The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, more at http://www.certkingdom.com
Use this quick start guide to collect all the information about Dell EMC
Information Storage and Management (DEA-1TT4) Certification exam. This study
guide provides a list of objectives and resources that will help you prepare for
items on the DEA-1TT4 Dell EMC Information Storage Management exam. The Sample
Questions will help you identify the type and difficulty level of the questions
and the Practice Exams will make you familiar with the format and environment of
an exam. You should refer this guide carefully before attempting your actual
Dell EMC DECA-ISM certification exam.
The Dell EMC Information Storage and Management certification is mainly targeted
to those candidates who want to build their career in Information Storage and
Management domain. The Dell EMC Certified Associate - Information Storage and
Management (DECA-ISM) exam verifies that the candidate possesses the fundamental
knowledge and proven skills in the area of Dell EMC DECA-ISM.
Dell EMC Information Storage and Management Exam Summary: Exam Name Dell EMC Certified Associate - Information Storage and Management
(DECA-ISM)
Exam Code DEA-1TT4
Exam Price $230 (USD)
Duration 90 mins
Number of Questions 60
Passing Score 60%
Books / Training Information Storage Management (ISM) V4 - OnDemand Course
(ES131STG00799)
Information Storage Management V4 -Classroom (ES111STG00802)
Schedule Exam Pearson VUE
Sample Questions Dell EMC Information Storage and Management Sample Questions
Practice Exam Dell EMC DEA-1TT4 Certification Practice Exam
Dell EMC DEA-1TT4 Exam Syllabus Topics:
Modern Data Center Infrastructure - Describe the data classification,
elements of a data center, key characteristics of a data center, and key
technologies driving digital transformation - Explain the cloud characteristics, cloud service models, and cloud
deployment models
- Explain the key characteristics of big data, components of a big data
analytics solution, Internet of Things (IoT), machine learning, and artificial
intelligence (AI)
- Describe the building blocks of a modern data center
- Describe a compute system, storage, connectivity in a data center,
application, and options to build a modern data center
Storage Networking Technologies - Describe Storage Area Network (SAN), FC
architecture, FC topologies, zoning, and virtualization in FC SAN - Describe TCP/IP, IP SAN, iSCSI protocol, components, connectivity,
addressing, discovery domains, and VLAN
- Explain the components and connectivities of FCIP and FCoE
Storage Systems - Explain the components of an intelligent storage system,
RAID, erasure coding, data access methods, scale-up and scale-out architectures - Explain the components of block-based storage system, storage
provisioning, and storage tiering mechanisms
- Explain the NAS components and architecture, NAS file sharing methods, and
file-level virtualization and tiering
- Describe object-based storage device components, functions, operations, and
unified storage architecture
- Describe software-defined storage attributes, architecture, functions of the
control plane, software-defined extensibility, and software-defined networking
functionalities
Backup, Archive, and Replication - Describe the information availability
measurements and key fault tolerance techniques - Explain backup granularity, architecture, backup targets, operations, and
backup methods
- Describe data deduplication and data archiving solutions architecture
- Describe replication uses, and replication and migration techniques
Security and Management - Describe the information security goals,
terminologies, various security domains, and threats to a storage infrastructure - Explain key security controls to protect the storage infrastructure
- Describe the storage infrastructure management functions and processes 16%
To ensure success in Dell EMC DECA-ISM certification exam, we recommend
authorized training course, practice test and hands-on experience to prepare for
Dell EMC Information Storage Management (DEA-1TT4) exam. QUESTION 1
What is an accurate statement about Governance?
A. Restrict access to certain users
B. Ensure removal of security risks
C. Authorize policy-making decisions
D. Demonstrate adherence to polices
Correct Answer: C
QUESTION 2 An Ethernet switch has eight ports and all ports must be operational for 24
hours, from Monday through Friday.
However, a failure of Port4 occurs as follows:
• Monday = 8 PM to 9 PM
• Wednesday 7 PM to 9 PM
• Thursday = 6 AM to 9 AM
• Saturday = 4 PM to 7 PM
What is the MTTR of Port 4?
A. 2 hours
B. 3 hours
C. 28 hours
D. 38 hours
Correct Answer: A
QUESTION 3 What accurately describes an iSCSI HBA?
