Term
When implementing security in a storage area network, which two are SNIA SSIF best pratices.?
(b)Secure the management interface to the SAN
(c) Define zones containing the smallest possible number of components and use the different zone sets for different system loads.
(d)Define zones containing the largest possiable number of components, and use the same zone sets for different system loads.
(a)Use a single LAN security tool for continuity. |
|
Definition
|
|
Term
Which three criteria are primary considerations when determining the need for the SAN deployment.
(a) Storage Consolidation
(b) Ensuring High Availability
(c) Reducing Server CPU Cycles
(d)Enabling cross platform LAN file access
(e) Reducing Network Congestion during backups |
|
Definition
|
|
Term
You have a SAN with four servers connected to and edge switch in a core edge configuration. Each server has an average requirment of 40mb/s. There is currentyly a single Gb ISL between edge switch and the core switch.
(A)to provide a redundant path.
(b)To balance the load and avoid congestion in the ISL.
(c)As a dedicated control path between switches for FSPF updates.
(d)As a dedicated high priority management path for selected servers.
|
|
Definition
|
|
Term
A SAN architect is asked to implement an infrastruce for production and test enviroment using Fibre Channel devise. Additionally, the customer would like Fibre Channel devise for production and the devise for test to communicate over the IP network to remote hosts, but not to each other. (A) FCIP (b)iFCP (C)iSCSI (d)SCSI-FCP |
|
Definition
|
|
Term
Ecact Questions.com in the medical services industry is having preformance issues with the database that maintance patient records. Recently the hospital expanded the SAN and added the fibre cahnnel directors in core topology which included moving the server from the core to the edge. After determining the TCP/IP network is functioning correctly with no over utilization of network resources, the systmes administrator is attempting to determine what the possiable causes there are for the degradation.
a. Link over subscription
b.Spindle latency on internal boot disk
c.Contention between the PC Packets and the SCSI-3 encoded TCP/IP packets on the FCIP link.
d.Over scription of the ISL's between the edge Fibre Channel switches and the TCP/IP switches. |
|
Definition
|
|
Term
When planning a deploy a deploy a Fibre Channel infratructure where data rates expected to exceed 25 mb/ sec what is the preferred medium for the local cabling requirments up to 500 meters?
A. 9/125 single-mode optical cables..
B.50/125 multi-mode optical cables.
C. 62.5/125 multi-mode copper cables.
d.62.5/125 multi-mode copper cables. |
|
Definition
|
|
Term
You are troubleshooting a communication problem between a host and a storage array. Both nodes are seen by the switch. The host can talk to the array port but has not assigned to tarket id to it. What is the msot liklely current scenario?
A. There have been no logins. b. Both nodes have completed fabric logins but no port or process logins c.Both nodes have completed Fabric and port Logins but no process login d.both nodes have completed fabric,port and process login, there is some other problem |
|
Definition
|
|
Term
ExactQuestions.com wants to diploy a disaster recovery site 30 km away from the primry data center using a Fibre Channel Link. A.Cable B.Link Control C.Adequate buffer credits D. Fibre Channel class of service |
|
Definition
|
|
Term
An administrator is creating a snapshot to to backup a volume to tape. The snapshot will only be used for the backup.
A.COW snapshot mounted to a Tutor Server B. Split mirror snapshoot mounted to a tutor server. C. COW snapshot mounted to the application server. D. Split mirror snapshot mounted to the application server. |
|
Definition
A. COW snapshot mounted to a Tutor Server |
|
|
Term
What is a disadvantage of over-scription
A.Increaded host latency B.Increased cost of ISL links C. Servers may be throttled down to link speed. D.Decrease number of hosts that can use the ISL |
|
Definition
A. Increaded host latency |
|
|
Term
ExactQuestions.com is replicating data to a remote data center. A host is needed at the remote data center to provide application failover.
(A) Implement strech cluster.
(B) Replicate the boot,and all application disks.
C.Replicate the boot, swap and all applications disks
D.Implement strech clustering while replicating the local boot disk.
|
|
Definition
(A) Implement strech cluster. (B) Replicate the boot,and all application disks. |
|
|
Term
When adding a new Fibre Cahnnel switrch to a fabric, which step should youtake before connection to maintain security of the production network?
A.Disable all ports
B.Change default password
C. Disable E_PORT functioality
D.Upgrade firmware using an isolated fabric. |
|
Definition
B.Change default password |
|
|
Term
Exact?.com needs to implement two fabric SANS with high preformance fault-tolerant disk access located 1500km from its data center . Which SAN component should an architect implement.
A. NAS filters
B.Fibre Channel switches
C.Fibre Channel to iSCSI bridges
D.Fibre Channe; WAN Connectivity. |
|
Definition
|
|
Term
A fibre switch fails A replacement switch has been delieved. Before plugging the replacement switch into the SAN which two actions should be taken?
A. Delete the fabric records of the old switch.
B.Add the new switch to the current zone configuration. C.Clear all zoning information on the replacement switch.
D.Change the domain id of the replacement switch to the domain id of the old switch. |
|
Definition
|
|
Term
Which HBA parameter can be configured using HBA configuration tool?
A. zoning
B.RA_TOV
C.BC_TOV
D.Register for state change
|
|
Definition
|
|
Term
An intruder has control of a server on the company SAN that uses software zoning. The intruder has installed a modified HBA driver. Which statement is true?
A. the intruder can access all storage ports in the SAN.
B.The intruder can access all storage and server ports in the SAN.
C.The intruder can access all storage and server ports in the san.
D. the intruder can access only the ports to which the host is zoned. |
|
Definition
|
|
Term
A server is experiencing perforamance problems. An application is being migrated to a new server. In controlled enviroment, how would you migrate the application with the least amount of downtime?
A. Shutdown the application, copy the data to the new server over the network, start the application on the new server.
B.Shutdonw the application, change the zoning and LUNk masking information, start the application on the new server.
C. Create a local relica, change zoning and LUN masking information, stop the application, start on the new server.
D.
Apply the zoning and LUN masking information for the new server, stop the application start the appication on the new server, remove the zoning and LUN masking information on the old server. |
|
Definition
|
|
Term
What is the limiting factor when determining how many hosts can be attached to the storage port of the storage array?
A. fan-in
B.FSPF
C.fan-out
D. hop count |
|
Definition
|
|
Term
Exact?.com is replicating data using FCIP between two remote SANS Before adding the FCIP SAN extention there are two fabrics in each location, four total. How many total fabrics will there be after extending the SAN
A.1
B.2
C.3
D.4 |
|
Definition
|
|
Term
Exact?.com is synchronously replicating data between sites that are 100km apart. Which technolgoy lets them achieve this goal with minimal impact to performance?
