Documente Academic
Documente Profesional
Documente Cultură
2
3
4
5
6
7
8
9
10
11
12
13
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
46
47
48
49
50
Question
Which cloud service management process maintains information
Why should data center elements be monitored?
What is a primary goal of incident management?
Which product provides an application virtualization solution?
Which is a function of user access management software?
What should be included in a Cloud Service Termination Agreemen
A consumer needs to determine their scope of adoption of cloud s
What are key cost factors involved while using cloud services from
What is a characteristic of channel technology?
You are asked to create four VLANs on a newly installed physical
Which type of attack could enable the installation of a rogue hyper
What makes it possible to store virtual machine files on a NAS dev
Which cloud service model encompasses the complete cloud compu
Which data center management activity involves eliminating single
In a virtualized data center, guest operating system kernels were
Which statement is true about User State virtualization?
An organization needs to migrate all of their applications at the
Which Fibre Channel (FC) port type would only be used to connect
What is a benefit of cloud computing?
What is a key advantage of pointer-based virtual replication over p
Which parameter determines the maximum amount of CPU and memo
Which backup solution supports only source-based data deduplicat
What is a best practice for selecting drives for a thin pool?
Which type of software is capable of creating cloud services?
How does a domain name server balance client traffic across a clus
What are the three building blocks of automated storage tiering?
What is a limitation of using a backup agent on a hypervisor when
What is enabled by N_Port ID Virtualization (NPIV)?
Which challenges do RAID technologies address?
What are primary considerations related to performance when migr
Which process categorizes resource pools based on performance a
An organization has decided to deploy desktop virtualization using
An administrator is concerned about Denial of Service attacks on th
Which report should an administrator use to know both historic and
What enables a virtual machine to directly access LUNs in a stora
How is the term Recovery Point Objective (RPO) defined?
What is a benefit of automated site failover capability in a data c
Which type of expense is most likely to increase as an organizatio
Which mechanism enables a LUN with higher capacity than is physically allocated to be p
Which RAID type uses a dedicated parity disk?
An organization plans to migrate an application to the cloud. In w
Which statement is true about a Trunk link in a VLAN environment?
Which address is used to statically identify a physical port in a F
An administrator of a virtualized data center is particularly conce
What is a limitation of a server-based Intrusion Detection System (
What is the basis for determining the size of the virtual machine sw
What is a benefit of data striping in RAID?
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
B
C
D
Capacity Management Availability Managem Service Catalog and Configuration M
To ensure that no data isTo
l eliminate threats t To ensure that the IT support staff per
To analyze incident histoTo report incidents to To identify the root cause of recurri
VMware View
VMware Server
VMware Workstation
It provides configuration It enables users to co It provides a consolidated view of exis
Service performance leveTime required for the Cost of transferring the ownership of i
Business continuity ass Disaster recovery as Application hardening assessment
Management, compliancService deployment, Infrastructure, management
Long distance transmissiLoose coupling
Dynamic connection establishment
Add four VLAN IDs to theConfigure a trunk portActivate VLAN trunking and tagging on
VM theft
Side channel attack VM escape
Virtual machine monitor Guest operating syst Virtual Machine File System
Infrastructure-as-a-Servi Platform-as-a-ServiceIT-as-a-Service
Capacity management Performance manage Security management
Full virtualization
Hardware assisted virtSoftware assisted virtualization
Common User States areTemplates
u
are used toUser States are preserved as temporar
Hybrid
Vendor-specified
Proprietary
N_port
F_port
G_port
Simplification of regulat Reduced operational Transparent Provider-to-Provider migra
The replica device is immThe replica device ca The source device is not required for
