304-200 LPIC-3 Virtualization & High Availability Exam

The LPIC-3 certification is the culmination of LPI’s multi-level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution-neutral Linux certification within the industry. Three separate LPIC-3 specialty certifications are available. Passing any one of the three exams will grant the LPIC-3 certification for that specialty.

The LPIC-3 303: Security certification covers the administration of Linux systems enterprise-wide with an emphasis on security.

Current Version: 2.0 (Exam code 303-200)
Objectives: 303-200
Prerequisites: The candidate must have an active LPIC-2 certification to receive LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order
Requirements: Passing the 303 exam
Validity Period: 5 years
Languages: English, Japanese

 


QUESTION 1
Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO correct answers.)

A. More than one container requires access to block devices available in the host system.
B. Remote access via SSH is required to all containers.
C. Each container needs to have its own user accounts and user groups.
D. Administrators of containers must be able to install customized Linux kernels.
E. Different operating systems are to be used within containers on the same virtualization host.

Answer: D,E
Section: Virtualization
Explanation
Explanation/Reference:


QUESTION 2
When migrating a physical machine to a full virtualized machine, which of the following properties should be
expected to change from the perspective of the guest operating system? (Choose TWO correct answers.)

A. The user accounts within the guest operating system.
B. The properties of the CPU and other hardware devices.
C. The MAC address of the network interfaces.
D. The version of the guest operating system.
E. The software and applications installed on the guest system.

Answer: B,C
Section: Virtualization
Explanation
Explanation/Reference:


QUESTION 3
Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct answers.)

A. Creation of new instances can be automated by using scripts or APIs and service interfaces.
B. The root file system of a computing instance is always persistent and can be accessed after the instance is
destroyed.
C. Each and every user of an IaaS cloud has exactly one computing instance.
D. Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance’s
data.
E. Instances may be created when needed and destroyed when they become obsolete.

Answer: A,E
Section: Virtualization
Explanation
Explanation/Reference:


QUESTION 4
Which of the following technologies is the most important component of IaaS clouds?

A. Database replication
B. DNS delegation
C. Emulation
D. Mandatory Access Control
E. Virtualization

Answer: E
Section: Virtualization
Explanation
Explanation/Reference:


QUESTION 5
Which of the following statements are true regarding Xen domains? (Choose TWO correct answers.)

A. Fully virtualized and paravirtualized domains are managed using the same tools and commands.
B. Xen domains of all types require virtualization extensions in the host system’s CPU.
C. All fully virtualized domains are called ‘Dom0’ while all paravirtualized domains are called ‘DomU’.
D. Both paravirtualized and fully virtualized domains may run on the same host system.
E. Paravirtualized domains are significantly slower than fully virtualized domains.

Answer: A,D
Section: Virtualization
Explanation
Explanation/Reference:

Click here to view complete Q&A of 304-200 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best LPIC 3 304-200 Certification, LPIC 3 304-200 Training at certkingdom.com

C1000-022 IBM Storage Technical V2 Exam

Number of questions: 60
Number of questions to pass: 35
Time allowed: 90 mins
Status: Live

This exam consists of 4 sections described below.

Customer Environment, Requirements, and Plans 33%
Describe a customer’s hardware and software environment.
Describe customer operational contraints, including power, cooling, personnel, knowledge level, and service level requirements.
Identify disaster recovery and high availability requirements.
Identify customer performance requirements, including throughput and latency.
Identify the customer’s capacity and growth requirements and the impact on total cost.

Product Information 30%
Given a scenario, describe the difference(s) among various storage media and align them to a requirement of TCA, performance, and upgradability.
Identify the difference(s) in cost, performance, and reliability among IBM storage solutions.
Describe IBM’s competitive advantages.
Given a scenario, describe how IBM enterprise storage products help clients solve data and device management issues through application efficiency and integration.
Given a scenario, explain alternatives to the existing environment to provide additional functionality.

Application of Resources and Tools 20%
Given a scenario, evaluate which tool(s) to use based upon key applications, performance requirements, customer pain-points, capacity and growth requirements, and the impact on total cost.
Identify uses of IBM maintenance, IBM websites, IBM tools, and IBM processes.
Given a scenario, identify high-level steps to integrate new solutions into an existing systems environment.

Containers, Clouds, and Analytics 17%
Identify ways the IBM storage porfolio enables containers and clouds.
Identify ways the IBM storage porfolio enables analytics.
Identify ways the IBM storage porfolio provides security.