A. iSCSI B.iFCP C.FCIP D.FCP over DWDM |
|
Definition
|
|
Term
Exact?.com has determined a primary and secondary threat radius. The primary threat is 100km and the secondary thret radius is 500km. The company legally needs an exact copy of their data replicated to a remote site. They also want to replicate outside of the secondary threat radius. What should they do?
A. Synchronously replicate their data to a facility 500 km away.
B. Asynchronously replicate their data to a facility 500km away.
C. Asynchronously replicate their data to a facility 100km away and synchronously replicate their data to a secong facility 500 km away.
D.Synchronously replicate their data to a facility a 100km away and asynchronously replicate their data to a secod facility 500km away. |
|
Definition
|
|
Term
Which SAN topology offers scalability with the lowest associated cost?
A. Ring
B. Mesh
C. Cascade
D.Core-Edge
|
|
Definition
|
|
Term
When planning for a global storage area network, which 3 should be taken into consideration?
(A) Network latency (B)Distance Latency (C)Equipment Latency (D). SCSI transmission latency (E) Repeater amperage latency |
|
Definition
|
|
Term
A DBA has created a logical volume using disks from three differnt arrays. The data from each array is synchronously replicated over a fibre channel link to one of the three arrays in a remote location. There is a rolling diaster which caused the remote links between the arrays to fail at different times. The DBA is trying to start the volume at the remote site. How must the volume be started?
A.It cannot be started, it is corrupt.
B.Just start the volume,it is auto correcting.
C.The volume must be rolled back in time to the first link failure.
D.The disk from each array can be used seperately but not together. |
|
Definition
|
|
Term
Which fabric capacity management process should be reviewed annually for effectiveness and effciency?
A.Fabric technology implemenatation is aligned with business requirements (time,cost and functionality.)
B. Validate backup and recovery tests and their impact on fabric infrastructure against recover time objectives.
C. Check that the actual expenditures on fabric services and their departmental attribution match the predicted expenditures.
D.Frequency of fabric failures, including the number of switch, HBA, link, cable and driver failures and the number of users impacted. |
|
Definition
|
|
Term
Exact?.com is installing a Fibre Channel Storage area network for a small test and developoment lab. Thelab contains two small windows servers and a single ten disk storage subsystem. The customer desired to deploy a fully redundant SAN for this enviroment with minimal cost. What is necassary to meet the customers requirments for full redundancy of the SAN?
A. One director class fabric switch
B.Two departmental fabric switches.
C. Ethernet connectivity to each component in the SAN.
D. At least one HBA in each server being attached to the SAN. |
|
Definition
|
|
Term
Exact?.com switch command line indicates thaat the status of port 4 is isolated. What is the problem?
A.The device connected to port 4 is in the process of initialization.
B. The domain ID does not match the one on the other end of the link.
C. R_A_TOV setting does not match the one on the other end of the link.
D. There is a long wave GBIC/SPF in the switch at port 4 and the fiber cabling to the connected server is incompatiable.
|
|
Definition
|
|
Term
What are two advantages of over-subscriptions?A. Saves on ISL links.
B. Decrease host I/O latency
C. Increase individual host throughput.
D. Increases the number of host that can use the ISL. |
|
Definition
|
|
Term
A 4-way cluster is attached to two fabrics. Each member has 2 HBAs connected to each fabric. Each fabric has to array connection. SCSI Queue Depth for HBAs= 8 and Storage Devices=256 per port. Each cluster member is a primary for each application. All LUNs appear on all storage ports with workload equally distributed accross all. Each hosthas 2 dedicated HBAs for tape that can each see 4 independant LTO II tape drives. all files are large and involve sequential I/O. Performance reporting shows a large read pending at the host during multi-threded backup. Waht is the maxium value you should set for SCSI Queue Depth?
A.16
B.32
C.64
D.128 |
|
Definition
|
|
Term
What are two advantages of WWN(soft) zoning over port (hard zoning?
A. Switch port can be grouped together to form a zone.
(B) A device can be moved to another switch in the same Fabric with reconfiguring zoning.
(C)A devise can be moved to another port on a switch following port failure without reconfiguring zoning
D. A Fibre Channel tape drive can be replaced with another unit that has a different WWN without reconfiguring zoning.
|
|
Definition
|
|
Term
Administrators must have swtich management access outside of the data center. Which 2 will help your properly configure security?
(A) Use SSL and/or SSH
B. Connect to the switches through the SAN
C. Authenticated access through a firewall or secure router.
D.Have only one user name/password for all the adminstrators. |
|
Definition
|
|
Term
Exact?.com is migrating data to an array from a new storage vendor. The application needs to be available 99.99% of the time during the migration. Which 2 should the customer do?
A. use device based block virtualization to migrate the data between the arrays using a array -based remote replication software
B.Use network-based block virtualization to migrate the data between the arrays using a meta data server.
C Use host-based block virtualization to migrate the data between the arrays using a logical volume manager.
D. Use file.record layer virtualization to migrate the data between the arrys using clustering software. |
|
Definition
|
|
Term
Infrastructure parameters include a small core edge design with all the peripherals (disk and tape) located in the core and all hosts connected to edge switches. Each host includes 2 HBAs in a fabric A and B respectively, with all disks visable on both fabrics and tape devises divded between fabrics. The tape devices are single initiatoe zoned to LTO II tape drives. You are recovering a 200 GB journaling file system, 70% utilized; spread over 8 mirrored spindles using a 32k stripe elelment. During recovery of one host, the other hosts on the same edge report SCSI errors. What is the most likly cause? A. File Size B. Stripe Width C. ISL overscriptions D. FC tape blocking factor |
|
Definition
|
|
Term
A production cluster is attached to redundant disk fabric and tape fabric. Each fabric is contained with a single switch. Each cluster member has access to 12 TBs of Raid 1 production storage and 12 TBs of Raid 0 local replica access through 8 HBSa single indicator zoned to 16 storage ports to one storage array. The tape fabric includes (1) connection to each server and direct connections to 10 LTO II tape drives. The standby cluster member performs multi-threaded backups using the local replica. all HBAs and ports are 200 MB. If the recovery time is equal to backup time, where is the bottleneck?
