Term
Question 1
A San is supporting Windows and SUN operating system. What should the administrator do tosupport the heterogeneous Oss?
A. Use zoning to separate hosts.
B. Have a different fabric for each OS.
C. Use LUN masking to separate hosts.
D. Direct attach each host to the storage array
|
|
Definition
|
|
Term
Question: 2
What is the primary objective of the storage capacity planning process?
A. To demonstrate the effects of changes in
storage service levels.
B. To reach agreement with application
representatives and management over the
storage requirements.
C. To produce a capacity plan at agreed intervals
which fits into the business planning cycle,
e.g. the financial year.
D. To calculate the effects on ILM service levels,
array and fabric utilization of the estimated
demand over the period of the planning
horizon.
|
|
Definition
|
|
Term
Question: 3
What information must be gathered during the testing phase BEFORE allowing live customer
data on the storage infrastructure? (Choose two)
A. Time to failover, both without and with
simulated load.
B. Single points of failure in the infrastructure as
well as topology mapping
C. Hardware and software vendor escalation
process including phone-home and /or ticket
generation.
D. Powerup order, how long from power
application to functionality per component,
including dependencies.
|
|
Definition
|
|
Term
Question: 4
Company.com is planning to implement a new service, and needs to deploy two servers in a
active/passive cluster maintaining a large repository of data. This data will include three sets of data:
SET 1:Stream type data:3MB Files on
average :many thousands
SET 2:Large file data:200KB Files on average:
many millions
SET 3:Small file data: 15 KB Files on
average:hundereds of millions
The application developer is writing code
that is specific to an implementation of
clustering that requires block level access. Which solution does not degrade performance?
A. A RAID 5 grouping for set 3, while deploying
set 1 and 2 on the same RAID 0+1 set
B. Deploying set 1 and 2 as independent RAID 5
groupings, while deploying set 3 as a RAID
0+1 set
C. Creating a single RAID 5 grouping on the array
and using the OS to partition each of the three
sets
D. Creating a single RAID 5 grouping on the array
and using the array to partition each of the
three sets from the same pack of physical har
d drive.
|
|
Definition
|
|
Term
Question: 5
Company.com is using host based virtualization to mirror critical data between two vendors disk
arrays. Which two scenarios are true? (Choose two)
A. The host can use the same HBA to connect to
both arrays.
B. The customer can adhere to either vendors
SAN design rules
C. The customer must adhere to both vendors
SAN design rules
D. The host must use different HBAs with
different firmware to connect to each array.
|
|
Definition
|
|
Term
Question: 6
Which three principles best describe data collected during a strategic risk assessment of the Storage environment (including impacts on RTO/RPO)?
A. Identification of loss scenarios
B. Probability an include will occur
C. Procedures to reduce possibility of error or
failure
D. Fault tolerant and resilient IT systems and
networks
E. Documenting acceptable loss levels and
severity from a business perdpective.
|
|
Definition
|
|
Term
Question: 7
Company.com needs to develop a fault tolerant solution. They have implemented a two server
Cluster with application failover. They have two split mirror snapshots of their data and have
implemented redundant Fabrics. Which solution should they implement?
A. Each server in both Fabrics, each snapshot
available to one host
B. Each server in both Fabrics, each snapshot
available to both host
C. Each server in a separate Fabrics, each
snapshot available to one host
D. Each server in a separate Fabrics, each
snapshot available to both host
|
|
Definition
|
|
Term
Question: 8
An error happened in the data center. According to ITIL principles, when is your job as storage
administrator complete?
A. When the problem is fixed
B. When the cause of the error is determined
C. When the problem is identified and the vendor
is notified
D. When a plan is developed to ensure the error
does not reoccur
|
|
Definition
|
|
Term
Question: 9
A client is consolidating a database server into an existing SAN attached array with 73 GB drives
and a default LUN size of 8.8 GB. The server currently uses O/S based volume management on
9 GB LUNs carved from 36 GB drives in a direct attached disk array. The array is connected
using two 100 MB/s FC ports. The file systems are set at a default blocksize of 2048. Which would be the most important to address in your design?
A. Adapt to standard LUN sizes, paying migration
penalities
B. Upgrade connectivity from 100 to 200 GB,
incurring upgrade cost
C. Account for change in access density from 36
GB to 73 GB drive
D. Determine capacity/performance impact of file
system parameters
|
|
Definition
|
|
Term
Question: 10
Company.com has created a disaster recovery (DR) plan and is synchronously replicating its data To remote facility. Which three must be identical between the remote and production site?