Overview
PartnerWorld Code: C0005007
Replaces PW Code: 23003306

Status: Live

The IBM Storage Technical Specialist consults with customers to gather and understand customer requirements and position the correct solutions. The specialist uses available resources to design the solution. The specialist has a broad knowledge of the features, functions, and benefits of IBM storage solutions and the IBM storage portfolio, including disk, tape, storage management software, and software defined storage. Successful candidates understand competitive offerings used in the enterprise segment.

The IBM Storage technologies and solutions included in this exam are:
IBM Flash Storage
All flash solution concepts
Hybrid storage solutions including IBM System Storage DS8800 and IBM FlashSystem
Software-defined storage including the IBM Spectrum Suite; IBM Spectrum Accelerate, IBM Spectrum Control, IBM Storage Insights, IBM Spectrum Virtualize and IBM Spectrum Scale
IBM tape solutions and technologies
IBM Spectrum Protect
IBM Spectrum Protect Plus
IBM Spectrum Archive
Cloud Object Storage
SAN/Networks
VersaStack and converged infrastructure

General knowledge of hybrid cloud and analytics concepts and the IBM Storwize family of products is recommended.

This specialist can perform the following tasks without assistance:

Determine product positioning
Gather customer requirements
Identify and engage correct resources
Identify competitors
Provide the technical details for a TCO analysis
Present the IBM storage product line to the customer
Articulate features and benefits of IBM storage solutions
Read and understand a configuration based on customer requirements
Develop basic technology topologies and architectural designs
Present the configuration to the customer
Initiate the TDA process
Identify the correct tool to size the solution for performance
Identify open system, mainframe and IBM i connectivity requirements
Provide information gathered during customer interaction for post-installation

This specialist can perform the following tasks with assistance:
Respond to an RFP within the enterprise storage scope
Mitigate competitors
Demonstrate deep technical knowledge
Complete detailed design of the total solution
Conduct the IBM Technical Delivery Assessment (TDA)
Identify risks associated with the proposed solution
Plan implementation of the solution as part of the pre-install TDA
Submit an RPQ/SCORE request
Conduct a demonstration of the storage solution

This specialist should be familiar with the following resources:
eConfig
TCOnow!
IBM PartnerWorld
Sizing tools such as Disk Magic, Capacity Magic and Batch Magic
IBM Comprestimator Utility
Storage Consolidation Evaluation tool hosted by Alinean
System Storage Interoperability Center (SSIC)
Cognitive Storage Analytics
IBM Economics Study
IBM Data Reduction Estimator Tool

Recommended Prerequisite Skills
Minimum 12 months of direct technical storage experience, with six months experience with IBM designated storage products.

 


QUESTION 1
A customer with a highly virtualized VMware environment and several bare-metal Oracle servers is interested
in data protection and replication between its on-site and IBM cloud environments.
Which technology should be discussed?

A. IBM Spectrum Protect Extended Edition
B. IBM Spectrum Protect for Virtual Environments
C. IBM Spectrum Protect Snapshot
D. IBM Spectrum Protect Plus

Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.ibm.com/downloads/cas/L9MD4MEZ


QUESTION 2
A customer has an existing IBM XIV Gen3 solution with 3 TB drives and nine modules. While performance is
acceptable, the customer wants to increase the performance of small-block reads. The current nine modules
are running at 60% of capacity.
Which solution should the technical specialist recommend?

A. Add an IBM FlashSystem 900 as a separate pool.
B. Add the SSD caching option on five modules.
C. Add the SSD caching option on all nine modules.
D. Add three more data modules to improve performance.

Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://books.google.com.pk/books?id=GQSlAgAAQBAJ&pg=PA20&lpg=PA20&dq=ibm+increase
+the+performance+of+small+block+reads&source=bl&ots=p9wvrwpdb&
sig=ACfU3U1otas71JSmTrTj6JS16DzOY5Rujw&hl=en&sa=X&ved=2ahUKEwirw6OtwenjAhUF2-
AKHQU3AUIQ6AEwAHoECAkQAQ#v=onepage&q=ibm%20increase%20the%20performance%20of%20small
%20block%20reads&f=false


QUESTION 3
A customer has IBM and NetApp block and file storage. The customer is interested in reducing storage costs
and optimizing its data center through intelligent capacity planning, storage reclamation, storage tiering, and performance metrics.
Which IBM SDS offering should the technical specialist discuss with the customer?