A. Tape HBA
B. Disk HBAs
C. Tape Drives
D. Array contention |
|
Definition
|
|
Term
Exact?.com with 8 SAN attached hosts has a storage array with only 10 disk drives. The customer wishes to protect their data by using Raid 1 protection scheme. Each server has a need to see three seperate volumes for their final configuration. What must be configured on the array to meet their storage allocation needs?
A. Multiple scsi targets to each mirror volume
B. Seperate logical units for each server volume.
C. Seperate virtual paths for each mirror volume.
D. Multiple COW smapshots for each server volume. |
|
Definition
|
|
Term
A Solaris administrator responsible for backups is informed that the restore of data from backup appeared to be corrupt. The backups had appeared successful, but the database adminstrator claims the data was restored is invaild. Where can the admistrator check to see if errors occurred during the backup or recovery process?
A. /etc/syslog B. event viewer C. /var.adm/messages D. /usr/sbin/errorlog.log |
|
Definition
|
|
Term
Exact?.com desired to implement several servers with the same operating system through a SAN to a storage array configured with a single LAN. What is required for all servers to have concurrent access to the LUN?
A. NFS software
B. SAN/global file system
C.A switch with name zoning capabilities
D. Removal of the switch and connecting the servers directly to the RAID. |
|
Definition
|
|
Term
The SAN Managment application server crashed and your SAN is having throughput problems. Which protocol tool can you implement to collect information about attached SAN device throughput?
A. ICMP
B. POP3
C. SNMP
D.EDTOV |
|
Definition
|
|
Term
Where would you find the N_port in a fabric
A. on a inter-switch link B. On the fibre channel HBA C. On the fibre channel switch D. On the fibre channel loop device |
|
Definition
|
|
Term
Exact?.com has a SAN where servers and storage are distrbuted throughtout the enterprise. Testking.com has implemented a SAN soution ising a ring topology with 2 ISLs between each switch. When compared to a mess topolgy, which 2 options are valid for a ring topolgy?
(A) Lower availabilty
(B). Higher Availability
(C.) Decrease I/O latency
(D) Increased I/O latency |
|
Definition
|
|
Term
Which process occurs during a fabric merge?
A. Loop login communications
B. Subordinate switch negotiation
C. Fabric shortest path negotiation
D. iSNS name server communication |
|
Definition
|
|
Term
Which 2 process occur during a fabric merge?
A. ISL trunking
(B) Zone Set passing
(C) Name server distribution
(D) Subordinate switch negotiation
|
|
Definition
|
|
Term
Exact?.com has a demanding application which currently uses 2 HBAs. They will acess the same LUNs on the same storage ports but they will add 4 HBAs to the host. This increased the fain-in-ratio- of the host. What are two results of this charge?
A. increase utilization of HBA
B. Decreased utilization of HBA
C. Increase utilization of storage ports
D. Decrease utilization of storage ports
|
|
Definition
Decreased utilization of HBA (2) Increase utilization of storage ports |
|
|
Term
You have an existing RAID system with 16 drives. The existing system was used to provide volumes to 6 windows systems on 2-gigabit links. You decide to add another 16 drive tray to double the number of your raw hard drives in order to support five new UNIX servers. Theaverage server througput os 20mb/sec. The RAID head is dual ported and configured active-passive . What may occur?
A. The zoning on the switch will control the traffic flow to the raid.
B.The added demands on the RAID system will saturate the active RAID port.
C.The RAID system will notice the extra requests and go active-active to support the load.
D. The windows system will recieve precedence as they were registered first on the RAID. |
|
Definition
|
|
Term
Given the limitation of short wave fiber, which statement is true?
A. Short wave fiber can be used for MAN connections
B. Short wave fiber can be used for WAN connections
C. Short wave fiber connections are good up to 10km.
D.Short Wave fiber connections are used for localized SANS. |
|
Definition
|
|
Term
Exact?.com is merging remote SANs 200km apart. Cost is a major consideration, not performance. What 2 solutions best fit their needs?
(A)FCIP
B. iSCSI
(C)iFCP
D. FCP over DWDM/SONET |
|
Definition
|
|
Term
You have a 64-bit PCI-X 100 MHz server. The burst rate of the PCI bus on this server ris 768 MB/s Waht is the minimum number of single ported 2-gigabit HBAs required to get the maxium throughput? A. three B. four C. Five D. six |
|
Definition
|
|
Term
A database is created in one volume group. The data files, and journaling logs areall on the same volume group. The database adminstrator has created a remote replicate of the volume group over a 100km FCP link. The date base has been recovered, tested and shutdown on a remote host. What must the DBA do before restoring the database?
A. Do nothing
B.Copy the journaling logs to a safe location, so they can be used to recover the database.
C. Copy the orginal meta data files to a safe location , so they can be used to recover the database.
D. Copy the orginal journaling logs and media files to a safe location, so they can be used to recover the database. |
|
Definition
|
|
Term
Exact?.com implements strech clustering in conjunction with a remote storage replication. What is the process to failover the application to the remote site?
A. simple failover B. Stop services on local host, split remote disks, failover applications, failover cluster allas C. stop services on local host, failover application, split remote disks, failover cluster allas D. stop services on local hosts, failover cluster alia, failover application, split remote disks. |
|
Definition
|
|
Term
What is the mininum length of fiber to use in fabric?
A. 1 meter cable length
B. 2 meter cable length
C. 4 meter cable length
D. 10 meter cable legnth
|
|
Definition
|
|
Term
A storage adminstrator creates a COW snapshot. Which 2 are true? A. it is avaiable immediately.
B. It is able to be mounted to an alternative host.
C. it contains a full copy of the production volume
D. it offloads snapshots I/O from the production volume |
|
Definition
|
|
Term
What HBA parameter can be configured using HBA configuration tool?
A. zoning B. RA_TOV C. LUN UID D .Fiber Channel payload size |
|
Definition
|
|
Term
Exact?.com is designing a plan to replicate data between arrays that are in seperate remote fabric. They do not want to merg the fabrics but to simply connect the two arrays using existing Fiber Channel ports. What is the most cost effective solution?
A. FCIP
B. IFCP
C.ISCSI
D. FCP over DWSM/SONET |
|
Definition
|
|
Term
Two servers are added to a SAN with redundant fabrics. Zoning information needs to be changes. How can you safely change the zoing information?
A. Saving the current zoning configuration to disk, modify it and apply to both fabrics.
B.Modify the zoning configuration on one fabric, test it and modify the zoning information on the second fabric.
C. Modify the zoning configuration on one fabric, test it, copy the zoning information to the second fabric and enable it.