A. LVM
B. Server OS
C. File system
D. Storage array
E. Server hardware
|
|
Definition
|
|
Term
Question: 11
You notice, from continually monitoring a SAN arry, that an array has a number of soft SCSI bus
error. You trace the errors back to a single drive using a vendor's event tool. Which two would
correct this? (Choose two)
A. You should pull the drive out immediately and
replace it to prevent data corruption on the
RAID set.
B. Soft SCSI bus errors can be safely ignored as
they do not actually denote any service
requirements.
C. You should research the error to determine the
impact and proper response including the
vendor in these discussions
D. Review the logs from the array to identify if
there is a pattern of large numbers of these
SCSI errors. A large number of these SCSI bus
errors may denote a predictive failure.
|
|
Definition
|
|
Term
Question: 12
Company.com has implemented a disaster recovery (DR) plan with remote standby servers and synchronous data replication. The customer wants to upgrade to 2 Gb HBAs in a server. What
should be done before shutting down the production server and upgrading the HBA?
A. Failover the storage and applications to the
remote facility, shut down production servers
and upgrade the HBA
B. Create a copy-on-write (COW) snapshot and
present it to a local host, failover applications,
shut down productions servers and upgrade
the HBA, delete snapshot.
C. Creat a split mirror snaphot and present it to a
local host, failover applications, shut down
production servers and upgrade the HBA,
reestablish the snapshot
D. Create a COW snapshot of the production
volume and present it to a remote host,
failover applications, shut down production
servers and upgrade the HBA, delete snapshot
|
|
Definition
|
|
Term
Question: 13
You are conducting an ILM assessment and just completd the consolidation and assignment phase. What is your next steps?
A. Perform gap analysis
B. Develop detailed design
C. Collect data and requirements
D. Prepare actionable recommendations
|
|
Definition
|
|
Term
Question: 14
After lab testing a solution, which two deliverables should be presented to the implementation team? (choose two)
A. List of tested and approved versioning and
code
B. Performance metric showing maximum
performance
C. Complete TCO and ROI documentation for the
solution
D. Tested procedures and process for failover and
redundancy
|
|
Definition
|
|
Term
Question: 15
A disaster recovery (DR) Plan includes synchronously replicating data between a production and Remote site and implementing a to-member extended distance cluster. Company.com uses a database application that can run in parallel mode. What should Company.com do?
A. Start the database in parallel mode so that it
runs on both servers;failover the storage in a
disaster
B. Start the database in parallel mode so that it
runs on both servers;you do not need to
failover anything.
C. Run the database in normal mode on the
production cluster member and failover the
application and storage in a disaster
D. Run the database in normal mode on each
cluster member with each accessing local
database files; you do need to failover
anything.
|
|
Definition
|
|
Term
Question: 16
Which technique is used to ensure that SAN-attached tape devices are represented consistently in a host operating system?
A. LUN mapping
B. Persistent binding
C. Fabric initialization
D. Indexed addressing
|
|
Definition
|
|
Term
Question: 17
You are architecting a redundant SAN which will include 100 hosts with dual HBAs,50 hosts with
Quad HBAs, and storage arrays which have a total of 48 ports. The SAN implements redundant
Fabrics and redundant ISLs. A 128 port director is ten times as expensive as a 16 port switch.
Focusing on management, cost, performance, and future expansion, which solution is the most
effective?
A. 4 directories
B. 32 switches in a mesh configuration
C. 2 directors and 16 switches in a mesh
configuration
D. 2 directors and 16 switches in a core edge
configuration
|
|
Definition
|
|
Term
Question: 18
A new host is added to the SAN. The SAN includes 200 hosts. The administrator is providing the Host with one virtual device. What should be done?
A. Create a logical volume on the array, configure
LUN masking, rescan the SCSI bu.
B. Create a logical volume on the array zone the
host to the array ports, configure LUN
masking, rescan the SCSI bus.
C. Create a logical volume on the array configure
LUN masking, zone the host to the array
ports, rescan the SCSI bus.
D. Create a logical volume on the array configure
LUN mapping, zone the host on the array
ports, rescan the SCSI bus.
|
|
Definition
|
|
Term
Question: 19
A client has four servers they want to attach to a storage array containing 16 ports. Which
topology is the most cost effective for this situation?
A. Star
B. Mesh
C. Point-to-point
D. Switched Fabric
|
|
Definition
|
|
Term
Question: 20
A four switch Fabric with 8 ports per switch using a full-mesh connectivity approach will have 20
Ports available for Fabric attached devices. How many ports will be available using the full mesh
approach when increasing the number of switches from four to six?
