A fibre Channel switch has eights ports and all ports must be operational 24 X However, a failure of Port occurs on a particular week as follows



Download 460.47 Kb.
Page2/6
Date02.06.2021
Size460.47 Kb.
1   2   3   4   5   6
3.

What does the "X" represent in the graphic?



E_port

F_port

G_port

N_port

4.

What are the essential components of an object in an object-based storage system?



Object ID, metadata, file path, and LUN ID

File path, object ID, data, and file name

Data, user-defined attributes, metadata, and object ID

LUN ID, data, object ID, and user-defined attributes

5.

A company needs to transmit data over long distances between their disparate FC SANs at multiple geographic locations. Which recommended protocol should be adopted by the company?



iSCSI

FCIP

FCoE

FC

6.

Based on the graphic, what does the "X" represent?



FCoE port

FCIP port

iSCSI port

FC port

7.

What is an advantage of implementing email archiving?



Reduce redundant emails in a mailbox to facilitate faster recovery

Increase the mailbox space by moving old emails to archive storage

Provide high availability and continuous access to business emails

Reduce the cost of managing the email archiving server and storage

8.

If a configuration management database (CMDB) system contains different configuration items (CIs), what is considered a CI?



Customer feedback

Governance procedure

Security guideline

Username

9.

What is the fundamental unit of data transfer in an FC network?



Sequence

Exchange

Frame

Packet

10.

What is the time taken by the platter of a hard disk drive to position data under the read/write head?



Disk service time

Rotational latency

Seek time

Data transfer rate

11.

What will enable a company to plan for the frequency of their backups?



Recovery Time Objective

Mean Time Between Failure

Recovery Point Objective

Mean Time To Repair

12.

What is the advantage of adopting OpenID by an organization?



Eliminates a phishing attack while exchanging IDs across data centers

Provides authorization control that enables a client to access protected resources

Allows an individual to specify and perform an action on the storage system

Eliminates the need to deploy a separate authentication system

13.

When using the erasure coding technique in an object-based storage system, data is divided into 8 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration?



4

8

12

16

14.

What is an accurate statement about NAS?



Enables both UNIX and Microsoft Windows users to seamlessly share the same data

Enables NAS clients to seamlessly access files only over FC networks

Uses flat address space to enable a large number of files to be stored

Uses only a proprietary operating system and integrated hardware components

15.

What accurately describes an NDMP-based backup in a NAS environment?



Requires a direct connection between the NAS device and the application servers

Backup data is sent directly from a NAS device to the backup device

Requires less bandwidth to transfer data from the application server to the NAS device

Backup data is sent directly from the application server to the NAS backup device

16.

What provides users with self-service access to pre-defined storage services?



Service catalog

Control plane

Service discovery

Storage controller

17.

A company's assets are continuously under attack. To deploy a security control mechanism to protect these assets, what should be considered?



Minimize the work factor

Limited access to assets by unauthorized users

Easy access to assets by authorized users

Maximize the attack surface

18.

Which Dell EMC product provides scale-out NAS?



VxRail

Elastic Cloud Storage

CloudIQ

Isilon

19.

What is an accurate statement about a Converged Network Adapter (CNA)?



Physical adapter that provides the functionality of only a standard iSCSI HBA in a single device

Physical adapter that provides the functionality of both a standard NIC and an FC HBA in a single device

Physical adapter that provides the functionality of both a standard NIC and an iSCSI HBA in a single device

Physical adapter that provides the functionality of only a standard NIC in a single device

20.

If an attacker installs malware on an end-user's computer, which type of attack does this represent?



Denial-of-Service

Phishing

Keystroke logging

Man-in-the-middle

21.

What describes the anomaly-based detection technique?



Scans for a digital signature to authorize storage and network traffic

Scans, analyzes, and detects various unknown events

Scans email attachments to see if an attacker has changed the signature

Scans for known patterns to detect an intrusion in the network

22.

What is an accurate statement about cache vaulting?



Contents of cache is dumped to a set of physical storage drives during a power failure

Only writes to the cache are stored in a mirrored location during a power failure

Cache data in multiple locations is made coherent during a power failure

Seals the cache and rejects any further reads or writes during a power failure

23.

What is an advantage of performing capacity monitoring in a storage infrastructure environment?



Rapidly identifying component failures that may lead to storage unavailability

Proactively preventing service outages due to the lack of storage space

Efficiently tracking unauthorized access to the storage infrastructure elements

Automatically identifying configuration changes to the storage infrastructure elements

24.

The graphic represents an FCIP tunnel configuration that merges two Fibre Channel SANs at either end of the tunnel. Which types of ports do the labels "X" and "Y" represent on the FCIP gateway?



X = F_port and Y = E_port

X = VF_port and Y = E_port

X = EX_port and Y = VE_port

X = E_port and Y = VE_port

25.

In a Fibre Channel (FC) protocol stack, what is the function of the FC-1 layer?



Provide transmission words, primitive signals, and link initialization

Provide standards for physical interface, media, and transmission of bits

Provide fabric services, classes of service, and flow control

Provide application interfaces and map several protocols to FC layers

26.

Which system has a chassis with slots holding multiple servers and provides an integrated power supply, cooling, networking, and management functions?



Blade compute system

Rack-mounted compute system

Mainframe compute system

Tower compute system

27.

Which items are found in an iSCSI address?



IP address, TCP port number, and iSCSI name

IP address, FC port number, and iSCSI location

MAC address, FC port number, and iSCSI location

MAC address, TCP port number, and iSCSI name



28.

What is an advantage of deploying a storage area network (SAN) in a data center environment?



Allows a faster access rate by removing the complications of network setup

Provides a direct-attached connection between compute systems and storage

Enables data replication between storage systems across different locations

Reduces the network traffic between compute systems and consolidated storage

29.

Why do organizations prefer to adopt cloud-based archiving?



Avoid performing backup and replication for production data

Rapid development and deployment of cloud-based archiving applications in-house

Eliminate the capital and operational expenditure of data archiving

Support massive data growth and data retention requirements

30.

Which functionality is provided by the REST API in a software-defined storage environment?



Integration and access to external cloud storage services

Resource abstraction across storage systems to improve utilization

Creation of a single storage pool spanning across the underlying storage infrastructure

Automatic execution of tasks using pre-defined workflows



31.

During a write split operation in continuous data protection (CDP) replication, one of the I/Os is received by the local CDP appliance. Which component received the other I/O?



Remote CDP appliance

Remote replica volume

Production volume

Local replica volume



32.

Which security control allows a client to access protected resources from a resource server on behalf of a resource owner?



Zoning

OAuth

LUN Masking

OpenID



33.

What is the correct sequence of steps to perform a scale-up NAS I/O operation?






Download 460.47 Kb.

Share with your friends:
1   2   3   4   5   6




The database is protected by copyright ©ininet.org 2020
send message

    Main page