D. Both fabrics msut be changed at the same time, modify the zone configurations and enable them within 10 seconds of each other. |
|
Definition
|
|
Term
A Solaris adminstrator responiable for backups is informed tht the restore of data from the backup appeared to be corrupt. The backups had appeared successful, but the database adminstrator claims the data that was restored is invalid. Where can the admistrator check to see if errors occured during the backup or recovery process.
A. /etc/syslog
B.event viewer
C./var/adm/messages
D. /usr/sbin/errorlog.log |
|
Definition
|
|
Term
You are setting up a remote replication over the SAN for diaster recovery. Which 2 should you consider?
A. Class of service
B.Expected replication traffic
C. Location of princpal switch
D.Distance between locations
|
|
Definition
|
|
Term
What is the limiting factors when determing how many storage arrays can be attached to a single host?
A. fan-in
B. FSPF
C. Fan-out
D. Hop Count
|
|
Definition
|
|
Term
A cluster is experiencing perforamnce problems. An application runnning in parallel mode is being migrated to a new cluster member. The cluster member is added, the application is installed, zoning and LUN masking changes are made, and the application is brought up on the new cluster member. Waht is the minimum amount of down-time possiable?
A. there is no down time'
B. the time takes stop and start the application
C. the time it takes to reboot the new cluster member
D. the time it takes to stop, start and recover the application |
|
Definition
|
|
Term
Which 2 are best pratices when implementing security in a storage area network?
A.. Use seperate credential for infrastructure configuration functions.
B. Use the sames credentials for infastructure configuration functions.
C. Use rotating user IDS for storage network maintances access, and enforce the use of strong passwords either by policy or by configurations.
D.Use dedicated user IDs for storage network maintaince access, and enforce the use of strong passwords either by policy or by configuration |
|
Definition
|
|
Term
Exact?.com has a demanding application which currently uses two HBAs. They will access the same LUNs on the same storage ports but they will add 4 HBAs to the host. This increases the fan-in ratio of the host. what are 2 results of this change? A. increase utilization of HBA
B decrease utilization of HBA
C Increase utilization of storage ports
D. Decrease utilization of storage ports |
|
Definition
|
|
Term
a 4 way cluster is attached to 2 fabrics. Each member has 2 HBAs connected to each fabric. Each fabric has 2 array connections. SCSI Queue Depth for HBAs=8 and Storage devices=256. Each cluster member is primary for 1 application. All LUNs appear on all storage ports with workload equally distrubuted accross all. Each host has 2 dedicated HBAs for tape that can each see 4 independant LTO II tape drives. All files are large and involve sequential I/O. Performance reporting shows a large read pending at the host during mutlti-threaded backup. What is the maxium value you should set for SCSI Queue Depth? |
|
Definition
|
|
Term
Exact?.com has deployed redundant switched fabrics in an enviroment which also includes non-HA, single-attached test servers. A new project requires additonal connectivity for new HA servers to be placed into production. There are not enough ports available on one of the existing switches to complete HA deployment. Which option would allow for the additon of the new hosts while maintaining a redundant infrastructure? |
|
Definition
Add a new switch to each redundant fabric. |
|
|
Term
Exact?.com switch command line indicates that the status of port 4 is isolated. What is the problem?
A. the devise connected to port 4 is in the process of initialization.
B. the domain id does not match the one on the other end of the link.
C.R_ATOV setting does not match the one on the other end of the link.
D. There is a long wave GBIC/SPF in the switch at port 4 and the fiber cabling to the connected server is incompatiable.
|
|
Definition
|
|
Term
Exact?.com is using FCIP to link the 2 remote SANS. Waht are the 2 benefits of using FCIP as opposed to sending FCP data over DWSM/Sonet link?
A. cost
B. performance
C. compatiable with ISCSI
D. using existing infrastructure
|
|
Definition
|
|
Term
Exact?.com needs to replicate their data synchronously to a remote site 100km away with the least performance impact to the prodution server. What are the 2 solutions?
A. use ISCSI
B. use direct fiber connection
C. use a fiber channel extender over IP to replicate the data.
D.use a fiber channel extender with DWDM or Sonet over DWDM to replicate the data. |
|
Definition
|
|
Term
You have a SAN with 20 servers connected to an edge switch in a core edge configuration. Each server has an average requirement of 20/mbs. There are currently 4 2GBs ISLs between each edge switch and the core switch.Understanding over subscription advantages and disadvantages and being conservative on port usage how many ISLs should there be?
A. 1
B. 2
C.4
D.6
|
|
Definition
|
|
Term
You are a consultant to a six partner accounting firm. You are isntalling a small SAN for them. which statement is true?
A. a firm this small doesnt need zoning
B. software zoning is the easiest to manage
C. they need the increased security of hardware zoning
D. there is a lower probabilty of application downtime with hardware zoning. |
|
Definition
|
|
Term
You are looking at a Fiber Channel trace log. The Class 2 communication seesion between the imitator and target os taking much longer than you would have expected. You suspect taht there is a buffer credit starvation occuring. Which login communication seesion would you analize in the trce for the number of buffer credits allocated between ports?
A. port login B. loop login C. fabric login D. process login |
|
Definition
|
|
Term
Which 2 should be taken in consideration when planning a storage area network? A. encryption B. redundancy C. performance D. arbitrated loop latency |
|
Definition
|
|
Term
A database is replicated to a remote site 500km away. The DBA wants to repicate the database with no impact on the production volume and minimal WAN bandwidth. The data files, meta data file, and journaling logs on all the differnet volume groups. How should the database be replicated?
A. Synchronously replicate the data, meta data and journaling volume
B. Asynchronously replicate the data, meta data and journaling log volumes .
C.Use a database standby server at the remote site, replicate the journaling log volume, periodically create local replicas at the remote site of the journaling log volume, apply logs.
D.Use a database standby server at the remote site and replaced the data and journaling logs, volumes, periodically create local replicas at the remote site of the jounalling log and meta data volumes, apply meta data and logs.
|
|
Definition
|
|
Term
What are 2 advantages of WWN zoning?
A. switch ports can be grouped together to form a zone
B. Devices can be moved to another port on a switch in the same Fabric with reconfiguring zoning.
C. a device can be moved to another part on a switch following port failure with reconfiguring zoning.
D. A fiber channel tape drive can be replaced with another until tht has a different WWN without reconfiguring zoning. |
|
Definition
|
|
Term
What is the distance considerations between long-wave and short wave fiber?