Reservation
Share
Threshold
EMC Data Domain
EMC NetWorker
EMC SourceOne
Drive speed should be 1 The pool should contaDrives should be supplied by the sam
Capacity management User access managemPlatform management
By mapping the domain na
By sending client traffiBy translating the domain name to the
Storage type, storage gr Storage pool, storage Storage pool, storage group, policy
It is not possible to bac Backing up a LUN thatBacking up data residing on a Virtual
A physical NIC port can fA virtual N_port can f A virtual N_port can function as multip
Loss of data due to disk dPerformance issues, sData corruption, slow data backup
Infrastructure performanNetwork latency, clie Infrastructure security, application p
Resource Bundling
Resource Cataloging Resource Distribution
Application deployment IT management
Client devices
Deploy role-based accessInstall encryption sof Perform regular hypervisor updates
Chargeback report
Performance report Routine report
Virtual Machine File Sys Thin provisioning
Block-level virtualization
The period of time needeThe period of time th The number of mission critical applica
Reduced Recovery Point Elimination of site fai Elimination of Virtual Machine File Sys
Management costs
Capital expenditures Infrastructure costs
Automated storage tierinRaw Device Mapping Global namespace mapping
RAID 5
RAID 6
RAID 1+0
Assessment
Automation
Optimization
It transfers untagged Et It links two virtual s It is a dedicated link for transferring
MAC
IP
Fibre Channel
VLAN tagging
Port grouping
NIC trunking
It cannot detect encrypteIt works only when neIt cannot access logs written by privi
The sum of the virtual The physical machineThe difference between the amount of
Security is improved by cData is available in thRandom reads and writes are allocated
vCloud Director
Ensure the provider has tEnsure the provider cEnsure the provider stores the data in
Option to relinquish tightly
Cost
coupled
of the applications
existing s Optimum effort needed to migrate app
Ensure the provider has tEnsure the provider cEnsure the provider stores the data in
A software vendor does no
Organization cannot mo
On-disk locking prevents simultaneou
Configure reservation forEncrypt all the data Reduce network bandwidth for storage
Configuring a guest OS ru
Preventing a comprom
Changing the default configuration of
Multiple specified factorsA single credential is Enables multiple clients to be service
Defines the boundary betw
Defines the boundaryDefines the policies of authentication
Improves the overall pe No impact on the overProvides overall performance equivale
Mirroring
Striping
Nested
Block-level
Object-level
Network-level
Allows applications to ru Creates a virtualizat Provides hardware resources to VMs
Standardized virtual ma Virtual machine monitHardware assisted virtualization tech
Allows binary translationAllows binary translation
Provides
to be direct
performed
access
directly
to theby
hardwar
a guest OS
Uses the network identityCopies changes madeContains a symbolic link that enables
File-level virtualization Storage Tiering
Block-level virtualization
IP addresses of applicat Domain names of appli
IP addresses of the clients are mapped
Virtual SCSI controller Virtual switch
Virtual machine monitor
Compatibility of consumer
Contractual obligations
Cost of the in-house infrastructure and
User access managemenVirtual infrastructur Element management
User access managemenVirtual infrastructur Element management
OPEX
Differential
Forklift
Multi-step
Sandboxing
Intrusion detection s Demilitarized zone
750 GB
900 GB
1050 GB
Virtual NIC
Physical HBA
Virtual HBA
A process to give a user A process to ensure thA process to ensure that only legitima
Service asset and confi Performance manage Compliance management
An attacker installs a ro An attacker installs u An attacker copies or moves a VM in
Answer
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
set
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
3
3
3
1
4
2
1
4
4
3
4
1
2
3
1
1
1
1
1
1
1
1
1
1
4
4
1
1
1
1
1
3
1
2
1
2
1
4
2
4
1
1
2
3
3
1
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
3
1
2
1
2
1
1
3
3
1
2
3
1
4
1
2
3
4
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
3
4
5
6
7
8
9
10
11
12
13
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
NULL
QUESTION
Which cloud service management process maintains information in the Configuration Management
Why should data center elements be monitored?
What is a primary goal of incident management?
Which product provides an application virtualization solution?
