When configuring auditing features for a VNX, what does the /sbin/ausearch command do?
A. Produces summary reports
B. Controls the kernel's audit subsystem
C. Reads the audit trail
D. Searches the man pages
Which options can be used to manage VNX for File using the CLI?
A. Serial connection to the Control Station Secure Shell connection to the Control Station
B. Serial connection to either Storage Processor Click on Run command in Unisphere
C. Unisphere with the Storage Management Server Navisphere Secure CLI on a Storage Processor
D. Host-based Secure CLI software TelNet connection to the Control Station
Which options can be used to manage VNX for File using the CLI?
A. SSH connection to the Control Station Serial connection to the Control Station
B. Serial connection to a Data Mover SSH connection to a Data Mover
C. NaviSECCLI on a Storage Processor NaviCLI with the "-AddUserSecurity" option
D. Host-based Secure CLI software TelNet connection to the Control Station
A customer wants to assign different management roles based on groups in an LDAP database.
How are user rights established?
A. All users found in the mapped LDAP group are given Operator rights.
B. The username is searched in the "User Search Path" and granted rights according to Role Mapping.
C. The username is searched in the "User Search Path" and granted rights according to login ID.
D. All users found in the mapped LDAP group are given Storage Administrator rights.
Which protocol enables the customer to access the Control Station over IP?
A. SSH
B. SNFS
C. CIFS
D. NTP
A company has decided to use CAVA as their antivirus solution. Which protocol does CAVA use to support antivirus protection in a Celerra environment?
A. Common Internet File System
B. Multi Protocol File System
C. Network File System
D. File Transfer Protocol
In order to boot a VNX, which connection must be enabled?
A. Slot A0 Port A1
B. Slot A0 Port A0
C. Slot B1 Port B0
D. Slot B0 Port B1
During the design phase, an administrator asks you which type of automatic iSCSI device discovery is supported by Celerra. What is your response?
A. Internet Storage Name Service
B. Challenge Handshake Authentication Protocol
C. Network Address Authority
D. iSCSI LUN masking
What is the name of the process that writes original data from the source LUN to the reserved LUN pool when using SnapView snapshots?
A. Copy on First Write
B. Point-in-Time Copy
C. Reserved LUN Copy
D. Write-Aside Copy
What is the best fit workload recommendations when using Flash drives in a VNX File environment?
A. Virtual Desktop Infrastructure
B. Backup-to-disk
C. Data archiving
D. Web server
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-545 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.