A. Long wave fiber can be used for MAN connections.
B. Short wave fiber can be used for MAN connections
C. Short wave fiber connections are good for up to 10km
D. Long wave fiber connections re used for localized SANs.
|
|
Definition
|
|
Term
Which 3 processes occur during a fabric merge?
A. ISL trunking
B.Zoning set passing
C Principle switch negotiation
D. Name server distribution
E. Subordinate switch negotiation
|
|
Definition
|
|
Term
University IT provides shared Fiber Channel storage services. Disks, tapes and fbric core are located in the capmus datacenter. Each colleg and dept provides their own systems and staff.The sytems are co-located in the campus datacenter under controlled physical access. Central IT provides fabric, storage and backup adminstation. Which risk strategy is important in this Fiber Channel Infrastructure?
A. secure shell
B. link encryption
C. port authenticiation
D switch authentication |
|
Definition
|
|
Term
you have a SAN with core-edge configuration and two core swtiches. Each edge switch has an ISL to each core switch. The storage array has 2 ports and a single link to each core switch. There is a single ISL betweeen each core switch. Waht is the result if the ISL between the core switch is removed?
A. it remains a single fabric
B. the fabric segments into 2
C. one of the storage ports is no long available
D . one of the core switches is disconnected from the fabric
|
|
Definition
|
|
Term
Exact?.com hs reconfigured new storageon their array. Which 3 steps must they take to see the virtual disk?
A rescan the SCSI bus.
B. enable array re-scanning
C provide array LUN masking.
D zone the host to the array port
E. increase the HBA time out value |
|
Definition
|
|
Term
which 3 criteria are primary considerations when deteermining the need for a SAN deployment?
A storage consolidation.
B. Ensuring high Avaiabilty
.
C Reducing server cpu cycyles
D. enabling cross platform LAN files access
E. Reducing network congestion during backups. |
|
Definition
|
|
Term
the SAN is having connection issues. Your assesment has shown that you need to improve SAN availabilty. Which 3 implementation options of a highly avaiable fiber channel SAN should you stess to management to achieve your goals and get your project approved?
A. avoid single point of failure
B.implement redundant fabrics
C. ensure that multiple path to devices are avaiable.
D. implement higher sppeed ISL links |
|
Definition
|
|
Term
Exact?.com is replicating data using IFCP between 2 remote SANS Before adding IFCP SAN extension there were 2 fabrics in each location, four total. How many total fabrics will there be after extending the SAN? A. 1 B. 2 C.4 D.8 |
|
Definition
|
|
Term
What are two advantages of WWN(soft) zoning over port(hard) zoning?
A. switch ports can be grouped together to form a zone
B. A device can be moved to another switch in the same fabric without reconfiguring zoning.
C. A device can be moved to another port on a switch following port failure without reconfiguring zoning
D. A fiber channel type can be replaced with another until that has a different WWN without reconfiguring zoning. |
|
Definition
|
|
Term
During quarter end batch processing at a large retail company it is noted that performance of the data base applications drops significantly. The application runs on a server that is dual attached to SAN infrastructure with Multi-pathing software to ensure high availabilty as well as provide load -balancing. The system administrator needs to determine if the problem resides within the server or within the SAN components.
A. Check the event and alarm log.
B.Check the virtual path and adapters.
C.Check the integrity of the zoning
D.Check the host subsection of the storage array event logs
|
|
Definition
|
|
Term
Exact?.com needs to implement 2 seperate fabrics with Fiber Channel devises communicating across the IP network.Which protocol should the architect utilize?
A. FCIP
B. IFCP
C. ISCSI
D. SCSI-FCP |
|
Definition
|
|
Term
You have a 64-bit PCI-X 133 MHZ server. The burst rate of a 133MHZ bus is 1064 mbs. What is the mininum number of single ported 2 gigabit HBAs required to get the maimum throughput?
A. two
B. three
C. six
D. four |
|
Definition
|
|
Term
Exact?.com hs been expanding its SAN physically throughout its campus headquarters. Distributed SErvers throughout the enterpros access storage nodes that are also distributed. What are the 2 results?
A. increase data access.
B. decrease in data access
C. increase in SAN I/O latency
D. decrease in SAN I/O latency |
|
Definition
|
|
Term
Exact?.com needs to implement 2 FAbric SANs with high performance fault-tolerant disk access located 1500 km from its data center. Which SAN component should an architect implement?
A. NAS filter
B. Fiber Channel switches
C. Fiber Channel to ISCSI bridges
D. Fiber Channel WAN connectivity |
|
Definition
|
|
Term
A host is remotely replicating data over a Fiber Channel link using a host based logical volume manager (LVM). the host LVM is mirroring data between lcoal array using SCSI-FCP nd a remote array using FCIP. The host is having read performance problems. How should the LVM be configured?
A. set volume read policy to round robin.
B.Set volume write policy to only write to local mirror C.Set volume read policy to only read from the local mirror.
D. set volume read policy to only read from the remote mirror. |
|
Definition
|
|
Term
What are two advantages to a fabric designed with over-subscription?
A. allows you to seperate from storage
B. allows clustered servers in the same locality
C. enables you to reduce the number of ISL links
D. allows you to aggregate servers across the same ISL that are not running at link capacity.
|
|
Definition
|
|
Term
A hacker has comprimised the fabric by hijacking an administrative session,removing zones from the active zone set. What 3 countermeasures should you take to reduce this risk?
A. diable Telenet and enable secure shell
B enable port authentication using DH-CHAP.
C Integrate authentication and authorization.
D. Redirect logging to syslog of protected system.
E. enable storage access controlls and link encryption.
|
|
Definition
|
|
Term
Where would youfind the F_ port in a fabric?
A. on an inter-switch link
B. on the fiber channel HBA
C on the fiber channel switch
D. on the fiber channel storage subsystem |
|
Definition
|
|
Term
What is the first step when securing faber switch management?
