E05-001 ism v3 pdf download

EMC E05-001 Information Storage and Management v3 Exam free practice test

1.What enables an administrator to create device groups in an IP-SAN for restricting device communications to a group?
A. iSNS discovery domain
B. NIC teaming
C. Demilitarized zone
D. Security identifier
Answer: A

2.How do VSANs ensure security in an IT infrastructure?
A. By providing isolation over a shared infrastructure
B. By authenticating a new switch that joins a fabric
C. By limiting the number of switches in a fabric
D. By prohibiting an unused switch port from being used
Answer: A

3.What is an accurate statement about OAuth security control?
A. Allows a client to access protected resources from a resource server on behalf of a resource owner
B. Provides strong authentication for client-server applications by using secret-key cryptography
C. Enables initiators and targets to authenticate each other by using a shared secret code
D. Enables an organization to use authentication services from an identity provider
Answer: A

4.What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?
A. Enables initiators and targets to authenticate each other by using a shared secret code
B. Provides strong authentication for client-server applications by using secret-key cryptography
C. Allows a client to access protected resources from a resource server on behalf of a resource owner
D. Enables an organization to use authentication services from an identity provider
Answer: A

5.What is an accurate statement about OpenID control?
A. Enables an organization to use authentication services from an identity provider
B. Enables initiators and targets to authenticate each other by using a shared secret code
C. Provides strong authentication for client-server applications by using secret-key cryptography
D. Allows a client to access protected resources from a resource server on behalf of a resource owner
Answer: A

6.Which technique is used in Kerberos to authenticate a client-server application across an insecure network?
A. Secret-key cryptography
B. One-way hash function
C. Shared secret
D. OpenID control
Answer: A

7.Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events?
A. Anomaly-based
B. Signature-based
C. Profile-based
D. Device-based
Answer: A

8.Which method is used to establish a VPN connection between a primary and remote data center to perform secure remote replication?
A. Site-to-site VPN connection
B. Remote access VPN connection
C. Intra-site VPN connection
D. Long distance VPN connection
Answer: A

9.What is an activity in the risk assessment step of risk management?
A. Determine the likelihood of a risk
B. Plan and deploy security controls
C. Continuously observe the existing risks
D. Identify the sources of threats that increase the risks
Answer: A

10.What is the purpose of monitoring capacity in a storage infrastructure?
A. Tracking the amount of storage infrastructure resources used and available
B. Evaluating utilization of components and identifying bottlenecks
C. Tracking configuration changes to the storage infrastructure elements
D. Identifying component failures that may lead to service unavailability
Answer: A

buy

Leave a Reply

Your email address will not be published. Required fields are marked *