A. 12
B. 18
C. 20
D. 24
|
|
Definition
|
|
Term
Question: 21
What is not affected by distance?
A. Delay
B. Latency
C. Bandwidth
D. Throughput
|
|
Definition
|
|
Term
Question: 22
Company.com needs to protect against data corruption. You must assume that it could take the company up to three hours to determine that their data is corrupted. They want to have a
snapshot every hour. The production data is not write intensive. If a split mirror snapshot is used,
incremental establishment takes 15 minutes. Which solution fulfils their needs and is the most
cost effective?
A. Create a COW snapshot every hour. Always
keep three snapshots
B. Create a COW snapshot every hour. Always
keep four snapshots
C. Incrementally establish a split mirror snapshot
every hour. Rortate using four snapshot
volumes.
D. Incrementally establish a split mirror snapshot
every 45 minutes. Rotate using five snapshots
volumes.
|
|
Definition
|
|
Term
Question: 23
Company.com is configuring a host to have access to three virtual devices. The customer wants to strip these devices into one logical volume. Which three choices are valid?
A. Host based virtualization
B. File based virtualization
C. Device based virtualization
D. Network based virtualization
E. Capacity based virtualization
|
|
Definition
|
|
Term
Question: 24
You are troubleshooting a disaster recovery plan for your data center. Your current configuration
is one with a SAN that includes a local and remote data center. Recently the data center was
moved further away. You are experiencing reduced throughput and link utilization is now at 35 percent. What cause this?
A. Hard zones
B. Phone connections
C. Data transport between sites
D. Buffer credits between switches
|
|
Definition
|
|
Term
Question: 25
Which two statements are correct when designing a core-edge or tired storage network topologies for high availability? (Choose two)
A. ISLs are connected across independent ASICs.
B. Large port count switches should only be used
in the core.
C. A 10 Gb/ISL should always be used in place of
two or four 2 Gb's ISLs.
D. Core-edge and tiered storage network
topologies should always be deployed in pairs
for redundancy.
|
|
Definition
|
|
Term
Question: 26
For a high availability storage network what should you do?
A. Deploy two separate fabrics with redundant
ISLs interconnecting them.
B. Interconnect all switches together with
redundant ISLs and management interfaces.
C. Establish two separate fabrics with unique
name servers and management configurations.
D. Use fully redundant components with no single
point of failure that are all interconnected
using redundant paths and networks.
|
|
Definition
|
|
Term
Question: 27
Company.com needs to create a tape backup strategy for a file system. On average the file
system will be 60% full. Array based
virtualization will be used to create the snapshot,
which will only be used for the tape backup. Write activity on the production volume will be minimal during the backup process. Which will provide the least impact to the production application?
A. COW snapshot mounted to a tutor/mount
server.
B. COW snapshot mounted to the application
server.
C. Split mirror snapshot mounted to a
tutor/mount server
D. Split mirror snapshot mounted to the
application server.
|
|
Definition
|
|
Term
Question: 28
Some system servers contain valuable and frequently accessed data, manuals, and engineering drawings. These files do not change very often, but they need to be kept on reasonably fast, reliable storage to serve the needs of users. What would be an acceptable method of presenting these files for use?
A. Install an Arbitrated Loop Storage system off
of the primary server.
B. Install a High availability storage system
connected directly to all servers.
C. Install a new Ethernet segment and connect a
NAS storage system for all users.
D. Install a full blown Fiber Channel switched SAN
with high availability storage system.
|
|
Definition
|
|
Term
Question: 29
When planning a NAS solution, which two sub-processes are associated with Business Capacity
Management for a NAS solution? (Choose two)
A. Develop financial forecast
B. Determine transaction trend
C. Run reports on the storage utilization and
IOPS components
D. Transaction Unit equated to IOPS block size
cache hit and network impact.
|
|
Definition
|
|
Term
Question: 30
Which statement is correct?
A. Fan-out is the ratio of switch ports to host
ports, and indication of switch load at a single
host port.
B. Fan-out is the ratio of storage ports to host
ports, an indication of storage load at a single
host port.
C. Fan-out is the ratio of switch ports to storage
ports, an indication of switch load at a single
storage port.
D. Fan-out is the ratio of host ports to storage
ports, an indication of host traffic load at a
single storage port.
|
|
Definition
|
|
Term
Question: 32
You have been tasked with identifying upgrade options for your networked storage. Which two
should you do?
A. Only select hardware and software that is SMI-
S complaint
B. Share all received information openly with all
vendors involved.
