You need to merge two existing FC fabrics. After connecting the ISL to join the fabrics,numerous switches segment.
What should be done to prevent the segmentation?
Answer : D
You have determined that the root cause of your problem is related to invalid characters being intermittently transmitted on your 4 Gb FC link.
What describes this condition?
Answer : D
You are provisioning storage to a host with multipathing software installed and correctly configured. You discover that there are four paths to LUNs instead of the expected eight paths.
Why does this happen?
Answer : A
Which process allows for the reduction of disk space consumption on a shared storage of
OS images used by 200 users?
Answer : B
Click the Exhibit button.
Which protocol is represented in the exhibit?
Answer : C
Your company does a full backup on Sunday night and incremental backups from Monday through Saturday at midnight. The full backup requires two tapes and each incremental backup requires one tape. There is a system failure Wednesday morning.
How many tapes will be used to restore to the most current backup?
Answer : C
You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.
Which data protection method should be used in this case?
Answer : B
You need to implement a solution for a high transaction database which should have the lowest write latency as possible and still be able to sustain a failure of a single drive in a
RAID group.
Which type of RAID you would use?
Answer : C
You determine that throughput between a server and an FC storage array is lower than expected.
Your privileges only allow you to change the configuration of the HBA on the server.
Which configuration setting can you change to increase throughput?
Answer : B
A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)
Answer : B,D
You are asked to set up a server to boot from a SAN.
Which setting on the HBA needs to be configured?
Answer : B
A small business with an IP SAN and NAS storage is experiencing slow response times on the servers which have NAS storage resources.
Which two should the storage administrator monitor to determine the root cause? (Choose two.)
Answer : B,D
A database administrator (DBA) is complaining of slow write performance to a storage array. The DBA would like to have access to real-time performance reporting of the storage array to correlate array performance with database performance.
Following SNIA Storage Security Best Current Practices, what should you do while limiting administrative complexity?
Answer : B
Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.
Which two FC provided mechanisms would you implement first? (Choose two.)
Answer : A,C
You are asked to secure management access to your SAN devices.
Which three actions should you perform? (Choose three.)
Answer : A,B,C