A. Performs both iSCSI and TCP/IP processing
B. Requires CPU cycles for TCP/IP processing
C. Requires a software adapter with built-in functionality
D. Enables transmission of data through iSCSI tunneling
Correct Answer: A
QUESTION 4 When using the erasure coding technique in an object-based storage system,
data is divided into 12 data segments and 4 coding segments.
What is the maximum number of disk drive failures against which data is
protected by the configuration?
QUESTION 1
How should Smart Folders be identified and recognized?
A. Smart Folders should be recognized by their type smf:smartFolder
B. Smart Folders should be recognized by parent-child type used smf:contains
C. Smart Folders should be recognized by their aspect smf:smartFolder
D. Smart Folders should be recognized by the special node reference used.
E. Smart Folders cannot be recognized as they are not different from any other cm:folder.
Answer: D
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.alfresco.com/6.0/references/sf-tech-faqs.html
QUESTION 2
If an object is moved to a different folder, what will happen to the node’s security permissions?
A. It will inherit the ACL from the new parent folder.
B. It will inherit the ACL from the user who is moving it.
C. It will inherit the system wide ACL.
D. It will keep its old ACL.
Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which of the following is not an Alfresco-supplied subsystem category?
A. Dictionary.
B. Authentication.
C. Audit.
D. Search.
Answer: A
Section: (none)
Explanation
Explanation/Reference:
References: https://docs.alfresco.com/community5.0/concepts/subsystem-categories.html
QUESTION 4
When testing an Alfresco Content Services extension under high levels of concurrency, you notice that some
transactions are failing due to locking issues with the database. What is an appropriate way to resolve this?
A. Manually unlock the offending records and start the testing again.
B. Directly use Alfresco’s database connection pool and write your own SQL.
C. Use the RetryingTransactionHelper to retry code that fails due to locking.
D. Rewrite the queries used by your application to reduce the chance of the lock.
Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
What does it mean when it is said in Solr indexing that the index is “eventually consistent”?
A. The index will only be consistent after a server restart.
B. The index will become consistent when there are no more transactions to index.
C. The index becomes consistent once a day when the index job runs.
D. The index can only be consistent when the Lucene index job eventually runs.
QUESTION 2 What are two steps a developer must do to set up a key-based authentication
in order to transfer files to the
Adobe-hosted SFTP? (Choose two.)
A. Request Adobe support to whitelist IP addresses
B. Upload a private key in the external account configuration.
C. Upload a public key in the external account configuration.
D. Provide the public key to Adobe support to have it uploaded to the SFTP
server.
E. Provide the private key to Adobe support to have it uploaded to the SFTP
server.
QUESTION 3 Every week, new data files are uploaded to the Adobe-hosted SFTP server.
What is the maximum time limit that files remain on the SFTP server?
A. 30 days
B. 15 days
C. 20 days
D. 25 days
Answer: B
Reference:
https://docs.adobe.com/content/help/en/campaign-classic/using/getting-started/importing-andexportingdata/sftp-server-usage.html
QUESTION 4 Which two component categories are used to filter data in a report? (Choose
two.)
A. Population
B. Metrics
C. Period
D. Segments
E. Targets
VCS-322 Administration of Veritas Enterprise Vault 12.x
Although each product varies in complexity and depth of technical knowledge, all
certification exams target customers in an administrative role and cover core
elements measuring technical knowledge against factors such as installation,
configuration, deployment, product administration, management, day-to-day
maintenance, and basic troubleshooting.
The certified end user will demonstrate an understanding of the installation,
configuration, deployment, administration, management, maintenance, and
troubleshooting of Veritas Enterprise Vault 12.x. This understanding serves as a
basis of knowledge for proactively managing Veritas Enterprise Vault 12.x in an
enterprise environment to improve a company's ability to retain and protect
corporate information.
Passing this exam will result in a Veritas Certified Specialist (VCS)
certification and counts towards the requirements for a Veritas Certified
Professional (VCP) certification in Archiving and eDiscovery.
Exam Details
# of Questions: 75 - 85
Exam Duration: 105 minutes
Passing Score: 69%
Languages: English
Exam Price: $225 USD (or your country’s currency equivalent)
Suggested Preparation
Recommended Courses: Veritas Enterprise Vault 12.x: Administration I
Veritas Enterprise Vault 12.x: Implementation and Deployment
Note: If you do not have prior experience with this product, it is recommended
that you complete an in-person, classroom training or Virtual Academy virtual
classroom training class in preparation for the VCS exam. Be cautioned that
attendance in a training course does not guarantee passage of a certification
exam.