C. Understand needs and requirements as well
capabilities of your existing technology.
D. Enlist legal advice or support of your
purchasing department when creating RFI,
RFP, and RFQs.
|
|
Definition
|
|
Term
Question: 33
Which three technical requirements should be rejected or restarted ? (Choose three)
A. Nee to keep the business running in case of a
disaster.
B. The ROI of the SAN infrastructure should equal
or be lower than the existing infrastructure.
C. The SAN must allow all functionality of
business critical server at site X to resume
within Y minutes at Site Z.
D. In an effort to stay current with technology
advances all business critical servers are to be
hosted on SANs.
|
|
Definition
|
|
Term
Question: 34
What are three key advantages of deploying a director-based solution over a mesh of switches?
(Choose three)
A. Lower cost
B. Consistent latency
C. Improved availability
D. Increased hop count
E. Ease of management
|
|
Definition
|
|
Term
Question: 35
When deploying a copy on write backup solution that uses 3rd party copy, which two statements Are true? (Choose two)
A. No backup servers are required
B. The NDMP engine must be loaded on the
backup server.
C. A backup server will still control the
environment such as loading tapes.
D. The backup server must be able to see the 3rd
party copy engine as well as the LUN to be
backed up.
|
|
Definition
|
|
Term
Question: 36
A database is being replicated to a remote location. To have maximum flexibility to restore the database, what should you do?
A. Put database binaries, data files, logs, and
meta data files on one logical volume.
B. Put database binaries, data files, logs, and
meta data files on four different logical
volume.
C. Put database binaries and logs on one volume
and data files and meta data files on a
different logical volume.
D. Put database binaries and metadata files on
one volume and data files and logs, on a
different logical volume.
|
|
Definition
|
|
Term
Question: 37
The customer currently has 50 servers and 20 direct-attached storage array and wants to
consolidate their data on a SAN. They want to be able to rapidly add storage and servers with
minimum impact to data availability? Which topology is most appropriate?
A. Star
B. Mesh
C. Core-edge
D. Round-robin
|
|
Definition
|
|
Term
Question: 38
An existing SAN is presently deployed that has two arrays (8FC ports each) and eight Servers
(2FC ports each) two backup servers (4 FC Ports Each) and four FC to SCSI tape routers (2 port
each). They presently have two Fabric each with a single 32 port switch. They wish to add four
new servers, one new array, and one new backup server. Which statement is correct?
A. The existing switch infrastructure will handle
the expansion
B. An additional pair of switches would be needed
to enable this request
C. An additional 3 switches should be ordered to
allow conversion of these fabrics to a core-
edge design.
D. The added latency of the ISL would require
that the backup server would need to be
deployed on the same switch as the tape
routers.
|
|
Definition
|
|
Term
Question: 39
When implementing a high performance NAS solution you must check for which two items?
(Choose two)
A. Ensure the network is full duplex
B. Ensure that hosts have 100 Mb NICs.
C. Ensure the network is at least 100Mb.
D. Ensure routers are configured for OSPF.
|
|
Definition
|
|
Term
Question: 40
An existing SAN has been experiencing numerous faults in the past few months, you have been
Tasked with bringing the problems to solution and ensure reliability. Your primary concern is
visibility into the SAN and the present lack of monitoring. Which two are true about the existing
infrastructure? (Choose two)
A. Evaluating vendor supplied tools, and
knowledge base type documents may outline
best practices for increasing reliability and
reporting .
B. Requesting vendor assistance, and if need be
custom builds of the firmware/software that
runs your array to fix the specific problems
that you encounter.
C. Testing and then Level settings firmware and
code levels to a common vendor supported
standard will allow you to avoid many of the
problems that may have been encountered in
the past.
D. Since SMI-S is an emerging standard, the
likehood of being able to manage equipment
bought in previous years is very low. A
migration plan should be considered to an
SMI-S complaint infrastructure.
|
|
Definition
|
|
Term
Question: 41
When implementing a LAN-free/severless (third party copy) backup solution, which benefit is
achieved?
A. Since the backup is serverless no backup
servers are required.
B. SINCE THE BACKUP IS lan-FREE ALL BACKUP
DATA TRAFFIC IS RELEGATED TO THE san
C. The third party copy protocol will handle all
open files so no snapshots or data quiesce is
required
D. The combination of 3rd party copy and
incremental backups allows significant
reduction of tapes needed.
|
|
Definition
|
|
Term
Question: 42
A host is using only 10 percent of a 64 GB volume. Which solution would enable you to reclaim the wasted disk space?
