Which type of virtual machine clone is created from a snapshot of a parent VM?
A. Mirrored Clone
B. Full Clone
C. Linked Clone
D. Snap Clone
What are the key functions of data management?
A. detection and orchestration management
B. discovery and operations management
C. configuration and detection management
D. rollout and configuration management
Which characteristic of big data refers to data generated by numerous sources?
A. veracity
B. variety
C. volume
D. velocity
Which recovery mode involves rolling back a system to a previous recovery point instead of finding the cause of a fault?
A. Forward recovery
B. Complete functional recovery
C. Backward recovery
D. Degraded functional recovery
What is a hot backup?
A. application is up-and-running with users accessing their data during the backup process
B. backup is indexed from last full backup
C. a full backup is synthesized
D. requires the application to be shut down during the backup process
Which model does MapReduce utilize?
A. Batch processing
B. Backup
C. Geographic mapping
D. Redundancy
What is true for a software-defined network?
A. physical switches and routers dependent on the underlying network
B. physical switches dependent on the underlying network
C. virtual switches dependent on the underlying network
D. switching and routing of the network traffic independent of the underlying network
Which security control provides logical isolation of devices on Ethernet?
A. VPN
B. Firewall
C. VSAN
D. VLAN
What makes services visible and accessible to the users?
A. Service Catalog
B. Operational Database
C. Cloud native application
D. Unified storage system
A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM. How many backup copies are required to restore the requested files?
A. 2
B. 3
C. 6
D. 7