A. IBM Spectrum Protect
B. IBM Spectrum Control
C. IBM Spectrum Insights Pro
D. IBM Virtual Storage Center

Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.ibm.com/support/knowledgecenter/en/SSQRB8/com.ibm.spectrum.si.doc/
prd_ovw_versions.html


QUESTION 4
A customer has a requirement for 250,000 IOPS and 200TB of capacity. The customer requires IBM SSR code upgrades at no additional charge.
Which solution should the technical specialist recommend to the customer?

A. IBM FlashSystem A9000 with 3.6TB MicroLatency modules.
B. IBM FlashSystem V9000 with IBM Storwize V5010 with 1.2TB drives
C. IBM Storwize V7000 with 1.2TB drives and 800 GB SSDs
D. IBM DS8886 with 1.2TB drives and HPFE

Answer: D
Section: (none)
Explanation
Explanation/Reference:


QUESTION 5
Which exclusive feature of the IBM FlashSystem 9100 is a technical advantage over competitive storage arrays?

A. 3D NAND SATA SSD drives
B. NVMe SSD drives
C. XL Flash modules
D. FlashCore modules

Answer: D

Click here to view complete Q&A of C1000-022 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C1000-022 Certification, IBM C1000-022 Training at certkingdom.com

312-49 ECCouncil Computer Hacking Forensic Investigator (V9) Exam

Computer Hacking Forensic Investigator Certification
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program.

Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered in EC-Council’s CHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.

The purpose of the CHFI credential is to:
Validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

About the Exam
Number of Questions: 150
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM
Exam Prefix: 312-49 (ECC EXAM)

Passing Score
In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.


QUESTION 1
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to
request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this
phone call and obligates the ISP to preserve e-mail records?

A. Title 18, Section 1030
B. Title 18, Section 2703(d)
C. Title 18, Section Chapter 90
D. Title 18, Section 2703(f)

Answer: D
Section: (none)
Explanation
Explanation/Reference:


QUESTION 2
Item 2If you come across a sheepdip machine at your client site, what would you infer?

A. A sheepdip coordinates several honeypots
B. A sheepdip computer is another name for a honeypot
C. A sheepdip computer is used only for virus-checking.
D. A sheepdip computer defers a denial of service attack

Answer: C
Section: (none)
Explanation
Explanation/Reference:


QUESTION 3
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?

A. rules of evidence
B. law of probability
C. chain of custody
D. policy of separation

Answer: C
Section: (none)
Explanation
Explanation/Reference:


QUESTION 4
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?

A. 128
B. 64
C. 32
D. 16

Answer: C
Section: (none)
Explanation
Explanation/Reference:


QUESTION 5
You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML,
DHTML, and other web-based languages and how they have evolved over the years.
You navigate to archive. org and view the HTML code of news.com. You then navigate to the current
news.com website and copy over the source code. While searching through the code, you come across
something abnormal: What have you found?

A. Web bug
B. CGI code
C. Trojan.downloader
D. Blind bug

Answer: A
Section: (none)
Explanation
Explanation/Reference:

Click here to view complete Q&A of CHFI 312-49 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best CHFI 312-49 Certification, CHFI 312-49 Training at certkingdom.com

DES-1721 Specialist Implementation Engineer SC Series Exam


QUESTION 1
You are installing a new SC9000. Which procedure should be used to install and configure the system?

A. Connect through the iDRAC port
B. Connect through a null modem cable to the serial port
C. Connect through the Dell Storage Manager Client
D. Connect through the supplied proprietary serial cable to the serial port

Answer: D
Section: (none)
Explanation
Explanation/Reference:
 


QUESTION 2
An administrator wants to configure an SC Series array to use Virtual Port Mode. What is a requirement to accomplish this task?

A. NPIV must be disabled on Fibre Channel switches
B. I/O Controller cards must use a single-ID firmware version
C. Fibre Channel switches must use a switched fabric topology
D. Activation license must be purchased and installed

Answer: D
Section: (none)
Explanation
Explanation/Reference:


QUESTION 3
What are the possible methods to upgrade the firmware on a Brocade switch?

A. FTP, SFTP, and Web Tools
B. USB, FTP, and SFTP
C. USB, FTP, and Web Tools
D. USB, SFTP, and Web Tools

Answer: C
Section: (none)
Explanation
Explanation/Reference:

Click here to view complete Q&A of DES-1721 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best DECS-IE DES-1721 Certification, DECS-IE DES-1721 Training at certkingdom.com