A. Shrink the 64 GB volume to 16 GB
B. Create a new 16 GB volume use a file system
copy to migrate the data.
C. Create a new 16 GB volume create a COW
snapshot of the production volume restore the
snapshot to the new volume.
D. Create a new 16 GB volume attach the new
volume to the production volume as a split
mirror snapshot to migrate the data.
|
|
Definition
|
|
Term
Question: 43
Which design supports high availability and no single point of failure for storage networks along
With performance and scalability?
A. A large single Fabric with any to any
connectivity between all switches
B. Dual and quad ported servers and storage
devices attached to a dual fabric.
C. High quality fiber optic cabling transceivers
cable management and diagnostic tools.
D. Clustered servers with a single host adapters
attached to switches that have redundant
paths to storage subsystems.
|
|
Definition
|
|
Term
Question: 44
Company.com is designing a disaster recovery (DR) plan using synchronous array based data
replication with Fiber Channel SAN extension technology. The remote site is 125 km from the
production facility. Which solution fits their needs?
A. FCIP
B. IFCIP
C. DWDM
D. ISCSI bridge
|
|
Definition
|
|
Term
Question: 45
Company.com is utilizing ITIL to create a high availability environment. Maintainability of the IT
infrastructure consists of which three stages? (Choose three)
A. COST OF FAILURES
B. CETECTION OF FAILURES
C. ANTIPATION OF FAILURES
D. RESTORATION OF THE DATA AND IT SERVICE
E. EFFECT OF FAILURES ON SERVICE LEVEL
AGREEMENTS
|
|
Definition
|
|
Term
Question: 46
Company.com has a disk subsystem with eight ports. Each port delivers 200 MB/s. The customer
Wants a solution designed which allows access from 32 servers with no single point of failure.
Which number of HBAs and the associated throughput provide server access to the subsystem?
A. 16 HBAs, 75 MB/s
B. 32 HBAs, 90 MB/s
C. 64 HBAs, 25 MB/s
D. 64 HBAs, 50 MB/s
|
|
Definition
|
|
Term
Question: 47
When designing a redundant IP storage network for data movement or access of remote data,
which two must be considered? (Choose two)
A. Obtain the fastest network circuit that is
available.
B. Enable IP jumbo frames and as large of TCP
window size as possible.
C. Obtain data circuits with low latency and good
quality that take diverse routes between
locations.
D. Understand network solution including network
circuits routers and gateways capabilities and
Management interfaces.
|
|
Definition
|
|
Term
Question: 48
You are preparing a detailed design, applying ILM principles. Which two processes are performed
during the detailed design phase? (Choose two)
A. Develop an idealized environment
B. Prepare work-task breakdown structure
C. Define internal storage parameters used in the
implementation
D. Document current and proposed infrastructure,
demonstrating change in capabilities.
|
|
Definition
|
|
Term
Question: 49
What is the Maximum Transmit Unit (MTU) size for IP-based NAS and SAN using Gigabit
Ethernet jumbo frames?
A. 2K bytes
B. 65K bytes
C. 1508 bytes
D. 100M bytes
|
|
Definition
|
|
Term
Question: 50
Company.com has consolidated multiple servers into a NAS solution and is redesigning their
network to safeguard against malicious networking threats. The original servers were serving multiple subnets. To implement the solution including NAS failover, what should you do?
A. Implement VSANS
B. Implement VLAN technology
C. Implement FCIP with encryption.
D. Connect each data mover/filer to each subnet.
|
|
Definition
|
|
Term
Question: 51
What is the goal of a SAN designed with no single point of failure?
A. To provide redundant paths to data
B. To have a good data backup system
C. To minimize unexpected loss of data access
D. To have clustered servers so that one is
always available
|
|
Definition
|
|
Term
Question: 52
Your SAN currently has eight server ports and eight disk ports on one 16 port switch. Each server
port requires 80 MB/s of one-way bandwidth, spread out evenly among the storage devices. The
customer would like to add 28 server ports along with 28 disk ports. Each server will evenly
distribute its traffic on each disk. Using 16 port 1 Gb switches, which topology should you select
to minimize the number of switches and ISLs required?
A. Star
B. Full mesh
C. Core-edge
D. Point-to-point
|
|
Definition
|
|
Term
Question: 53
When planning a NAS solution, which two sub-processes are associated with NAS Service
Capacity Management? (Choose two.)
A. Define future requirements.
B. Manage peak demand for NAS services.
C. Establish IOPS monitoring and exception
thresholds.