A. Cable the switches only to each other
B. Connect to the switches through the SAN
C. Put the switches on a seperate Management LAN
D. Put the switches on the company LAN and use SSL to communicate wit the switches. |
|
Definition
|
|
Term
Testking.com has a demanding application which currently use two hbas. They will access the came luns on the same storage ports but they will add four HBSa to the host. This increased the fan-in ratio of the host. A- Increase utilization of HBA B-Decrease utilization of HBA C-Increase utilization of storage ports D- Decrease utilization of stortage ports |
|
Definition
|
|
Term
What is a disadvantage of over- subscriptions . A. Increade host latency B Increase cost of ISL links C Servers may be throttled down to link speed. D Decreases number of hosts that can use the ISL |
|
Definition
|
|
Term
You have a 64-bit PCI-X 133 MHZ server. The burst rate of a 133 MHZ bus is 1064MB/s A. 2 B.3 C.6 D.4 |
|
Definition
|
|
Term
An adminstrator is creating a snapshot to snapshot to backup a volume to tape. The snapshot will only be used for the backup A. COW snapshot mounted to a tutor server B. Split mirrioe snapshot mounted to a tutor server. C. COW snapshot mounted to the application server. D. Split mirror snapshot mounted to the application aerver. |
|
Definition
|
|
Term
Which fabric capacity managemenrt process should be reviewed annualy for effectiveness and efficency. A. Fabric Technolgy implemenatation is aligned with business requirments (time,cost, functionality ) B. Validate backup and recovery test and theei impact on fabric infrastructure against recover time objects. C. Check that the actual expenditiures on the fabric services and their departmental attribution match the predicted expenditures. D. Fregency of fabric failures, including the number of switch, HBAS link, cable and driver failures and the numbers of users impacted. |
|
Definition
|
|
Term
Where would you find the N_Port in a fabric. A on an inter-switch link B. On the fibre channel HBA C. On the fibre channel switch D.On the fibre channel loop device |
|
Definition
|
|
Term
Testking.com is merging remote SANS 200km apart COst is a major consideration , not performance. A. FCIP B. iscsi C.iFCP D. FCP over DWDM/Sonet |
|
Definition
|
|
Term
Testking.com has been expanding it san phsically throughout its campus headquarters. Distrubiuted servers throughout the enterprise access storage nodes that are also distributed . What are the 2 results. A.Increase in data access B. decrease in data access C.increase in SAN I/O latency D. decrease in SAN I/O latency |
|
Definition
|
|
Term
Adminstrators must have switch management access outside of the the data center. A. USE SSL and/or SSH B. Connect to the switches through the SAN. C.Authenicated access through a firewall or secure router. D. Have only one user name/password for for all the adminstrators. |
|
Definition
|
|
Term
When implementating security in a storage area network, which two are are SNAI SSIF best pratices? A. use a single lan security tool for continuity B> Secure management interface to the SAN C.Define zones containing the largest possiable number of components, and use the same zone sets for different systme loads. D. Define zones containing the smallet number of components, and use different zoe sets for different system loads. |
|
Definition
|
|
Term
Testking.com implements stretch clustering in conjunction with a remote storage replication. What is the process for failover the application to the remote site? A. simply failover application B. stop services on local host, split remote disks, failover application, failover cluster alias.
C. Stop serves on local host, faliover application, split remote disks, failover cluster alias. D. stop serves on local host, failover cluster alias, failover applications, split remote disks. |
|
Definition
|
|
Term
which HBA parameter can be configured using HBA configuration tool? A. zoning B RA_TOV C. BC_TOV D register for state change. |
|
Definition
|
|
Term
Two servers are added to a SAN with redundant fabrics. Zoning information needs to be changed. How can you safely change the zoning information? A. Saving the current zoning configuration to disk, modify it and apply it to both fabrics. B. Modify the zoning configuration on one fabric, test it and modify the zoning information on the second fabric. C. Modify the zoning configuration on one fabric, test it, copy the zoning information to the second fabric and enable it. D. Both fabrics must be changed at the same time. modify the zone configurations and enable them within 10 seconds of each other. |
|
Definition
|
|
Term
Testking.com with 8 SAN attached hosts has storage array with only ten disk drives. The customer wished to protect their data by using RAID 1 protection scheme. Each server has a need to see three seperate volumes for their final configuration. What must be configured on the array to meet their storage allocation needs? A. Multiple scsi targets to each mirror volume. B. Seperate logical units for each server volume. C. Seperate virtual path for each mirror colume. D. Multiple COW snapshots for each server volume. |
|
Definition
|
|
Term
A host is remotely replicating data over a Fiber Channel link using a host based logical volume manager. (LVM) The hsot LVM is mirroring data between a local array using SCSI-FCP and a remote array using FCIP. The host is having read performance problems. How should the LVM be configured? A Set volume read policy to robin robin. B.Set volume write policy to only write to the local mirror. C.Set volume read policy to only read from the local mirror. D. Set volume read policy to only read from the remote mirror. |
|
Definition
|
|
Term
The SAN Management application server crashed and your SAN is having throughput problems. Which protocol tool can you implement to collect information about attached SAN device throughput. A. ICMP B. POP3 C. SNMP D. EDTOV |
|
Definition
|
|
Term
Testking.com has a SAN where server and storage are distrubiuted throughout the enterprise. Testking.com has implemented a SAN solution using a ring topology with two ISLs between each switch. A Lower Availabilty B> High Availabitly C> Decrease I/O latency D. Increase I/O latency |
|
Definition
|
|
Term
What are distance consideration between long-wave and short wave fiber? A. Long wave fiber can be used for MAN connections B. Short wave fiber can be used for MAN connections C. Short wave fiber connections are good up to 10 km. D.Long wave fiber connections are used for localized SANs. |
|
Definition
|
|
Term
A SAN architect is asked to implement an infrastucture for a production and test enviroment using Fibre Channel devices . Addtionally the customer would like Fibre Channel device for production and the device for the test to communicate over the IP network to remote hosts but not to each other. A FCIP B> iFCP C> iSCSI D. SCSI-FCP |
|
Definition
|
|
Term
Testking.com in the medical industry is having performance issues wit the database that maintains patient records. Recently the hospital expanded the SAN amd added the fibre channel directors in a core topology which included moving the server from the core to the edge. After determaining the TCP?IP network is functioning correctly with no over-utilization of network resources the system adminstrators is attempting to determine what possiable cause there are for degradation. What is a possaible cause of performance problem. A. Link over subscription B. Spindle Latency on the internal boot disk. C. Contention between the PC packet and the SCSI-3 encoded TCP/IP packets on the FCIP link. D Over subscription of the ISLs between the edge Fibre Channel switches and the TCP/IP switches. |
|
Definition
|
|
Term
Which process occurs during a fabric merge? A. loop lgin communication B. Subordinate switch negotation C. Fabric shortest path negotiation D. iSNS name server communication |