Recommended preparation steps: Exam Objectives (PDF): Download and review exam objectives to understand the
scope of topics covered in the certification exam.
Attend recommended training classes listed above.
Study Guide (PDF): Review the study guide, which maps key lessons and topics
from the associated training course(s) to the exam objectives of the
certification exam.
Gain hands-on experience with the product. Three to six months experience
working with Veritas Enterprise Vault 12.x in a production or lab environment is
recommended.
Sample Exam (PDF): Test yourself and your exam-taking skills using the sample
exam.
In addition, you should be familiar with the following supporting products,
skills, and technologies: Microsoft Windows Server administration and maintenance
Microsoft Exchange
Microsoft Internet Information Services (IIS)
Microsoft SQL Server
QUESTION 1 When a user is enabled for archiving, an e-mail is sent from the Enterprise
Vault system mailbox.
Which permissions must be granted to the Vault Service Account for this feature
to work properly?
A. Log on as a service
B. Receive As
C. log on remotely
D. Send As
Correct Answer: C
QUESTION 2 An administrator needs to remove an Index Server from an Index Server Group
and place it in another group.
When can this process be completed?
A. during the processing time of the Index Administration task
B. before archived items have been indexed
C. when the Indexing Service is stopped
D. after indexes have been put into Backup mode
Correct Answer: B
QUESTION 3 Which step(s) are necessary to install Message Queueing (MSMQ) in
preparation for configuring a Windows cluster?
A. use Computer Manager to manually move C:\windows\system32\msmq to a shared
cluster disk resource
B. use Windows Failover Cluster Manager to add the Message Queuing resource; in
the properties add the MSMQ disk to the resource list
C. use the Component Services snap-in to manually move C:\windows\system32\msmq
to a shared cluster disk resource
D. use Windows Failover Cluster Manager to add the MSMQ resource; add
C:\windows\system32\msmq to the resource list and convert it to a shared disk
Correct Answer: B
QUESTION 4 Which two archive types are supported by the Veritas Enterprise Vault 12.x
Move Archive function? (Select two.)
A. File System Archiving (FSA) archives
B. Exchange Mailbox archives
C. Exchange public folder archives
D. Shared archives
E. Exchange Journal archives
Correct Answer: BE
QUESTION 5 Which process is responsible for shortcut processing after an Archive Move
to a different Veritas Enterprise Vault 12.x site?
A. Indexing Service on the source Enterprise Vault server
B. Indexing Service on the destination Enterprise Vault server
C. Archiving Task on the destination Enterprise Vault server
D. Archiving Task on the source Enterprise Vault server
The LPIC-3 certification is the culmination of LPI’s multi-level professional
certification program. LPIC-3 is designed for the enterprise-level Linux
professional and represents the highest level of professional,
distribution-neutral Linux certification within the industry. Three separate
LPIC-3 specialty certifications are available. Passing any one of the three
exams will grant the LPIC-3 certification for that specialty.
The LPIC-3 303: Security certification covers the administration of Linux
systems enterprise-wide with an emphasis on security.
Current Version: 2.0 (Exam code 303-200)
Objectives: 303-200
Prerequisites: The candidate must have an active LPIC-2 certification to receive
LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order
Requirements: Passing the 303 exam
Validity Period: 5 years
Languages: English, Japanese
QUESTION 1
Which of the following circumstances prevent the usage of container based virtualization? (Choose TWO
correct answers.)
A. More than one container requires access to block devices available in the host system.
B. Remote access via SSH is required to all containers.
C. Each container needs to have its own user accounts and user groups.
D. Administrators of containers must be able to install customized Linux kernels.
E. Different operating systems are to be used within containers on the same virtualization host.
QUESTION 2
When migrating a physical machine to a full virtualized machine, which of the following properties should be
expected to change from the perspective of the guest operating system? (Choose TWO correct answers.)
A. The user accounts within the guest operating system.
B. The properties of the CPU and other hardware devices.
C. The MAC address of the network interfaces.
D. The version of the guest operating system.
E. The software and applications installed on the guest system.
QUESTION 3
Which of the following statements are true regarding IaaS computing instances? (Choose TWO correct
answers.)
A. Creation of new instances can be automated by using scripts or APIs and service interfaces.
B. The root file system of a computing instance is always persistent and can be accessed after the instance is
destroyed.
C. Each and every user of an IaaS cloud has exactly one computing instance.
D. Once created, computing instances are seldom deleted in order to ensure the accessibility of the instance's
data.
