Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Remus works as an IT administrator for an organization. An important aspect of his job is to ensure that physical storage space remains available in all host machines at all times. However, recently there was not much physical storage space available in one host machine, so he deleted several snapshots of thevirtual machines present. Despite the deletion, free space could not be obtained. What can Remus do to remedy this situation?

A.

Delete the child disk of the snapshots present in the host machine

B.

Delete the virtual machine database

C.

Uninstall the Hypervisor

D.

Shut down or restart the virtual machine system

Lisa’s organization has multiple servers to cater to the needs of different businesses and clients. Each of these servers runs different applications in order to keep them isolated from each other. The server room incurs a huge cost because of the number of servers owing to the massive cooling systems, server maintenance, data center footprint, and quicker server provisioning. An audit of the resources discovered that most of the servers are idle two-thirds of business hours since these servers are dedicated towards faster recovery during disasters and the isolation of applications. Lisa is looking for a solution to bring down the cost of maintaining these servers, optimize the use of resources, and save money on the energy spent to keep these servers cool. Which solution can meet all these needs of Lisa?

A.

Virtual Desktop Infrastructure

B.

Operating System Virtualization

C.

Server Replication

D.

Server Virtualization

Rick is the IT administrator of a small organization, which has a single central server for all the internal service requests of the employees. Due to the recent increase in the team size, the server has been overburdened leading to delays in the processing of employees’ requests. Since cost is an issue, the organization does not want to add more servers and is not willing to go for virtual servers outside the facility. To solve the problem, Rick interconnected the individual computers of the team members and took the server out of the process. This balanced the load between all the computers bringing down the processing time. Which architecture did Rick use in this scenario?

A.

Three Tier

B.

Client-Server

C.

Peer-to-Peer

D.

N-Tier

ABC Investment Bank is implementing a security and disaster recovery plan. As part of the plan, it sets up several remote data centers across the globe. The objective was to not have all the records of any one important client at one location but to distribute chunks of it throughout these centers. This was so if any one of the centers is compromised, the attacker will not have only chunks of data and will not be able to use it maliciously against the bank’s clients. One other advantage of this is that if a center is struck by a disaster, all the data about a client’s portfolio is not lost. For this plan to work, a percentage of deviation should not exist between the actual and targeted business data. Which recovery metric best defines this percentage of deviation?

A.

Recovery Consistency Objective (RCO)

B.

Recovery Object Granularity (ROG)

C.

Recovery Location Scope (RLS)

D.

Recovery Service Resiliency (RSR)

Which of the following refers to a central command and control facility responsible for carrying out recovery actions, coordinating response and resources, and assuring the coherence of operations of an organization?

A.

Crisis Command Center

B.

Colocation Facilities

C.

Mobile Recovery Center

D.

Emergency Operations Center

Matt is unable to boot his Windows Server 2012 system after an OS update. He later finds out that some of the important files of the boot manager are corrupted and that led to boot manager failure. However, he tries to recover the boot manager using the Command Prompt present in the System Recovery option. Which Command Prompt command should Matt use in this scenario?

A.

sfc /scannow

B.

ntdsutil

C.

Bootrec /RebuildBCD

D.

repadmin /showrepl

Which of the following sub-teams is responsible for assigning the research and carrying out the development and implementation of the disaster recovery plan throughout the organization?

A.

Disaster Management Team

B.

Disaster Management Executive Committee

C.

Disaster Management Team Chairpersons

D.

Disaster Management Team Coordinators

Which of the following technologies is used to create a copy of data on one server on another server?

A.

Failover Cluster

B.

Snapshots Data

C.

Replication

D.

Cloud Storage

Polly was estimating the magnitude of damage that would be done to her organization if someone were to leak the specifics of the new product her team was developing. Since the information was stored on a potentially vulnerable server and the cost of upgrading the infrastructure was huge, she was assessing if the upgrade should be done. According to her estimations, her company might stand to lose over two hundred thousand dollars should such a leak occur. Since this was more than the cost of the upgrade, she decided to go for the upgrade. Which risk factor did Polly essentially estimate?

A.

Impact

B.

Hazard

C.

Likelihood

D.

Vulnerability

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it separates the storage units from the servers and the user network.

A.

NAS

B.

SCSI

C.

SAN

D.

SAS