|
Definition
|
|
Term
When adding a new fiber channel switch to a fabric, which step should you take, bfore connection, to maintain security of the production network? A. Diable all ports B. Change default password C. Disable E_Port functionality D. Upgrade firmware using an isolated fabric |
|
Definition
|
|
Term
Which 3 criteria are primary cosideration which when determining the need for a SAN deployment. A. Storage consolidation B. Ensuring High Availability C. Reducing Server CPU Cycles D. Enabling cross platform LAN file access E. Reducing Network congestion during backups. |
|
Definition
|
|
Term
You have a SAN with 4 servers connected to and edge switch in a core edge configuration. Each server has an average requirement of 40mb/s. There is currentl a single a single 2 gb ISL between each edge switch and the core switch A to provide a redundant path B. to balance the load and avoid congestion in the ISL C. as a dedicated control path between switches for FSPF updates D. as a dedicated high prority management path for selected servers. |
|
Definition
|
|
Term
When planning a deloy a Fibre cahnnel infastructure where data rates are expected to exceed 25mb/sec what is the perferred medium for local cabling requirements up to 500meters. A. 9/125 single-mode optical cables B. 50/125 multi-mode optical cables C. 62-5/125 multi-mode optical cables D. 62.5/125 multi-mode copper cables |
|
Definition
|
|
Term
you are troubleshooting a communication problem between a host and a storage array. both nodes are seen by the switch, the host can talk to the array port has not assigned to target id to it. what is most likely current seniro? A. therehave been no logins B. both nodes are completed fabric login abut no port or process logins C. both nodes have completed fabric and prot logins but no process logins D. both nodes have completed fabric, port and process login but there is so other problem. |
|
Definition
|
|
Term
testking.com wants to deploy a disaster recovery site 30 km away from the primary data center using a fiber channel link. What is the key factor for maximizing performance of the link? A. cable type B. link control c. adequate buffer credits d fiber channel class of service. |
|
Definition
|
|
Term
what two technolgies are used to provide Fiber Cahnnel entity authenticiation? A. MD5 B. CHAP C.FCAP D.SHAP |
|
Definition
|
|
Term
testking.com is replicating data to a remote data center a host is needed at the remote data center to provide application failover. How can the company more efficently keep the remote server consisent with the local server? A implementing stretch clustering B. replicate the boot and all application disks C replicate the boot, swat and all applications disk implement stretch clustering while replicating the local boot disk. |
|
Definition
|
|
Term
testking.com needs to implement two fabric SANS with high performance fault-tolerant disk access located1500km from it s data center. Which SAN component should an architect implement? A NAS filter B. Fiber Channel switches C. Fiber Channel to iSCSI bridges D. Fiber Channel Wan Connectivity |
|
Definition
|
|
Term
A fiber switch fails A replacement switch has been delievered before plugging the replacement into the SAN. which 2 actions should be taken? Delete fabric records of the old switch B. Add the new switch to the current zone configuration. C. Clear all zoning information on the replacement switch D. Change the Domain ID of the replacement switch to the domain ID of the old switch. |
|
Definition
|
|
Term
An intruder has control of a server on the company san that uses software zoning. the intruder installed a mitified HBA driver. Which statment is true? A. the intruder can access all storage ports in the SAN. B. The intruder can access no storage ports in the san. the intruder can access all sortage and server ports in the san d. the intruder can access only the ports to wich the host is zoned. |
|
Definition
|
|
Term
A server is experiencing performance problems. An application is being migrated to a new server. In a controlled enviroment how would you migrate the application with the least amount of down time. A. shut down the application copy the data to the new server over the network start the application on the new server. b. shut down the application, change the zoning and the LUNk masking information start the application on the new server. C. create the local relica, change the zoning and LUN masking information stop the application start the application on the new server. d. apply the zoning and lun masking information for the new server stop the aplplication start the application on the new server, remove the zoning and lun masking information on the old server. |
|
Definition
|
|
Term
what i the limiting factor when determing how many hosts can be attached to a storage port of a storage array. A. fan-in B. FSPF C. fan-out D. hop count |
|
Definition
|
|
Term
testking.com is replicating data using FCIP between remote SANs before adding the FCIP SAN extension there are two fabrics in each location, four total. How many total fabrics will there be after extending the SAN? A. 1 B. 2 C. 3 D. 4 |
|
Definition
|
|
Term
Testking.com is synchronously replicating data between sites that are 100k apart. Which technology lets them achieve this goal with minimal impact to performance ? A. iSCSI B. iFCP C.FCIP FCP over DWDM |
|
Definition
|
|
Term
Testking.com desired to implement several several with the same operating system through a SAN to a storage array configured with a Single LaN. What is required for all servers to have concurrentaccess to the LUN. A. NFS software B. SAN/global file system C. A switch with name zoning capabilities. D. Removal of the switch and connecting the servers directly to the RAID. |
|
Definition
|
|
Term
Where would you find the N_port in a fabric? A. on the inter-switch link B. On the Fibre Channel HBA C> On the Fiber Channel switch D. On the fibre channel loop link |
|
Definition
|
|
Term
What are two advantages of WWN zoning? A. Switch ports can be grouped together to form a zone. B. Devices can be moved to another switch in the same fabric without reconfiguring zoning. C. a device can be moved to another port on a switch following switch port failure without reconfiguring zoning. D a fiber channel tape drive can be replaced with another unit that has a different WWN without reconfiguring zoning. |
|
Definition
|
|
Term
A Solaris adminstrator responiable for backups is informed that the restore of data from the backup appeared to be corrupt. The backups had appeared to be successful, but the database adminstrator claims the data was restored is invalid. Where can the admistrator check to see if errors occured during the backup or recovery process? A. /etc/syslog B. event viewer C. /var/adm/messages D./usr/sbin/errorlog.log |
|
Definition
|
|
Term
Testking.com implemets stretch clustering in conjunction with a remote storage replication. What is the process to failover the application to the remote site. A. simply failover the application b. stop services on local host,split remote disk, faliover application, failover cluster alias. C. stop services on local host, failover application, split remote disks, failover cluster alias. D. stop services on local host, failover cluster alias, failover application, split remote disks. |
|
Definition
|
|
Term
You are setting up a remote application over the SAN for diaster recovery. Which two must you consider? A Class of service B. Expected replication traffic C. Location of principle switch D. Distance between locations |
|
Definition
|
|
Term
Testking.com needs to replicate their data synchronously to a remote site 100km away with the least performance impact to the production server. What are the two solutions. A. use ISCSI B. use direct fiber connection C.use a fiber channel extender over IP to replicate the data. D. use a fiber channel extender with DWDM or Sonet, Sonet over DWDM to replicate data. |