D. Run reports on the storage and network
utilization and IOPS of components.
|
|
Definition
|
|
Term
Question: 54
A customer has a terabyte database and is required to back up the data daily. The SLA has
allotted 6 hours for completion of the backup from 7:00 P.M. until 1:00 A.M. However, the
customer has a tape library with only five SDLT tape devices running at native speeds of 40
GB/hour. Which two should you do to successfully meet the expected SLA requirements?
(Choose two.)
A. Interleave data streams
B. Enable server-based compression
C. Use multiple data streams across multiple
devices
D. Prioritize the schedule to launch during periods
of greatest inactivity
|
|
Definition
|
|
Term
Question: 55
What is the most important factor in determining sustained bandwidth in an IP SAN with high
bandwidth with long delays?
A. Zero-copy TCP
B. IP fragmentation
C. Ethernet MTU size
D. TCP sliding window size
|
|
Definition
|
|
Term
Question: 56
An administrator has put the database recovery logs on the same volume group as the data files.
The administrator is going to restore the data files from a snapshot. What should be done first?
A. Do nothing
B. Restore the database to a different server
C. Copy the production server recovery logs to a
safe location
D. Create a snapshot of the recovery logs and
then restore the recovery logs after restoring
the data files
|
|
Definition
|
|
Term
Question: 57
A company has implemented a three-node cluster with SAN storage. Which LUN maskingsolution is correct?
A. LUN mask volumes to all nodes
B. do not perform LUN masking in a cluster
C. LUN mask volumes to the appropriate cluster
alias
D. LUN mask volumes to the active node, failover
LUN masking when needed
|
|
Definition
|
|
Term
Question: 58
Given point-to-point, bus, loop and Fabric topologies, which solution would be considered a
mixed topology approach using three separate but interconnected topologies?
A. A Fibre Channel-based storage network using
Fabric switches with both loop attached and
point-to-point attached servers and storage
B. A cluster of servers connecting to Ethernet
switches with a combination NAS Gateway
Object storage system for file sharing and
block access
C. A mixed Serial ATA (SATA) and Serial Attached
SCSI (SAS) solution using expanders where
the SATA disks and the SAS disks share
connectivity to the expanders
D. An Ethernet-based iSCSI storage network
using Ethernet hubs connected to Ethernet
switches with the storage devices directly
attached to switches and the servers
connected to hubs
|
|
Definition
|
|
Term
Question: 59
A company is designing a Disaster Recovery (DR) plan. They have an RPO of zero. The DR site
is located 250km from the production site. The DR plan must not affect application performance
at the production facility. Which scenario is appropriate?
A. A new DR site must be chosen
B. Synchronously replicated the data to the DR
site
C. Asynchronously replicated the data to the DR
site
D. Create a split mirror snapshot and replicate
the snapshot to the DR site
|
|
Definition
|
|
Term
Question: 60
You are assessing an infrastructure to consolidate multiple outdated servers into a single server. Your first step is to determine if block level or file level access to the resource storage is needed. Which two statements are true? (Choose two.)
A. If high throughput access is required, a NAS
solution would be acceptable.
B. If block level access is required for the
solution, a traditional NAS would be
unacceptable.
C. If file level access is acceptable, a NAS should
be used since it is generally more economical
than SAN.
D. If Ethernet based backups are unacceptable,
and backups are required, NAS would be
unacceptable.
|
|
Definition
|
|
Term
Question: 61
When designing a high availability solution that relies on SAN infrastructure, which three steps
should be taken? (Choose three.).
A. Ensure that single points of failure are
eliminated where ever possible.
B. Practice manual fail-overs with all personnel
that will manage the equipment.
C. Test the failover times during simulated load
to ensure that the application will see no ill
effects.
D. Joining both sides of the fabrics with an Inter-
switch Link to achieve a higher level of
redundancy.
E. Have good documentation and topology for all
components with regards to the specifics of
the implementation.
|
|
Definition
|
|
Term
Question: 62
Which statement is correct?
A. Fan-in is the ratio of switch ports to host
ports; and indication of switch load at a single
host port.
B. Fan-in is the ratio of storage ports to host
ports; an indication of storage load at a single
host port.
C. Fan-in is the ratio of switch ports to storage
ports; an indication of switch load at a single
storage port.
D. Fan-in is the ratio of host ports to storage
ports; an indication of host traffic load at a
single storage port.
|
|
Definition
|
|
Term
Question: 63
A company needs to protect against data corruption using split mirror snapshots. Their RTO is 15 minutes and RPO is one hour. It takes 15 minutes to create an incremental split mirror snapshot. Which scenario fulfills their needs most efficiently?