Which is a function of user access management software?
What should be included in a Cloud Service Termination Agreement?
A consumer needs to determine their scope of adoption of cloud services. Which Governance, Risk
What are key cost factors involved while using cloud services from a service provider?
What is a characteristic of channel technology?
You are asked to create four VLANs on a newly installed physical Ethernet switch. How should you c
Which type of attack could enable the installation of a rogue hypervisor and take control of underly
What makes it possible to store virtual machine files on a NAS device?
Which cloud service model encompasses the complete cloud computing stack?
Which data center management activity involves eliminating single points of failure to ensure busin
In a virtualized data center, guest operating system kernels were modified to eliminate the need fo
Which statement is true about User State virtualization?
An organization needs to migrate all of their applications at the same time. Which migration strate
Which Fibre Channel (FC) port type would only be used to connect an FC switch to another switch?
What is a benefit of cloud computing?
What is a key advantage of pointer-based virtual replication over pointer-based full volume replicat
Which parameter determines the maximum amount of CPU and memory resources that can be con
Which backup solution supports only source-based data deduplication?
What is a best practice for selecting drives for a thin pool?
Which type of software is capable of creating cloud services?
How does a domain name server balance client traffic across a cluster of servers?
What are the three building blocks of automated storage tiering?
What is a limitation of using a backup agent on a hypervisor when backing up virtual machine (VM)
What is enabled by N_Port ID Virtualization (NPIV)?
Which challenges do RAID technologies address?
What are primary considerations related to performance when migrating operations to the cloud?
Which process categorizes resource pools based on performance and capacity?
An organization has decided to deploy desktop virtualization using the Virtual Desktop Infrastructu
An administrator is concerned about Denial of Service attacks on their virtual machines (VMs). Wha
Which report should an administrator use to know both historic and current utilization of storage in
What enables a virtual machine to directly access LUNs in a storage system?
How is the term Recovery Point Objective (RPO) defined?
What is a benefit of automated site failover capability in a data center environment?
Which type of expense is most likely to increase as an organization increases the consumption of c
Which mechanism enables a LUN with higher capacity than is physically allocated to be presented
Which RAID type uses a dedicated parity disk?
An organization plans to migrate an application to the cloud. In which phase of the migration proce
Which statement is true about a Trunk link in a VLAN environment?
Which address is used to statically identify a physical port in a Fibre Channel SAN environment?
An administrator of a virtualized data center is particularly concerned about NIC failure. What shou
What is a limitation of a server-based Intrusion Detection System (IDS)?
What is the basis for determining the size of the virtual machine swap file?
What is a benefit of data striping in RAID?
Which remote replication mode provides a near-zero recovery point objective (RPO)?
Which EMC backup and recovery product provides source-based data deduplication?
Which EMC product offers CDP functionality?
Which type of zoning does Zone 3 represent in the graphic?
Which iSCSI topology does the graphic represent?
Which data deduplication technique reduces storage capacity and network bandwidth requirement
Which EMC product provides a unified storage platform?
Which type of storage system does the graphic represent?
Which hypervisor component is responsible for performing binary translation of instructions that ca
Which cloud computing characteristic enables consumers to get computing resources without any
Which cloud characteristic enables the consumers to use cloud services from a wide range of clien
Which cloud deployment model enables to provisioning the cloud infrastructure for exclusive use b
Which component(s) of a cloud infrastructure framework helps automating the creation and deliver
In which circumstance is a converter boot CD used for a P2V conversion?
What is a benefit of NIC teaming?
What can be backed up if a backup agent is installed on a VM?
What best describes the VM snapshot?
What is a feature of Virtual Machine File System (VMFS)?
What best describes a VM template?
An organization requires that each user needs to access their own copy of OS and applications inst
Which statement is true about application encapsulation?
Three types of network traffic -VM, IP storage, and management - sharea total bandwidth of 300 Mb
Which technology enables configuring virtual HBAs?