E. Instances may be created when needed and destroyed when they become obsolete.
QUESTION 4
Which of the following technologies is the most important component of IaaS clouds?
A. Database replication
B. DNS delegation
C. Emulation
D. Mandatory Access Control
E. Virtualization
Answer: E
Section: Virtualization
Explanation
Explanation/Reference:
QUESTION 5
Which of the following statements are true regarding Xen domains? (Choose TWO correct answers.)
A. Fully virtualized and paravirtualized domains are managed using the same tools and commands.
B. Xen domains of all types require virtualization extensions in the host system's CPU.
C. All fully virtualized domains are called 'Dom0' while all paravirtualized domains are called 'DomU'.
D. Both paravirtualized and fully virtualized domains may run on the same host system.
E. Paravirtualized domains are significantly slower than fully virtualized domains.
Although each product varies in complexity and depth of technical knowledge,
all certification exams target customers in an administrative role, cover core
elements measuring technical knowledge against factors such as installation,
configuration, deployment, management & administration, and basic
troubleshooting.
This program consists of a technical exam at a product/version level that
validates that the successful candidate has the knowledge and skills necessary
to successfully administer Veritas InfoScale Availability 7.3 for UNIX/Linux
Passing this exam will result in a Veritas Certified Specialist (VCS)
certification and counts towards the requirements for a Veritas Certified
Professional (VCP) certification in Storage Management and High Availability for
UNIX.
Exam Details # of Questions: 75 - 85
Exam Duration: 105 minutes
Passing Score: 71%
Languages: English
Exam Price: $225 USD (or your country’s currency equivalent)
Recommended Course: Veritas InfoScale Availability 7.3 for UNIX/Linux: Administration
Veritas InfoScale Availability 7.3 for UNIX/Linux: Advanced Administration I
Veritas InfoScale Availability 7.3 for UNIX/Linux: Advanced Administration II
Note: If you do not have prior experience with this product, it is recommended
that you complete an in-person, classroom training or Virtual Academy virtual
classroom training class in preparation for the VCS exam. Be cautioned that
attendance in a training course does not guarantee passage of a certification
exam.
Recommended preparation steps: Exam Preparation Guide (PDF): Download and review the guide to understand
the scope of topics covered in the certification exam and how they map to the
key lessons and topics in the associated training course(s).
Attend recommended training classes listed above.
Gain hands-on experience with the product. Six to twelve months experience
working with InfoScale Availability and/or Veritas Cluster Server for UNIX/Linux
in a production or lab environment is recommended.
Sample Exam (PDF): Test yourself and your exam-taking skills using the sample
exam
In addition, you should be familiar with the following product documentation
and websites: InfoScale Product Documentation
High Availability Configuration in AWS Cloud using InfoScale Enterprise
InfoScale Product Page
InfoScale Technical Support
InfoScale Updates, Patches and News
Veritas Communities
High Availability Configuration in AWS Cloud using InfoScale Enterprise
Recommended hands-on experience (real world or virtual): Recommended 9-12 months experience working with InfoScale Availability in a
production or lab environment.
Recommended 3-6 months experience working with InfoScale Storage in a production
or lab environment.
Recommended knowledge of UNIX/Linux system and network administration.
Recommended knowledge of storage virtualization and high availability concepts.
Preparing the environment for Veritas InfoScale Availability
Installing and configuring Veritas InfoScale Availability
Managing cluster communications and data protection mechanisms
Configuring service groups, resources, resource dependencies, agents, and
resource types
Configuring failover policies and service group dependencies
Validating the Veritas InfoScale Availability implementation
Performing basic troubleshooting
Configuring global clustering
Managing and administering InfoScale Availability using the Command Line and
Veritas InfoScale Operations Manager (VIOM)
Deploy, configure, and maintain Veritas InfoScale Availability
Determine how components external to the cluster may impact high availability
Monitor and manage clusters
Understand high availability concepts, components, and architectures
Understand the impact of modifying cluster configurations
Understand user’s and access in a cluster environment
QUESTION 1
An administrator has removed a node from the cluster. After system maintenance, the administrator notices
that the remaining cluster nodes will no longer form a cluster.
Which file will be used by the cluster at startup to determine the number of nodes required to form a cluster?
A. /etc/gabtab
B. /etc/llttab
C. /etc/vxfentab
D. /etc/llthosts
Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which behavior should an administrator expect when performing the Veritas InfoScale Availability online
upgrade process using the installer?
