Free DEA-1TT4 Exam Braindumps (page: 13)

Page 12 of 32

A company's Finance department needs 200 GB of storage for their business applications. A LUN is created with 200 GB and RAID 1 is configured to support the applications. If the cost of storage per GB is $2, what is the chargeback cost to the department for application storage?

  1. $ 200
  2. $ 400
  3. $ 800
  4. $ 1500

Answer(s): C



What is an example of a Performance Management task?

  1. Selecting an appropriate RAID type for a storage pool.
  2. Removing unused resources from a service and reassigning them to another.
  3. Scanning applications and databases to identify vulnerabilities.
  4. Planning and architecting data backup and replication solutions.

Answer(s): A

Explanation:

The performance management tasks on a SAN include implementing new ISLs and aggregating links in a multiswitch fabric to eliminate performance bottleneck. The storage system-related tasks include separating sequential and random I/Os to different spindles, selecting an appropriate RAID type for a storage pool, and changing storage tiering policy and cache configuration, when the performance management is concerned.



DRAG DROP
If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?

  1. See Explanation for the Answer.

Answer(s): A

Explanation:



1. The client requests authorization from the resource owner. The authorization request can be made directly to the resource owner, or indirectly through the authorization server.
2. The client receives an authorization grant, which is a credential representing the resource owner's authorization to access its protected resources. It is used by the client to obtain an access token. Access tokens are credentials that are used to access protected resources. An access token is a string representing an authorization issued to the client. The string is usually opaque to the client. Tokens represent specific scopes and durations of access, granted by the resource owner, and enforced by the resource server and authorization server.
3. The client requests an access token by authenticating with the authorization server and presenting the authorization grant.
4. The authorization server authenticates the client and validates the authorization grant, and if valid, issues an access token.
5. The client requests the protected resource from the resource server and authenticates by presenting the access token.
6. The resource server validates the access token, and if valid, serves the request.


Reference:

https://tools.ietf.org/html/rfc6749



What does the "X" represent in the exhibit?

  1. E_port
  2. F_port
  3. N_port
  4. NL_port

Answer(s): B

Explanation:






Post your Comments and Discuss Dell DEA-1TT4 exam with other Community members:

Exam Discussions & Posts