Storage Networking Management and Administration v6.0 (S10-210)

Page:    1 / 7   
Total 97 questions

You need to merge two existing FC fabrics. After connecting the ISL to join the fabrics,numerous switches segment.
What should be done to prevent the segmentation?

  • A. Physically separate the switches to opposite sides of the data center.
  • B. Move business critical applications to clusters.
  • C. Increase the frequency of snapshots for critical data.
  • D. Assign domain IDs which are unique across both fabrics.

Answer : D

You have determined that the root cause of your problem is related to invalid characters being intermittently transmitted on your 4 Gb FC link.
What describes this condition?

  • A. Disparity error character
  • B. Link hardware cannot detect k28.3 characters
  • C. Link hardware cannot detect k28.5 characters
  • D. Character does not fit in allowed 8b/10b codes or special characters

Answer : D

You are provisioning storage to a host with multipathing software installed and correctly configured. You discover that there are four paths to LUNs instead of the expected eight paths.
Why does this happen?

  • A. Incorrect zoning
  • B. Incorrect multipathing policy
  • C. Incorrect LUN masking
  • D. Incorrect LUN size

Answer : A

Which process allows for the reduction of disk space consumption on a shared storage of
OS images used by 200 users?

  • A. Thin provisioning
  • B. Deduplication
  • C. Synchronous replication
  • D. Defragmentation

Answer : B

Click the Exhibit button.
Which protocol is represented in the exhibit?

  • A. iSCSI
  • B. IPv6 Ethernet
  • C. IPv4 Ethernet
  • D. FCoE

Answer : C

Your company does a full backup on Sunday night and incremental backups from Monday through Saturday at midnight. The full backup requires two tapes and each incremental backup requires one tape. There is a system failure Wednesday morning.
How many tapes will be used to restore to the most current backup?

  • A. 1
  • B. 3
  • C. 4
  • D. 8

Answer : C

You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.
Which data protection method should be used in this case?

  • A. Encrypting data-in-flight
  • B. Encrypting data-at-rest
  • C. Password protect each file
  • D. Use file permissions

Answer : B

You need to implement a solution for a high transaction database which should have the lowest write latency as possible and still be able to sustain a failure of a single drive in a
RAID group.
Which type of RAID you would use?

  • A. RAID 0
  • B. RAID 5
  • C. RAID 6
  • D. RAID 10

Answer : C

You determine that throughput between a server and an FC storage array is lower than expected.
Your privileges only allow you to change the configuration of the HBA on the server.
Which configuration setting can you change to increase throughput?

  • A. Queue length
  • B. Queue depth
  • C. Topology
  • D. Class 1 service

Answer : B

A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)

  • A. HTTPS
  • B. Telnet
  • C. SSH
  • D. SNMPv1

Answer : B,D

You are asked to set up a server to boot from a SAN.
Which setting on the HBA needs to be configured?

  • A. Change the queue depth value.
  • B. Set Enable BIOS.
  • C. Enable Persistent Bindings.
  • D. Set Enable Target Rescan.

Answer : B

A small business with an IP SAN and NAS storage is experiencing slow response times on the servers which have NAS storage resources.
Which two should the storage administrator monitor to determine the root cause? (Choose two.)

  • A. Latency per NAS port
  • B. IOPS per NAS port
  • C. Link speed per NAS port
  • D. MBps per NAS port
  • E. I question the question

Answer : B,D

A database administrator (DBA) is complaining of slow write performance to a storage array. The DBA would like to have access to real-time performance reporting of the storage array to correlate array performance with database performance.
Following SNIA Storage Security Best Current Practices, what should you do while limiting administrative complexity?

  • A. Create a generic administrative ID with limited administrative rights to the storage array and provide it to all members of your organization's DBA team for performance troubleshooting.
  • B. Create a read-only view of performance graphs for the LUNs presented to database hosts and add the DBAs user ID access.
  • C. Create a nested administrative sub-group that has access to all performance data and
  • D. administrative settings for the LUNs presented to database hosts and add the DBAs user ID to the nested sub-group.
  • E. Create a nested administrative sub-group that has access to all performance data and
  • F. administrative settings for the LUNs presented to database hosts and add the DBA team's user group to the nested sub-group.

Answer : B

Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.
Which two FC provided mechanisms would you implement first? (Choose two.)

  • A. LUN masking
  • B. Device authentication and authorization
  • C. Zoning
  • D. Key management system

Answer : A,C

You are asked to secure management access to your SAN devices.
Which three actions should you perform? (Choose three.)

  • A. Disable all unused protocols.
  • B. Limit network access.
  • C. Create individual access accounts.
  • D. Write to the syslog server.
  • E. Enable NTP synchronization.

Answer : A,B,C

Page:    1 / 7   
Total 97 questions