Free of E20-020 rapidshare materials and study guides for EMC certification for IT specialist, Real Success Guaranteed with Updated E20-020 pdf dumps vce Materials. 100% PASS Cloud Infrastructure Specialist Exam for Cloud Architects exam Today!
2017 NEW RECOMMEND
Free VCE & PDF File for EMC E20-020 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q1. An organization plans to deploy a spine/leaf network topology to support a cloud design. Leaf switches will use layer- 3 protocols to communicate with the spine switches. Hosts will each connect to two leaf switches using layer-2 protocols.
Which technology must be enabled between the host and leaf switches to provide the maximum throughput for a single data stream?
A. Generic Network Virtualization Encapsulation
B. Spanning Tree Protocol
C. Equal-Cost Multi-Path Routing
D. Multi-Chassis Aggregation
Explanation: Generic Network Virtualization Encapsulation (Geneve) is the peacemaking protocol drafted to unify VXLAN, NVGRE, and whatever other tunneling protocols emerge for network virtualization. Geneve doesn't exactly replace VXLAN and other protocols. Rather, it provides a common superset among them, so that outside software can provide hooks to Geneve rather than having to accommodate multiple encapsulation standards.
Note: NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization technology that attempts to alleviate the scalability problems associated with large cloud computing deployments. It uses Generic Routing Encapsulation (GRE) to tunnel layer 2 packets over layer 3 networks. Its principal backer is Microsoft. Explanation:
Q2. Which aspect of the project definition does the cloud design scope provide?
A. Broad directions for the project
B. Boundaries of what the project should and should not include
C. Sales figures that must be met when designing the project
D. Specific features or functions that must be included in the project
Q3. Which additional considerations must a cloud monitoring system address compared to a traditional monitoring system?
A. Tenant isolation, orchestration, and elastic workloads
B. Orchestration, elastic workloads, and Data at Rest security
C. Elastic workloads, Data at Rest security, and tenant isolation
D. Data at Rest security, tenant isolation, and orchestration
Explanation: * Encrypt data-at-rest
Encryption is your front-line defense for defending data-at-rest. It limits access to those with the right keys – locking out anyone who doesn't have them.
Q4. What needs to be considered when designing a distributed storage solution?
A. Multiple management tools
B. Fault domain detection and isolation to ensure data availability
C. RAID configuration to ensure a drive failure is avoided
D. Automated storage tiering to enable efficient use of drive
Explanation: A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Distributed data stores typically use an error detection and correction technique. Some distributed data stores (such as Parchive over NNTP) use forward error correction techniques to recover the original file when parts of that file are damaged or unavailable. Others try again to download that file from a different mirror. Explanation:
Q5. After developing prototype applications in the public cloud, developers determined that they want softwaredefined network functionality. Which ability will this requirement provide for the developers?
A. Programmatically provision an IPsec VPN tunnel between the public and private clouds
B. Programmatically migrate layer-3 access from aggregate to access switches
C. Programmatically control physical core network topologies
D. Programmatically provision physical network segments and services
Explanation: Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. This is done by decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
Q6. In addition to the operating system, what other components does the consumer manage in an IaaS cloud service model?
A. Application, data, storage, and physical networking
B. Data, middleware, application, and runtime
C. Runtime, physical servers, application, and middleware
D. Middleware, runtime, hypervisor, and application
Explanation: In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.
IaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. Figure: Cloud-computing layers accessible within a stack
Not A: not Physical networking not C: Not physical servers. Not D: Not Hypervisors. Explanation:
Q7. An organization wants to include performance monitoring in their cloud environment. However, they want to minimize the number of accounts and passwords that must be created on target devices and sent across the network. Which monitoring solution should a cloud architect recommend to meet this requirement?
Q8. An organization wants to provide backup services in the cloud. They have no backup infrastructure in place. The organization has concerns about losing data if a site disaster occurs. They want to maintain control of backup data placement because of data privacy laws. Finally, they want to maintain at least one month's worth of backups onsite. Which backup solution will meet these requirements?
A. Local backup
B. Remote backups
C. Local backup with replication
D. Local backups with cloud gateway
Explanation: Cloud gateway allows EMC customers to move on-premise data from EMC arrays to public cloud storage providers. Clod gateway facilitate data migration from on-premises to a public cloud storage service to create a true hybrid cloud storage environment.
Cloud gateways such as Riverbed's SteelStore (formally known as Whitewater) can act as a local backup target for funneling data to a storage cloud for offsite storage.
Q9. A cloud architect is evaluating an organization's need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?
A. Storage array encryption to provide centralized management
B. Full file systems encryption to simplify key management
C. Network-based encryption to increase security at the cost of server overhead
D. Self-encrypting storage devices to increase security at the cost of increased overhead
Q10. What describes the storage categories represented by OpenStack Swift and EMC XtremIO requirements?
A. Swift = Distributed Object StorageXtremIO = Central Storage
B. Swift = Central Storage XtremIO = Distributed File Storage
C. Swift = Distributed Block StorageXtremIO = Distributed Object Storage
D. Swift = Distributed File StorageXtremIO = Distributed Block Storage
Explanation: OpenStack Swift is a globally-distributed object storage with a single namespace that's durable enough for the most demanding private clouds and now brought to you in an easy-to-deploy/scale/manage system.
XtremIO is a flash-based Storage Array. Explanation:
https://www.swiftstack.com/#testimonial/2 http://www.emc.com/collateral/white-papers/h11752-intro-to-XtremIO- array-wp.pdf