A. The cluster remains online and the kernel processes are swapped during the upgrade process.
B. The cluster is taken offline one node at a time during the package upgrade.
C. The cluster is taken offline during the upgrade process, but the applications stay online.
D. The cluster remains online during the update process, but the service groups are offline.
Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which command allows an administrator to halt the cluster without affecting any of the running services in an
active Veritas Cluster Server environment?
A. hastop
B. hastop –all
C. hastop –all –force
D. hastop –all –freeze
Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
The hastatus command shows a service group in the AutoDisabled state, and Veritas Cluster Server is
unsuccessful in bringing the service group online automatically.
Which command can the administrator use to reset the AutoDisabled attribute?
A. hagrp –autoenable -sys
B. hagrp –forceonline -sys
C. hagrp –enable -sys -auto
D. hagrp –modify AutoDisabled 0
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
When is the resstatechange trigger unable to detect a resource state transition?
A. when a resource is faulted
B. when a resource is brought online
C. when a resource is enabled
D. when a resource fault is cleared
Number of questions: 60
Number of questions to pass: 35
Time allowed: 90 mins
Status: Live
This exam consists of 4 sections described below.
Customer Environment, Requirements, and Plans 33% Describe a customer's hardware and software environment.
Describe customer operational contraints, including power, cooling, personnel,
knowledge level, and service level requirements.
Identify disaster recovery and high availability requirements.
Identify customer performance requirements, including throughput and latency.
Identify the customer's capacity and growth requirements and the impact on total
cost.
Product Information 30% Given a scenario, describe the difference(s) among various storage media and
align them to a requirement of TCA, performance, and upgradability.
Identify the difference(s) in cost, performance, and reliability among IBM
storage solutions.
Describe IBM's competitive advantages.
Given a scenario, describe how IBM enterprise storage products help clients
solve data and device management issues through application efficiency and
integration.
Given a scenario, explain alternatives to the existing environment to provide
additional functionality.
Application of Resources and Tools 20% Given a scenario, evaluate which tool(s) to use based upon key applications,
performance requirements, customer pain-points, capacity and growth
requirements, and the impact on total cost.
Identify uses of IBM maintenance, IBM websites, IBM tools, and IBM processes.
Given a scenario, identify high-level steps to integrate new solutions into an
existing systems environment.
Containers, Clouds, and Analytics 17% Identify ways the IBM storage porfolio enables containers and clouds.
Identify ways the IBM storage porfolio enables analytics.
Identify ways the IBM storage porfolio provides security.
Overview PartnerWorld Code: C0005007
Replaces PW Code: 23003306
Status: Live
The IBM Storage Technical Specialist consults with customers to gather and
understand customer requirements and position the correct solutions. The
specialist uses available resources to design the solution. The specialist has a
broad knowledge of the features, functions, and benefits of IBM storage
solutions and the IBM storage portfolio, including disk, tape, storage
management software, and software defined storage. Successful candidates
understand competitive offerings used in the enterprise segment.
The IBM Storage technologies and solutions included in this exam are: IBM Flash Storage
All flash solution concepts
Hybrid storage solutions including IBM System Storage DS8800 and IBM FlashSystem
Software-defined storage including the IBM Spectrum Suite; IBM Spectrum
Accelerate, IBM Spectrum Control, IBM Storage Insights, IBM Spectrum Virtualize
and IBM Spectrum Scale
IBM tape solutions and technologies
IBM Spectrum Protect
IBM Spectrum Protect Plus
IBM Spectrum Archive
Cloud Object Storage
SAN/Networks
VersaStack and converged infrastructure
General knowledge of hybrid cloud and analytics concepts and the IBM Storwize
family of products is recommended.
This specialist can perform the following tasks without assistance:
Determine product positioning
Gather customer requirements
Identify and engage correct resources
Identify competitors
Provide the technical details for a TCO analysis
Present the IBM storage product line to the customer
Articulate features and benefits of IBM storage solutions
Read and understand a configuration based on customer requirements
Develop basic technology topologies and architectural designs
Present the configuration to the customer
Initiate the TDA process
Identify the correct tool to size the solution for performance
Identify open system, mainframe and IBM i connectivity requirements
Provide information gathered during customer interaction for post-installation
This specialist can perform the following tasks with assistance: Respond to an RFP within the enterprise storage scope
Mitigate competitors
Demonstrate deep technical knowledge
Complete detailed design of the total solution
Conduct the IBM Technical Delivery Assessment (TDA)
Identify risks associated with the proposed solution
Plan implementation of the solution as part of the pre-install TDA
Submit an RPQ/SCORE request
Conduct a demonstration of the storage solution
This specialist should be familiar with the following resources: eConfig
TCOnow!
