpoofingD .  SmurfingView AnswerAnswer: B Explanation: A network sniffer captures a copy every packet that traverses the network segment the sniffer is connect to. Sniffers are typically devices that can collect information from...

March 22, 2019 No Comments READ MORE +

Individual accountability does not include which of the following?

Individual accountability does not include which of the following?A .  unique identifiersB .  policies & proceduresC .  access rulesD .  audit trailsView AnswerAnswer: B Explanation: Accountability would not include policies & procedures because while important on an effective security program they cannot be used in determing accountability. The following answers...

March 22, 2019 No Comments READ MORE +