|
Definition
|
|
Term
Testking.com is installing a fiber channel storage area network for a small test and development lab. The lab contains two small windows servers and a single ten disk storage subsystem. The customer desired to deploy a fully redundant SAN for this enviroment with minimal cost. What is necessary to meet the customer requirment for full redundancy of the SAN. What is necessary to meet the customers requirement for full redundancy of the SAN. A. one director class fabric switch B. two departmental fabric switches C. Ethernet connectivity to wach component in the SAN. D. at least one HBA in each server being attached to the SAN. |
|
Definition
|
|
Term
Given the limitation of short wave fiber, which statement is true. A. short wave fiber can be used for MAN connections. B. Short wave fiber can be used for WAN connections C. Short wave fiber connections are good for up to 10KM D. Short wave fiber connections are used for localized SANs |
|
Definition
|
|
Term
Which HBA parameter can be configured using an HBA configuration tool. A zoning B. RA_TOV C. LUN UID D. Fiber Channel payload size. |
|
Definition
|
|
Term
You have a 64-bit PCI-X 133 MHZ server. The burst rate of a 133 MHZ bus is 1064 MB/s What is the minimum number of single ported 2-gigabit HBAs required to get the maximum throughput ? |
|
Definition
|
|
Term
What is the mininum length of fiber to use in a fabric. A 1 meter cable length B. 2 meter cable length C. 4 meter cable length D . 10 meter cable length |
|
Definition
|
|
Term
You have a SAN with 4 servers connected to and edge switch in a core edge configuration,. Wach server has a requirement of 40mb/s. There is currently a single 2 GB ISL between each edge switch and the core switch. A. To provide a redundant path B. to balance the load and avoid congestion in the ISL C. As a dedicated control path between switches for FSPF updates D. as a dedicated high priority management path for selected servers. |
|
Definition
|
|
Term
Testking.com has a SAN where servers and storage are distributed throughout the enterprise . Testking.com has implemented a SAN solution using ring topology with two ISL between each switch. When compared to a mesh topology, which two options are valid for ring topology? A lower availability B. higher availabiltiy C decrease I/O latency D increased I/o latency |
|
Definition
|
|
Term
During quarter end batch processing at a large retail company it is noted that performance of the database applications drop significantly. The application runs on a server that is dual attatched to SAN infrastructure with multi-pathing software to ensure high avaiabiltity as well as load balancing. The system admistrator needs to determine if the problem resides within the server or within the SAN components. Which 2 options indicate areas where the adminstrator can check to see if the issue is internal to the server. A. check the event and alarm log B check the integrity of the zoning C. check the virtual path and adapters D check the host subsection of the storage array event logs |
|
Definition
|
|
Term
When adding a new fibre channel switch to a fabric, which step should you take, before connection to maintain security of the production network. A. diable all ports B. change the default password C diable E_port functionality D upgrade firmare using isolated fabric. |
|
Definition
|
|
Term
testking.com with 8 SAN attached hosts has a storage array with only 10 disk drives. the customer wished to protect their data by using RAID 1 protection scheme. Each server has a need to see 3 seperate volumes for their final configuration. What must be configured on the array to meet their storage allocation needs? A multiple scsi targets to wach mirroe volume b. seperate logical units for each server volume C. seperate virtual path for each mirror D. multiple COW snapshots for wach server volume. |
|
Definition
|
|
Term
University IT provides shared Fiber channel storage services. Disk tapes and fabric core are located in the campus datacenter, Each college and departmetn provides their own systems and staff. The systems are colocated in the campus data center under controlled physical access. Central It provides fabric, storage and back adminstration. Which risk strategy is important in this fiber channel infrastructure? A secure shell B link encryption c. port authentication switch authentication |
|
Definition
|
|
Term
which 3 criterias are primary considerations when determining the need for SAN deployment? A. Storage consolidation B. ensuring high availability C. reducing server CPU cycle D enabling cross platform LAN file access E. reducing network congestion during backups. |
|
Definition
|
|
Term
what process occurs during a fabric merge? A loop login communication B. suborndinate switch negotiation C. fabric shortest path negotiation D iSNS name server communication |
|
Definition
|
|
Term
a four way cluster is attachted to two fabrics. Wach memeber has 2 HBAs connected to each fabric. Each fabric has to array connections. SCSI queue depth for HBAs = 8 storage devices= 256 port. Wach clsuter member is primary for one application. All LUNs appear on all storage ports with workload equally distrubuted accross all. Each host has two dedicated HBSs for tape that can see four independant LTO II tape drives. All files are large and involve sequential I/O. Performance reporting shows a large read pending at the hsot during multi-threaded backup. What is the maximum valve you should set for SCSI queue depth. A. 16 B. 32 C 64 D 128 |
|
Definition
|
|
Term
A cluster is experiencing performance problems. An application running in parallel mode is being migrated to a new cluster member . The cluster member is added, the application is installed, zoning nad LUN masking changes are made, and the application is brought up on the new member cluster. Waht is the minimum anount of down time possiable? A. there is no down time B. the time takes to stop and start the application C. the time tales to reboot the new cluster member D the time it takes to stop, start and recover the application |
|
Definition
|
|
Term
testking.com is migrating data to an array from a new storage vendor. the application need to be available 99.99% of the time during migration. Which 2 should the customer do? A. use the devise-blocked virtualization to migrate the data between the arrays using a array -based remote application software. B. use network -based block virtualization to migrate the dat between arrays using a meta data server. C. use host based block virtualization to migrate data between the arrays using a logival volume manager. D. use file/record layer virtualization to migrate the data between the arrays using clustering software. |
|
Definition
|
|
Term
which fabri capacity management process should be reviewed annually for effectivness and effiency? A. fabric technology implementation is aligned with busienss requirements (time cost and functionality) B Validate backup nad recovery tests and their impact on fabric infrastructure against recover time objectives. C. Check the actual expenditures on fabric services and their departmental attribution match the predicted expenditures. D. frequency of fabric failures, including the number of switch, HBA, link, cable nad driver failures and the number of users impacted. |
|
Definition
|
|
Term
What is the limited factor when determining how many storage arrays can be attached to a single hsot? A. fan-in B FSPF C fan-out D. hop count |
|
Definition
|
|
Term
What is the first step when securing fiberswitch management ? A. Cable the switches only to each other B. Connect to the switches through the SAN C. put the switches on a seperate management LAN D. put the switches on the company LAN and use SSL to communicate wit the switches. |
|
Definition
|
|