Which statement is true about Remote Desktop Services (RDS)?
Which cloud service management process monitors and reports on allocation and utilization of reso
What is updated when attributes of a cloud service change?
Which product provides cloud user access management capability?
What should an organization consider before migrating its applications and operating system to the
What is considered during the optimization phase for cloud adoption?
What is explored during the proof of concept phase for cloud adoption?
What is an example of cloud vendor lock-in?
An attacker has carried out a denial-of-service attack in a cloud environment. In this attack, the att
A
Service Asset and Configuration Management
To determine whether components are functioning properly
To restore cloud services to consumers as quickly as possible
VMware ThinApp
It enables the creation and publication of a service catalog
Data migration plan
Risk assessment
Data migration, operations
Low protocol overhead
Define four VLAN IDs on the switch, then assign each VLAN ID to one or more switch ports
Hyperjacking
Network File System
Software-as-a-Service
Availability management
Paravirtualization
Operating system refreshes and migrations are easier to deploy
Forklift
E_port
Fast provisioning of resources through a self-service portal
Less space is required for the replica device
Limit
EMC Avamar
Drives should run at the same rpm
Unified management
By mapping the domain name to the IP address of each server in round-robin fashion
Storage type, storage group, policy
It is not possible to back up a LUN that is directly attached to a VM using Raw Device Mapping
A physical FC HBA port can function as multiple virtual N_ports
Loss of data due to disk drive failures, performance issues
Infrastructure performance, network latency
Resource Grading
Compute infrastructure
Limit the resource consumption of the VMs
Capacity planning report
Raw Device Mapping
The amount of data loss due to an outage that a business can tolerate
Reduced Recovery Time Objective
Operational expenditures
Virtual provisioning
RAID 3
Proof of Concept
It is a single network connection that carries multiple VLAN traffic
WWPN
NIC teaming
It runs on the same system as malicious software
The difference between the virtual machine memory limit and the reserved memory
Independent disks allow multiple reads and writes to take place simultaneously
Asynchronous replication
PowerPath/VE
TimeFinder
WWN
Bridged
Target-based deduplication
Symmetrix VMAX
Unified storage
Guest OS
Broad network access
On-demand self service
Externally-hosted private cloud
Service management tools
Perform a hot P2V conversion within a data center
Improves network security
Data stored on virtual disk
Preserves the state and data of a VM at a specific point-in-time
Enables multiple compute systems to access a shared volume
A reusable image created from a VM
Virtual Desktop Infrastructure
Application package contains built-in agents
Limit
NPIV
RDS provides individual OS sessions to the client systems
Financial management
Incident history log file
EMC Unified Infrastructure Manager
Ensure the provider supports the open virtual machine format
Usage pattern of consumed resources
Ensure the provider supports the open virtual machine format
Application built on a PaaS model cannot be moved to an IaaS model
Configure limit for the virtual machine traffic
Deploying VMs from templates with up-to-date security updates
Access is granted only when all the specified factors are validated
Defines the policies of confidentiality, integrity, and availability of an information system
Lowers the overall performance
Parity
File-level
Encapsulates VMs inside applications
Guest OS running on a virtual machine
Allows applications to run directly on physical hardware
Shares the virtual disk with its parent VM
Raw Device Mapping
IP addresses of the load balancers are mapped to a virtual IP address
Virtual IDE Controller
Issues related to performance of the cloud infrastructure
Unified management
Unified management
B
Capacity Management
To ensure that no data is lost if there is a disaster
To analyze incident history and identify impending service failures
VMware View
It provides configuration of, and relationships among, physical resources
Service performance levels
Business continuity assessment
Management, compliance
Long distance transmission
Add four VLAN IDs to the hypervisors VLAN ID pool, then assign each VLAN ID to one or more switc
VM theft
Virtual machine monitor
Infrastructure-as-a-Service
Capacity management
Full virtualization
Common User States are used for all the desktops
Hybrid
N_port
Simplification of regulatory compliance
The replica device is immediately accessible
Reservation
EMC Data Domain
Drive speed should be 15,000 rpm or higher
Capacity management
By mapping the domain name to the IP address of a load balancing device
Storage type, storage group, storage pool
It is not possible to back up data residing on a Virtual Machine File System
A physical NIC port can function as multiple virtual N_ports
Loss of data due to disk drive failures, data corruption
Infrastructure performance, security compliance
Resource Bundling
Application deployment
Deploy role-based access control on the VMs
Chargeback report
Virtual Machine File System
The period of time needed to detect a fault and determine its cause
Reduced Recovery Point Objective
Management costs
Automated storage tiering
RAID 5
Assessment
It transfers untagged Ethernet frames from different VLANs
MAC
VLAN tagging
It cannot detect encrypted traffic
The sum of the virtual machine memory limit and the reserved memory
Security is improved by creating multiple, identical copies of data
Synchronous replication
HomeBase
MirrorView
Port
Native
Disk-based deduplication
VNX
Block-based storage
Virtual machine
Measured service
Resource pooling
Public cloud
Physical infrastructure
Perform a cold P2V conversion
Increases switch port availability
VM configuration files
Creates a child VM from the configuration file of its parent VM
Managed only by a NAS systemAS system
A point-in-time replica of VM log file
Application Encapsulation
Application requires locally-installed agents for execution
Share
Zoning
Each RDS session has its own OS and applications installed
Capacity management
Problem resolution document
EMC Unisphere
Ensure the provider has the capability to meet the service level objectives
Option to relinquish tightly coupled applications
Ensure the provider has the capability to meet the service level objectives
A software vendor does not offer its software as a service
Configure reservation for the virtual machine traffic
Configuring a guest OS running critical applications in TCB mode
Multiple specified factors enable elimination of attackers even if one factor fails
Defines the boundary between security-critical and non-critical parts of an information system
Improves the overall performance
Mirroring
Block-level
Allows applications to run directly on physical hardware resources
Standardized virtual machine hardware
Allows binary translation to be performed by applications
Uses the network identity of its parent VM
File-level virtualization
IP addresses of application servers are mapped to a domain name
Virtual SCSI controller
Compatibility of consumer applications with the cloud infrastructure
User access management
User access management
C
Availability Management
To eliminate threats to storage infrastructure security
To report incidents to the cloud service provider
VMware Server
It enables users to configure pools and virtual resources
Time required for the server provider to restart operations
Disaster recovery assessment
Service deployment, backup management
Loose coupling
Configure a trunk port on the switch, then assign four VLAN IDs to the trunk port
Side channel attack
Guest operating system
Platform-as-a-Service
Performance management
Hardware assisted virtualization
Templates are used to create User States
Vendor-specified
F_port
Reduced operational expenditures (OPEX)
The replica device can be used even when the source device has failed
Share
EMC NetWorker
The pool should contain an equal number of FC, SATA, and Flash drives
User access management
By sending client traffic to each server that uses a driver to filter client traffic
Storage pool, storage type, policy
Backing up a LUN that is directly attached to a VM using Raw Device Mapping is very slow
A virtual N_port can function as multiple physical HBA ports
Performance issues, slow data backup
Network latency, client device performance
Resource Cataloging
IT management
Install encryption software on hypervisors
Performance report
Thin provisioning
The period of time that a business can tolerate an outage
Elimination of site failures
Capital expenditures
Raw Device Mapping
RAID 6
Automation
It links two virtual switches that carry tagged Ethernet frames
IP
Port grouping
It works only when network-based IDS is enabled
The physical machine memory size only
Data is available in the event of a disk drive failure
D
Service Catalog and Configuration Management
To ensure that the IT support staff performs efficiently
To identify the root cause of recurring incidents that exhibit common symptoms
VMware Workstation
It provides a consolidated view of existing virtual resources
Cost of transferring the ownership of infrastructure back to the client
Application hardening assessment
Infrastructure, management
Dynamic connection establishment
Activate VLAN trunking and tagging on the switch, then define four VLAN IDs on the switch
VM escape
Virtual Machine File System
IT-as-a-Service
Security management
Software assisted virtualization
User States are preserved as temporary files
Proprietary
G_port
Transparent Provider-to-Provider migrations
The source device is not required for the restore operation
Threshold
EMC SourceOne
Drives should be supplied by the same vendor
Platform management
By translating the domain name to the IP address of higher throughput servers
Storage pool, storage group, policy
Backing up data residing on a Virtual Machine File System is very slow
A virtual N_port can function as multiple physical NIC ports
Data corruption, slow data backup
Infrastructure security, application performance
Resource Distribution
Client devices
Perform regular hypervisor updates
Routine report
Block-level virtualization
The number of mission critical applications that a business must restore after an outage
Elimination of Virtual Machine File System failures
Infrastructure costs
Global namespace mapping
RAID 1+0
Optimization
It is a dedicated link for transferring traffic belonging to a single VLAN
Fibre Channel
NIC trunking
It cannot access logs written by privileged processes
The difference between the amount of physical machine memory and the virtual machine memory
Random reads and writes are allocated more efficiently
Differential replication
Unisphere
SnapView
Domain
Isolated
Source-based deduplication
Isilon
Object-based storage
Virtual machine monitor
On-demand self-service
Rapid elasticity
Community cloud
Application and platform software
Perform a hot P2V conversion in the cloud
Avoids physical NIC failure
Virtual machine file system
Creates a master copy of a powered-off VM
Maps the file metadata to the object ID
An online VM with a hardened guest OS
Application Streaming
Application requires a local installation
Average bandwidth
Trunking
Resources of the client system is consumed to run applications on the virtual desktop
Performance management
Configuration management database
VMware vCloud Director
Ensure the provider stores the data in a geographic location that the organization chooses
Optimum effort needed to migrate applications
Ensure the provider stores the data in a geographic location that the organization chooses
On-disk locking prevents simultaneous powering-on of the same VM
Reduce network bandwidth for storage and migration traffic
Changing the default configuration of a VM to achieve security
Enables multiple clients to be serviced by the same set of resources
Defines the policies of authentication, authorization, and auditing of an information system
Provides overall performance equivalent to the highest RPM drive
Nested
Network-level
Provides hardware resources to VMs
Hardware assisted virtualization technique
Provides direct access to the hardware resources
Contains a symbolic link that enables raw device Mapping
Block-level virtualization
IP addresses of the clients are mapped to the IP addresses of the application servers
Virtual machine monitor
Cost of the in-house infrastructure and using the cloud infrastructure
Element management
Element management
Analyzes the incident history and identifies the impending service failures
Specific access rights to data is given to authorized users
Pointer-based full volume virtual replication
Stores deduplicated data
N_port
Ethernet Forwarder
Virtual machine manager
Physical collection of storage drives over which data is uniformly distributed
VSAN ID must be unique for each trunk port
Hybrid
Directory services
Security
VMs running a different guest OS should always run on the same hypervisors
Total amount of physical storage allocated to the thin LUN from the thin pool
Reduced OPEX
Multi-step
Demilitarized zone
1050 GB
Virtual HBA
A process to ensure that only legitimate users have access to data
Compliance management
An attacker copies or moves a VM in an unauthorized manner
NULL
ANS
SET
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
3
3
3
1
4
2
1
4
4
3
4
1
2
3
1
1
1
1
1
1
1
1
1
1
4
4
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
1
3
1
2
1
2
1
4
2
4
1
1
2
3
3
1
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
1
1
1
3
1
2
1
2
1
1
3
3
1
2
3
1
4
1
2
3
4
NULL
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
NULL