Professional Documents
Culture Documents
Emerging Technologies
Emerging Technologies
staff accesses
the X-ray records through a Gigabit Ethernet backbone. Storage array provides st
orage to the
UNIX server, which has 6 terabytes of usable capacity.
(a) Explain the core elements of the data center. What are the typical challenge
s the
storage management team may face in meeting the service-level demands of the hos
pital
staff?
(b) Describe how the value of this patient data might change over time.
Assignment C
1. Which cache management algorithm is based on the assumption that data will no
t be requested
by the host when it has not been accessed for a while?
A. LRU
B. HWM
C. LWM
D. MRU
2. What does the area ID of the FC address identify?
A. Group of ports within a switch
B. An individual port within a fabric
C. Location of the name server within the fabric
D. Unique number provided to each switch in the fabric
3. An organization performs copy on first access (CoFA) replication to create a
local replica of
application data. To perform a successful restore, what should be considered?
A. Source devices must be healthy
B. Save location size must be larger than the size of all source devices
C. Save location size must be equa l to the size of all source devices
D. All changes to the source and replica must be discarded before the restore st
arts
4. Which host component eliminates the need to deploy separate adapters for FC a
nd Ethernet
communications?
A. Converged network adapter
B. TCP Offload Engine NIC
C. FCIP bridging adapter
D. iSCSI host bus adapter
5. What is a function of unified management software in cloud computing?
A. Defining cloud service attributes
B. Consolidating infrastructure resources scattered across one or more data cent
ers
C. Metering based on usage of resources by the consumer
D. Providing an interface to consumers to request cloud services
6. Which EMC product provides the capability to recover data up to any point-intime?
A. RecoverPoint
B. NetWorker
C. Avamar
D. Data Domain
7. What is needed to perform a non-disruptive migration of virtual machines (VMs
) between
hypervisors?
A. Hypervisors must have access to the same storage volume
B. Physical machines running hypervisors must have the same configuration
C. Hypervisors must be running within the same physical machine
D. Both hypervisors must have the same IP address
8. Which iSCSI name requires an organization to own a registered domain name?
A. IQN
B. EUI
C. WWNN
D. WWPN
9. Which data center requirement refers to applying mechanisms that ensure data
is stored and
retrieved as it was received?
A. Integrity
B. Availability
C. Security
D. Performance
10. What describes a landing zone in a disk drive?
A. Area on which the read/write head rests
B. Area where the read/write head lands to access data
C. Area where the data is buffered before writing to platters
D. Area where sector-specific information is stored on the disk
11.Clients use which protocol to discover SMI Agents on Storage Area Network?
a. SLP (Service Location Protocol)
b. AGP(Agent Discovery Protocol)
c. SMIP (SMI Protocol)
12. __________ is the capability to continue as if nothing has happened, even af
ter a major
component failure.
A) redundancy
B) interoperability
C) fault tolerance
D) backup
13. Striping with parity is also known as RAID __________.
A) 0
B) 1
C) 4
D) 6
14. A storage device that is connected directly to a network is an example of __
________.
A) network attached storage
B) storage area network
C) direct attached storage
D) RAID
15 Identify a network file protocol in the below mentioned set.
a. FC
b. CIFS
c. SCSI
d. NAS
16. More than one of the same component is an example of a __________ system.
A) scalable
B) redundant
C) RAID
D) back-up
17. Which one of the below is measured by MTBF?
a. Tolerance
b. Life time
c. Reliability
d. Quality
18. The purpose of backup is:
a. To restore a computer to an operational state following a disaster
b. To restore small numbers of files after they have been accidentally deleted
c. Is to free space in the primary storage
d. None of the above
a. FC Protocol
b. iSCSI
c. TCP/IP stack
d. Any one of the above
32. The drawback of data mirroring is
a. Backing up the data
b. Performance degradation
c. Difficulty involved in configuring the mirrored volume
33. With reference to Volume Manager, is the following statement TRUE or FALSE u
nder
specific configuration?
- Volume manager provides protection against multiple disk failures
a. True
b. False
34. Which are all the statements valid statements w.r.t volume manager
a. Achieve protection against single/multiple disk failures
b. Sustain system/node failure
c. Get better performance compared to using individual disk
d. All the above
35. Point out the false statement. Volume can
a. Span across different partitions/disks
b. Span across different disk arrays
c. Be created on tape device
d. Be a shared volume
36. Identify the correct statements w.r.t. Journal File System (JFS)
a. JFS keeps pointers to all the stale data
b. While recovering data on a system, JFS helps in quicker recovery
c. All the above
37 Which topology is best suited for medium sized enterprise.
a. NAS
b. SAN
c. DAS
38. What is the most basic level of storage
a. SAN
b. DAS
c. NAS
d. ISCSI
39. Which three statements describe differences between Storage Area Network (SA
N) and
Network Attached Storage (NAS) solutions? Choose three.
a. SAN is generally more expensive but provides higher performance
b. NAS uses TCP/IP for communication between hosts and the NAS server
c. NAS requires additional hardware on a host: a host bus adapter for connectivi
ty
d. SAN uses proprietary protocols for communication between hosts and the SAN fa
bric
40. Demerits of DAS are. Choose two.
a. Interconnect limited to 10km
b. Excessive network traffic
c. Distance limitations
d. Inability to share data with other servers
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com