Exact of E20-020 exam question materials and practice for EMC certification for IT professionals, Real Success Guaranteed with Updated E20-020 pdf dumps vce Materials. 100% PASS Cloud Infrastructure Specialist Exam for Cloud Architects exam Today!


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for EMC E20-020 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW E20-020 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/E20-020-exam-dumps.html

Q11. A cloud architect is designing a private cloud for an organization. The organization has no existing backup infrastructure. They want to offer consumers the ability to backup virtual machine instances using image-based backups.

What should the cloud architect look for when selecting a backup application for this environment?

A. Virtual machine hardware is on the backup application vendor's compatibility list

B. Hypervisor servers' hardware is on the backup application vendor's compatibility list

C. Backup application can be integrated with the selected CMP components

D. Backup application supports a cloud gateway for accessing the cloud-based virtual machines

Answer: D

Explanation: A cloud storage gateway provides basic protocol translation and simple connectivity to allow the incompatible technologies to communicate transparently. The gateway can make cloud storage appear to be a NAS filer, a block storage array, a backup target or even an extension of the application itself.

Explanation: References:

http://searchcloudstorage.techtarget.com/definition/cloud-storage-gateway


Q12. A cloud architect is designing a hybrid cloud for an organization. A requirement for this environment is that the private cloud user credential be trusted by both cloud provisioning APIs. Which type of authentication will meet this requirement?

A. Federated authentication

B. Asymmetric encryption

C. Symmetric encryption

D. Shared-key authentication

Answer: A

Explanation: A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

Explanation: References:

https://en.wikipedia.org/wiki/Federated_identity


Q13. You are designing consumer compute resources in an onsite private cloud. During an assessment, you discover that the organization's IT staff wants secure access to the underlying host OS. What should be included in the design to support this requirement?

A. Host IDS configurationSecure key infrastructure Bridged management network

B. Perimeter firewall configuration VPN encryption Separate management network

C. Host OS firewall configuration Central logging Physically isolated management network

D. Host OS firewall configuration Secure key infrastructure Separate management network

Answer: B


Q14. An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.

Why would network segmentation be included in the design to support this requirement?

A. Secure all traffic between the storage array and the hosts

B. Enable CHAP between the array and hosts

C. iSCSI traffic is not supported on networks with other types of traffic

D. Enable LUN masking capabilities of the array

Answer: D

Explanation: LUN masking is a further constraint added to LUN zoning to ensure that only devices authorized to access a specific server can access the corresponding port.

A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre Channel (FC) or similar interface.  LUNs are central to the management of block storage arrays shared over a storage area network (SAN).

Explanation: References:

http://searchvirtualstorage.techtarget.com/definition/LUN-masking


Q15. An organization wants to deploy a block storage in the cloud using a storage array that is accessible through the iSCSI protocol. The hosts support iSCSI.

Why would network segmentation be included in the design to support this requirement?

A. Secure all traffic between the storage array and the hosts

B. Enable CHAP between the array and hosts

C. iSCSI traffic is not supported on networks with other types of traffic

D. Enable LUN masking capabilities of the array

Answer: D

Explanation: LUN masking is a further constraint added to LUN zoning to ensure that only devices authorized to access a specific server can access the corresponding port.

A logical unit number (LUN) is a unique identifier that designates individual hard disk devices or grouped devices for address by a protocol associated with a SCSI, iSCSI, Fibre Channel (FC) or similar interface.  LUNs are central to the management of block storage arrays shared over a storage area network (SAN).

Explanation: References:

http://searchvirtualstorage.techtarget.com/definition/LUN-masking


Q16. In addition to the operating system, what other components does the consumer manage in an IaaS cloud service model?

A. Application, data, storage, and physical networking

B. Data, middleware, application, and runtime

C. Runtime, physical servers, application, and middleware

D. Middleware, runtime, hypervisor, and application

Answer: B

Explanation: In the case of IaaS the computing resource provided is specifically that of virtualised hardware, in other words, computing infrastructure.

IaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. Figure: Cloud-computing layers accessible within a stack

Incorrect:

Not A: not Physical networking not C: Not physical servers. Not D: Not Hypervisors. Explanation:

References: http://www.interoute.com/what-iaas


Q17. When implementing QoS across a cloud network, how is storage traffic usually prioritized?

A. Most important

B. More important than tenant traffic but less important than management traffic

C. More important than management traffic but less important than tenant traffic

D. Least improtant

Answer:


Q18. When implementing QoS across a cloud network, how is storage traffic usually prioritized?

A. Most important

B. More important than tenant traffic but less important than management traffic

C. More important than management traffic but less important than tenant traffic

D. Least improtant

Answer:


Q19. A cloud architect is designing a private cloud for an organization. The organization has no existing backup infrastructure. They want to offer consumers the ability to backup virtual machine instances using image-based backups.

What should the cloud architect look for when selecting a backup application for this environment?

A. Virtual machine hardware is on the backup application vendor's compatibility list

B. Hypervisor servers' hardware is on the backup application vendor's compatibility list

C. Backup application can be integrated with the selected CMP components

D. Backup application supports a cloud gateway for accessing the cloud-based virtual machines

Answer: D

Explanation: A cloud storage gateway provides basic protocol translation and simple connectivity to allow the incompatible technologies to communicate transparently. The gateway can make cloud storage appear to be a NAS filer, a block storage array, a backup target or even an extension of the application itself.

Explanation: References:

http://searchcloudstorage.techtarget.com/definition/cloud-storage-gateway


Q20. A cloud architect is evaluating an organization's need to support thousands of virtual machine instances and some form of encryption. Which encryption type should be selected and why?

A. Storage array encryption to provide centralized management

B. Full file systems encryption to simplify key management

C. Network-based encryption to increase security at the cost of server overhead

D. Self-encrypting storage devices to increase security at the cost of increased overhead

Answer: