A fibre Channel switch has eights ports and all ports must be operational 24 X However, a failure of Port occurs on a particular week as follows



Download 460.47 Kb.
Page6/6
Date02.06.2021
Size460.47 Kb.
#56808
1   2   3   4   5   6
Dell isolon associate
Dell isolon associate
3.

What does the "X" represent in the graphic?



 Reference

Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN

Training: Information Storage and Management: Module: Fibre Channel SAN, slide: Port Types in a Switched Fabric

6.

Based on the graphic, what does the "X" represent?



 Reference

Topic: Describe TCP/IP, IP SAN, iSCSI protocol, components, connectivity, addressing, discovery domains, and VLAN

Training: Information Storage and Management: Module: IP SAN, Slide: iSCSI Connectivity

8.

If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI?



 Reference

Topic: Describe the storage infrastructure management functions and processes

Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Configuration Management

9.

What is the fundamental unit of data transfer in an FC network?



 Reference

Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN

Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Structure and Organization of FC Data

11.

What will enable a company to plan for the frequency of their backups?



 Reference

Topic: Describe the information availability measurements and key fault tolerance techniques

Training: Information Storage and Management: Module: Introduction to Business Continuity, Slide: Key BC Concepts: RPO and RTO

12.

What is the advantage of adopting OpenID by an organization?



 Reference

Topic: Explain key security controls to protect the storage infrastructure

Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: OpenID

13.

When using the erasure coding technique in an object-based storage system, data is divided into 8 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration?



 Reference

Topic: Describe object-based storage device components, functions, operations, and unified storage architecture

Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide Object Protection: Erasure Coding

14.

What is an accurate statement about NAS?



 Reference

Topic: xplain the NAS components and architecture, NAS file sharing methods, and file-level virtualization and tiering

Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: What is NAS?

15.

What accurately describes an NDMP-based backup in a NAS environment?



 Reference

Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: NDMP-based Backup

16.

What provides users with self-service access to pre-defined storage services?



 Reference

Topic: Describe software-defined storage attributes, architecture, functions of the control plane, software-defined extensibility, and software-defined networking functionalities

Training: Information Storage and Management: Module: Software-Defined Storage (SDS) and Software-Defined Networking (SDN), Slide: Resource Provisioning

17.

A company's assets are continuously under attack. To deploy a security control mechanism to protect these assets, what should be considered?



 Reference

Topic: Describe the information security goals, terminologies, various security domains, and threats to a storage infrastructure

Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Security Concepts: Assets and Threats

19.

What is an accurate statement about a Converged Network Adapter (CNA)?



 Reference

Topic: Explain the components and connectivity of FCIP and FCoE

Training: Information Storage and Management: Module: IP SAN, Slide: What is CNA?

22.

What is an accurate statement about cache vaulting?



 Reference

Topic: Explain the components of block-based storage system, storage provisioning, and storage tiering mechanisms

Training: Information Storage and Management: Module: Block-based Storage Systems, Slide: Cache Data Protection

23.

What is an advantage of performing capacity monitoring in a storage infrastructure environment?



 Reference

Topic: Describe the storage infrastructure management functions and processes

Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Capacity Monitoring

28.

What is an advantage of deploying a storage area network (SAN) in a data center environment?



 Reference

Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN

Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Benefits of SAN

29.

Why do organizations prefer to adopt cloud-based archiving?



 Reference

Topic: Describe data deduplication and data archiving solutions architecture

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Cloud-based Archiving

30.

Which functionality is provided by the REST API in a software-defined storage environment?



 Reference

Topic: Describe software-defined storage attributes, architecture, functions of the control plane, software-defined extensibility, and software-defined networking functionalities

Training: Information Storage and Management: Module: Software-Defined Storage (SDS) and Software-Defined Networking (SDN), Slide: Software-Defined Storage Architecture

32.

Which security control allows a client to access protected resources from a resource server on behalf of a resource owner?



 Reference

Topic: Explain key security controls to protect the storage infrastructure

Training: Information Storage and Management: Module: Securing the Storage Infrastructure. Slide: OAuth

33.

What is the correct sequence of steps to perform a scale-up NAS I/O operation?



 Reference

Topic: Explain the NAS components and architecture, NAS file sharing methods, and file-level virtualization and tiering

Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: Scale-Up NAS I/O Operation

34.

What is a recommendation for a virtual machine (VM) snapshot?



 Reference

Topic: Describe replication uses, and replication and migration techniques

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Local Replication: VM Snapshot

35.

An organization is evaluating a cloud deployment solution that allows them to select various cloud service providers. They want to avoid vendor lock-in issues while optimizing performance and cost. Which recommended cloud deployment model will meet their requirements?



 Reference

Topic: Explain the cloud characteristics, cloud service models, and cloud deployment models

Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: Evolution of Hybrid Cloud - Multi-cloud

36.

Why is it important for organizations to accelerate their digital transformation efforts?



 Reference

Topic: Describe the data classification, elements of a data center, key characteristics of a data center, and key technologies driving digital transformation

Training: Information Storage and Management: Module: Introduction to Information Storage, Slide: Digital Transformation

37.

Which task is performed during authentication using Challenge Handshake Authentication Protocol (CHAP) control?



 Reference

Topic: Explain key security controls to protect the storage infrastructure

Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Challenge Handshake Authentication Protocol

39.

What is an example of an Availability Management task in storage infrastructure management?



 Reference

Topic: Describe the storage infrastructure management functions and processes

Training: Information Storage and Management: Module: Managing the Storage Infrastructure, Slide: Availability Management

40.

What happens when a write request to a valid page is received in a solid-state drive?



 Reference

Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures

Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: Solid-state Drive-Page State

42.

Why do organizations need a malware protection software?



 Reference

Topic: Explain key security controls to protect the storage infrastructure

Training: Information Storage and Management: Module: Securing the Storage Infrastructure, Slide: Malware Protection

43.

What accurately describes an image-based backup?



 Reference

Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Image-Based Backup

44.

A company is interested in an architecture that provides multitenancy. In addition, they want to lower CAPEX and OPEX for acquiring and managing an end-user computing infrastructure. Which recommended cloud service will meet these requirements?



 Reference

Topic: Describe a compute system, storage, connectivity in a data center, application, and options to build a modern data center

Training: Information Storage and Management: Module: Modern Data Center Infrastructure, Slide: What is Desktop Virtualization

45.

What is an accurate statement about unstructured data?



 Reference

Topic: Describe the data classification, elements of a data center, key characteristics of a data center, and key technologies driving digital transformation

Training: Information Storage and Management: Module: Introduction to Information Storage, Slide: What is information?

48.

In a backup operation, what is the correct sequence of steps after the backup server initiates the scheduled backup process?



 Reference

Topic: Explain backup granularity, architecture, backup targets, operations, and backup methods

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Backup Operation

50.

Which factors affect the recovery point objective (RPO) in a storage system-based asynchronous remote replication?



 Reference

Topic: Describe replication uses, and replication and migration techniques

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Remote Replication: Asynchronous

51.

What is the stripe size of a 5-disk RAID 5 group with a strip size of 32 KB?



 Reference

Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures

Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: RAID 5

52.

Why do organizations prefer to adopt Disaster Recovery as a Service (DRaaS)?



 Reference

Topic: Describe replication uses, and replication and migration techniques

Training: Information Storage and Management: Module: Data Protection Solutions: Replication, Backup, and Archive, Slide: Disaster Recovery as a Service (DRaaS)

53.

What is an advantage of sub-LUN tiering?



 Reference

Topic: Explain the components of block-based storage system, storage provisioning, and storage tiering mechanisms

Training: Information Storage and Management: Module: Block-based Storage Systems, Slide: LUN and FAST VP Tiering

54.

What happens when a disk fails in a RAID 5 array configured with a hot spare?



 Reference

Topic: Explain the components of an intelligent storage system, RAID, erasure coding, data access methods, scale-up and scale-out architectures

Training: Information Storage and Management: Module: Intelligent Storage Systems, Slide: RAID 5, Dynamic Disk Sparing

55.

What is an accurate statement about a TCP offload engine (TOE) NIC with a software iSCSI adapter?



 Reference

Topic: Describe TCP/IP, IP SAN, iSCSI protocol, components, connectivity, addressing, discovery domains, and VLAN

Training: Information Storage and Management: Module: IP SAN, Slide: Types of iSCSI Initiator

56.

What is an advantage of using a single-switch topology for a Fibre Channel (FC) SAN deployment?



 Reference

Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN

Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Single-switch Topology

57.

An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 2 occurs as follows:



  • Monday = 5 PM to 9 PM

  • Wednesday = 4 PM to 9 PM

  • Friday = 6 AM to 9 AM

  • Sunday = 9 AM to 1 PM

What is the MTBF of Port 2?

 Reference

Topic: Describe the information availability measurements and key fault tolerance techniques

Training: Information Storage and Management: Module: Introduction to Business Continuity, Slide: Exercise: MTBF and MTTR

59.

Which product delivers both Infrastructure as a Service and Platform as a Service to provide a consistent experience on-premise and in the public cloud?



 Reference

Topic: Explain the cloud characteristics, cloud service models, and cloud deployment models

Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: Concepts in Practices

60.

Which hypervisor component is responsible for assigning system resources to a virtual machine?



 Reference

Topic: Describe the building blocks of a modern data center

Training: Information Storage and Management: Module: Modern Data Center Infrastructure, Slide: What is Hypervisor?

61.

What is the function of MapReduce in big data analytics?



 Reference

Topic: Explain the key characteristics of big data, components of a big data analytics solution, Internet of Things, machine learning, and artificial intelligence

Training: Information Storage and Management: Module: Modern Technologies Driving Digital Transformation, Slide: MapReduce

62.

What is an accurate statement about Zoning?



 Reference

Topic: Describe Storage Area Network, FC architecture, FC topologies, zoning, and virtualization in FC SAN

Training: Information Storage and Management: Module: Fibre Channel SAN, Slide: Zoning

63.

Which object-based storage system feature provides self-configuring and self-healing capabilities to reduce complexity and downtime?



 Reference

Topic: Describe object-based storage device components, functions, operations, and unified storage architecture



Training: Information Storage and Management: Module: File-Based and Object-Based Storage System, Slide: Key Features of OSD


Download 460.47 Kb.

Share with your friends:
1   2   3   4   5   6




The database is protected by copyright ©ininet.org 2024
send message

    Main page