IBM PartnerWorld
Sizing tools such as Disk Magic, Capacity Magic and Batch Magic
IBM Comprestimator Utility
Storage Consolidation Evaluation tool hosted by Alinean
System Storage Interoperability Center (SSIC)
Cognitive Storage Analytics
IBM Economics Study
IBM Data Reduction Estimator Tool
Recommended Prerequisite Skills Minimum 12 months of direct technical storage experience, with six months
experience with IBM designated storage products.
QUESTION 1
A customer with a highly virtualized VMware environment and several bare-metal Oracle servers is interested
in data protection and replication between its on-site and IBM cloud environments.
Which technology should be discussed?
A. IBM Spectrum Protect Extended Edition
B. IBM Spectrum Protect for Virtual Environments
C. IBM Spectrum Protect Snapshot
D. IBM Spectrum Protect Plus
Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.ibm.com/downloads/cas/L9MD4MEZ
QUESTION 2
A customer has an existing IBM XIV Gen3 solution with 3 TB drives and nine modules. While performance is
acceptable, the customer wants to increase the performance of small-block reads. The current nine modules
are running at 60% of capacity.
Which solution should the technical specialist recommend?
A. Add an IBM FlashSystem 900 as a separate pool.
B. Add the SSD caching option on five modules.
C. Add the SSD caching option on all nine modules.
D. Add three more data modules to improve performance.
QUESTION 3
A customer has IBM and NetApp block and file storage. The customer is interested in reducing storage costs
and optimizing its data center through intelligent capacity planning, storage reclamation, storage tiering, and
performance metrics.
Which IBM SDS offering should the technical specialist discuss with the customer?
A. IBM Spectrum Protect
B. IBM Spectrum Control
C. IBM Spectrum Insights Pro
D. IBM Virtual Storage Center
Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.ibm.com/support/knowledgecenter/en/SSQRB8/com.ibm.spectrum.si.doc/
prd_ovw_versions.html
QUESTION 4
A customer has a requirement for 250,000 IOPS and 200TB of capacity. The customer requires IBM SSR
code upgrades at no additional charge.
Which solution should the technical specialist recommend to the customer?
A. IBM FlashSystem A9000 with 3.6TB MicroLatency modules.
B. IBM FlashSystem V9000 with IBM Storwize V5010 with 1.2TB drives
C. IBM Storwize V7000 with 1.2TB drives and 800 GB SSDs
D. IBM DS8886 with 1.2TB drives and HPFE
Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Which exclusive feature of the IBM FlashSystem 9100 is a technical advantage over competitive storage
arrays?
A. 3D NAND SATA SSD drives
B. NVMe SSD drives
C. XL Flash modules
D. FlashCore modules
Exam Title: Oracle Global Trade Management 2018 Implementation Essentials
Exam Number: 1Z0-995
Exam Price: Rs.22,584.00 More on exam pricing
Format: Multiple Choice
Duration: 120 Minutes
Number of Questions: 76
Passing Score: 70%
Validated Against: Exam has been validated against Oracle Global Trade
Management Cloud 6.4.3/18C.