A. Use one snapshot volume and incrementally
establish it every 60 minutes.
B. Use one snapshot volume and incrementally
establish it every 30 minutes.
C. Use two snapshot volumes and incrementally
establish one volume every hour.
D. Use two snapshot volumes and incrementally
establish one volume every 30 minutes.
|
|
Definition
|
|
Term
Question: 64
You are conducting an ILM assessment and just completed the gap analysis phase. What is your
next step?
A. Plan storage strategy
B. Develop detailed design
C. Prepare actionable recommendations
D. Perform storage consolidation and assignment
|
|
Definition
|
|
Term
Question: 65
Your client is applying ILM principles as they develop a storage strategy. Which two processes
are performed in the strategy phase? (Choose two.)
A. Set storage goals
B. Develop an idealized environment
C. Define internal storage parameters used in the
implementation
D. Match requirements to infrastructure
capabilities and attributes
|
|
Definition
|
|
Term
Question: 66
A customer is configuring a host to have access to four virtual devices. The customer wants to
create a RAID 10 volume using these devices. The customer has two arrays and will be
mirroring between arrays and striping within arrays. The arrays are not zoned to see each other. Which two choices are valid? (Choose two.)
A. File based virtualization
B. Host based virtualization
C. Device based virtualization
D. Network based virtualization
|
|
Definition
|
|
Term
Question: 67
You are architecting a redundant SAN which will include 100 hosts with dual HBAs, 50 hosts with
quad HBAs, and storage arrays which have a total of 48 ports. The SAN implements redundant
Fabrics and redundant ISLs. A 128 port director is ten times as expensive as a 16 port switch.
Focusing on management, cost, performance, and future expansion, which solution is the most
effective?
A. 4 directors
B. 32 switches in a mesh configuration
C. 2 directors and 16 switches in a mesh
configuration
D. 2 directors and 16 switches in a core edge
configuration
|
|
Definition
|
|
Term
Question: 68
Your company is implementing ITIL, you are creating a QA plan to ensure you meet approved
SLAs. What is the most effective solution?
A. Create pricing penalties if you do not meet the
SLAs.
B. Automate the failover of your applications in
the event of significant performance issues.
C. Automate a reporting process to gather data
relative to your SLA on an array basis (e.g.,
IO/s, downtime).
D. Automate a reporting process to gather data
relative to your SLA on an application basis
(e.g., IO/s, downtime).
|
|
Definition
|
|
Term
Question: 69
As a storage administrator you determine that 20 servers are only utilizing between 5 and 15
percent of the storage that they are allocated. What should you do?
A. Use host based virtualization to migrate the
data to smaller virtual disks.
B. Use array based virtualization to migrate the
data to smaller virtual disks.
C. Split the logical disks and use LUN masking to
present the extra space to other hosts.
D. Contact the system administrators and have
them justify the storage that is allocated to
them.
|
|
Definition
|
|
Term
Question: 70
You are tasked with connecting a new pair of hosts to an existing SAN infrastructure. The existing infrastructure is a 2Gb/s Fibre Channel solution on the far side of your facility. What are three concerns for the new infrastructure? (Choose three.)
A. The measured bit error rate (BER) is between
"1 in 10^16" and "1 in 10^15"
B. Cable lengths as long as you measure and
insure a proper strength signal as measured in
DB.
C. Patch panels utilizing 50 micron optical cable
for the long floor runs and 62.5 micron optical
cable for the shorter patch panel to the server.
D. Re-use of existing Gigabit Ethernet cable
infrastructure since Gigabit Ethernet cables
have the same specifications and limitations
as Fibre Channel.
|
|
Definition
|
|
Term
Question: 71
When performing a strategic risk assessment of the storage infrastructure, you discover a risk
scenario and have proposed several risk reduction strategies. Which two measurements
differentiate the strategies? (Choose two.)
A. Risk transfer
B. Cost of control
C. Revised severity level
D. Optimal loss estimate
|
|
Definition
|
|
Term
Question: 72
A customer requires a high-availability SAN for disk access. The disk array and server may each
have multiple ports. How many Fabric switch ports are necessary for full redundancy in a network with one disk array and one server? (Note: throughput is not a consideration.)
A. 3
B. 4
C. 5
D. 6
|
|
Definition
|
|
Term
Question: 73
A cascade network topology can be used for which two purposes? (Choose two.)
A. Create a fault resilient storage network with
two or more switches.
B. Interconnect multiple switches together that
are local or remote via ISLs.