Global Trade Management (GTM) Product Overview Describe GTM Deployment Options
Configure User Role and Setup
Configure Screensets and Menus
Explain Domain Management in GTM
Explain Automation Agents in GTM
Explain Integration Methodolodiges in GTM
Restricted Party Screening Explain Restricted Party Screening
Configure Restricted Party Screening
Execute Restricted Party Screening for Party
Configure Agents for Restricted Party Screening on Party and Transaction
Landed Cost Simulator Explain Landed Cost Simulator
Configure Value Sets, Value Formulas, and Expressions
Run a Landed Cost Analysis
Trade Compliance Configure Compliance Rules
Describe Compliance Algorithm used for Compliance Rule Screening
Configure Compliance Rule Screening on Trade Transaction
Configure and Execute a Policy for Trade Transaction
Customs Management Explain Customs Declaration Process
Configure Declaration Creation and Aggregation
Configure Duty and Tax Calculation
Configure Filing Generation and Transmission Handling
Global Trade Intelligence Explain Global Trade Intelligence
Enable Access to Global Trade Intelligence
Build Reports and Dashboards
Trade Master Data and Transaction Creation
Explain Trade Master Data Management in GTM
Create Trade Item, Party, and Registration in GTM
Set up Data Configuration to Create Trade Transaction from OTM
Configure Content Integration
Product Classification Process Explain Product Classification process
Configure and set up Download of Product Classification Codes
Configure and assign Product Classification or Item Templates
Configure Recurring Process to Detect Invalid Product Classification
Configue Lookup Product Classification on Trade Transaction
License Management
Explain License Management
Set up License Categories, Types, and Codes
Create License in GTM
Configure License Assignment on Trade Transaction
Document Management Explain Document Management
Configure Document Determination
Generate and Preview Documents Required on Transaction
Manage Subscribers and Reviewers on Documents
QUESTION 1
Which two options are true about Classification Approval? (Choose two.)
A. It is for one user to review and approve the Item Classification that another user performed.
B. It is a mandatory process.
C. It is an optional process.
D. It is for one user to both create and approve the Product Classification Code details, including Description,
and so on.
Computer Hacking Forensic Investigator Certification Computer hacking forensic investigation is the process of detecting hacking
attacks and properly extracting evidence to report the crime and conduct audits
to prevent future attacks.
Computer crime in today’s cyber world is on the rise. Computer Investigation
techniques are being used by police, government and corporate entities globally
and many of them turn to EC-Council for our Computer Hacking Forensic
Investigator CHFI Certification Program.
Computer Security and Computer investigations are changing terms. More tools are
invented daily for conducting Computer Investigations, be it computer crime,
digital forensics, computer investigations, or even standard computer data
recovery. The tools and techniques covered in EC-Council’s CHFI program will
prepare the student to conduct computer investigations using groundbreaking
digital forensics technologies.
Computer forensics is simply the application of computer investigation and
analysis techniques in the interests of determining potential legal evidence.
Evidence might be sought in a wide range of computer crime or misuse, including
but not limited to theft of trade secrets, theft of or destruction of
intellectual property, and fraud. CHFI investigators can draw on an array of
methods for discovering data that resides in a computer system, or recovering
deleted, encrypted, or damaged file information known as computer data recovery.
The purpose of the CHFI credential is to: Validate the candidate’s skills to identify an intruder’s footprints and to
properly gather the necessary evidence to prosecute in the court of law.
About the Exam Number of Questions: 150
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM
Exam Prefix: 312-49 (ECC EXAM)
Passing Score In order to maintain the high integrity of our certifications exams,
EC-Council Exams are provided in multiple forms (I.e. different question banks).
Each form is carefully analyzed through beta testing with an appropriate sample
group under the purview of a committee of subject matter experts that ensure
that each of our exams not only has academic rigor but also has “real world”
applicability. We also have a process to determine the difficulty rating of each
question. The individual rating then contributes to an overall “Cut Score” for
each exam form. To ensure each form has equal assessment standards, cut scores
are set on a “per exam form” basis. Depending on which exam form is challenged,
cut scores can range from 60% to 85%. QUESTION 1
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to
request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this
phone call and obligates the ISP to preserve e-mail records?
A. Title 18, Section 1030
B. Title 18, Section 2703(d)
C. Title 18, Section Chapter 90
D. Title 18, Section 2703(f)
Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Item 2If you come across a sheepdip machine at your client site, what would you infer?
A. A sheepdip coordinates several honeypots
B. A sheepdip computer is another name for a honeypot
C. A sheepdip computer is used only for virus-checking.
D. A sheepdip computer defers a denial of service attack
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
In a computer forensics investigation, what describes the route that evidence takes from the time you find it
until the case is closed or goes to court?
A. rules of evidence
B. law of probability
C. chain of custody
D. policy of separation
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
How many characters long is the fixed-length MD5 algorithm checksum of a critical system file?
A. 128
B. 64
C. 32
D. 16
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
You are working on a thesis for your doctorate degree in Computer Science. Your thesis is based on HTML,
DHTML, and other web-based languages and how they have evolved over the years.
You navigate to archive. org and view the HTML code of news.com. You then navigate to the current
news.com website and copy over the source code. While searching through the code, you come across
something abnormal: What have you found?
A. Web bug
B. CGI code
C. Trojan.downloader
D. Blind bug