C. Connect two or more switches where all
switches do not have to have direct access to
each other.
D. Establish a storage network that enables all
switches regardless of number of switches to
connect to each other.
|
|
Definition
|
|
Term
Question: 74
Which demonstrates a strong potential for data center error(s)?
A. Unrestricted vendor access to infrastructure for
immediate resolution issues
B. Precise documentation that outlines steps to
perform during common fault conditions
C. Defined roles and scope or all employees that
service and maintain infrastructure equipment
D. Approved change control process that limits
actions to the infrastructure to those who are
qualified
|
|
Definition
|
|
Term
Question: 75
A heterogeneous SAN consists of one RAID with four LUNs, one hub, and four servers. How
should you assign one LUN to each server while preventing other servers from accessing other
LUNs?
A. Configure the HBA for persistent binding
B. Disable the undesired LUNs in the operating
system disk manager of each server
C. Use the array LUN masking feature to assign
RAID LUNs to HBA WWPNs in the servers
D. Substitute the hub with a switch and use soft
zoning to assign RAID LUNs to HBA WWNs in
the servers
|
|
Definition
|
|
Term
Question: 76
Which two data protection techniques provide the highest level of data protection and rapid
recovery? (Choose two.)
A. Local mirroring with backup to tape.
B. Backup to disk combined with RAID disk data
protection.
C. RAID-0 with mirrored write back cache and
battery backup.
D. Remote mirroring with consistency groups and
backup to alternate storage.
|
|
Definition
|
|
Term
Question: 77
A customer has created a disaster recovery (DR) plan and is synchronously replicating its data to
a remote facility. The remote storage/server needs to be configured (LUN masking, zoning, and rescanning the SCSI bus). To failover the application, what must the customer do?
A. Failover storage, re-configure the remote
storage/server, start application
B. Failover storage, start application, re-configure
the remote storage/server
C. Pre-configure the remote storage/server,
failover storage, start application
D. Pre-configure the remote storage/server, start
application, failover storage
|
|
Definition
|
|
Term
Question: 78
A network backup server is attached to a SAN. The server's two HBAs deliver 60 MB/s each to
the tape devices. The tape library attached to the SAN includes 15 MB/s tape devices. Theoretically, how many tape devices are required to efficiently stream output from the tape server?
A. 4
B. 8
C. 12
D. 15
|
|
Definition
|
|
Term
Question: 79
Which tool configures persistent binding in a SAN?
A. Zoning tool
B. Hba software
C. Switch manager
D. Backup software
|
|
Definition
|
|
Term
Question: 80
You have been asked to design a SAN/NAS that stores data that will be internally read by web
browsers for data replay. Some browsers are more likely to render a readable version of a
standards-based page, whereas some browsers will have problems rendering table-based
data, invalidating your design. What should you implement in your design to mitigate these
concerns?
A. A NAS solution that tracks users browser use
B. A SAN solution that tracks users browser use
C. A NAS solution that segregates the data types
for browser reading
D. A SAN solution that segregates the data types
for browser reading
|
|
Definition
|
|
Term
Question: 81
You have been tasked with designing an iSCSI based storage network that support 24 servers at
a primary location attached to a 2TB storage array including a tape library with four tape drives. In addition, there are 18 branch offices each with at least one Windows server that eeds to gain access to primary storage, tape, and file sharing. Which two should be considered as part of his design? (Choose two.)
A. Determine if current switches support 802.11g
and jumbo frames.
B. Upgrade the remote network to 1Gb to every
device and install iSCSI hardware adapters.
C. Assess network topology (bandwidth, available
ports, current workload) and file server
utilization and the onnectivity needs of
storage and tape.
D. Look at available network bandwidth at
primary location and to remote facilities and
ability of current nfrastructure to support more
devices and bandwidth.
|
|
Definition
|
|
Term
Question: 82
A company is adding a NAS solution to its existing infrastructure. Their current network
infrastructure is overloaded. After implementing the NAS solution what will the network
experience?
A. Decreased latency
B. Increased latency
C. No change in latency
D. Decreased latency and improved security
|
|
Definition
|
|
Term
Question: 83
Which statement is correct?
A. Fan-out is the ratio of switch ports to host
ports; and indication of switch load at a single
host port.
B. B. Fan-out is the ratio of storage ports to host
ports; an indication of storage load at a single
host port.
C. Fan-out is the ratio of switch ports to storage
ports; an indication of switch load at a single
storage port.
D. Fan-out is the ratio of host ports to storage
ports; an indication of host traffic load at a
single storage port.
|
|
Definition
|
|