You are on page 1of 13

Question 1:

A "Logical Volume Manager" helps in

Virtualizing storage

provide direct access to the underlying storage

Manage disk space efficiently without having to know the actual hardware details

Both storage virtualization and efficient disk space management

Question 2:

Which topology is best suited for medium sized enterprise.

NAS

SAN

DAS

CAS

Question 3:

Pick the wrong statement about the hard disk?

Hard disk has multiple platters and each platter has two read/write heads one on each side

It's a non-volatile & random access storage device

Hard disk can only have IDE or USB interface

Data Transfer rate is over 80 MBPS

Question 4:

CHAP secrets are usually random secrets of____characters

10 to 128

12 to 128

12 to 124

10 to 32

Question 5:

What is the minimum number of disks needed for Raid level 5?


2

Question 6:

___methods for Storage Array-Based Local Replication?

LVM-Based Replication

File System Snapshot

LUN-Based Replication

Full-Volume Mirroring

Question 7:

__enables restarting business operations using the replicas

Restartability

Recoverability

production

The PIT replica

Question 8:

which activity is not performed the key storage infrastructure management in a data center.

Availability Management

Capacity Management

Performance Management

Network Management

Question 9:
___is an easy-to-use management tool for encrypting keys at the database, fi le server, and
storage layers.

Application Encryption and Tokenization

Tokenization

Application Encryption

Enterprise key management

Question 10:

File access protocols operate in which layer of the OSI model

Application

Session

Transport

Data link

Question 11:

CIFS runs over the following protocols:

TCP/IP

FTP

SNMP

DNS

Question 12:

You need to consolidate a storage environment. The applications require high bandwidth
and block level I/O Which Storage solution meets these requirements

CAS

DAS

NAS

SAN
Question 13:

__is encapsulation of SCSI I/O over IP.

Internet SCSI

TCP

RIP

FCIP

Question 14:

____are performed for various reasons, such as migrating from a smaller capacity LUN to
one of a larger capacity for newer versions of the application.

Data migrations

Testing platform

Fast recovery

Alternative source for backup

Question 15:

In____replication, the logical volume manager is responsible for creating and controlling the
host-level logical volumes.

LUN-Based

LVM-based

LUN-Based

Storage Array-Based

Question 16:

___is purpose for testing new applications or upgrades

Alternative source for backup

Fast recovery

Testing platform
Data migration

Question 17:

Which of the Following is not an off-line storage device?

Tape Cartridge

Flash Memory

Tape Library

CD-ROM

Question 18:

Which three statements describe differences between Storage Area Network (SAN) and
Network Attached Storage (NAS) solutions? Choose three. i. SAN is generally more
expensive but provides higher performance ii. NAS uses TCP/IP for communication between
hosts and the NAS server ill. NAS requires additional hardware on a host a host bus adapter
for connectivity iv. SAN uses proprietary protocols for communication between hosts and the
SAN fabric

i, ii, iii

i, ii, iV

ii, iii, iV

i, ii, iii

Question 19:

On intelligent arrays, write data is first placed in___and then written to disk

Cache

Front End

Host

Network

Question 20:

___cable carries multiple beams of light projected at different angles simultaneously onto the
core of the cable

Multimode fiber

Singlemode Fiber
Two mode fiber

Simple Fiber

Question 21:

What is the advantage of SAN when Compared to NAS?

No retraining is required to manage

Provides file and object level access

Enables audit trails for change management

Provides block level access

Question 22:

Pick the false statement

RAID Level 1 provides disk mirroring

RAID Level 2 provides bit level striping with Hamming code ECC

RAID Level 4 provides block level striping

RAID Level 5 provides block level striping and error correction information

Question 23:

___provides end-to-end congestion management for protocols, such FCOE, that do not have
built-in congestion control mechanisms.

Enhanced Transmission Selection

Priority-based flow control

Congestion Notification

Converged Enhanced Ethernet

Question 24

In an intelligent storage system, front end provides the interface between___and_

Cache, Physical Disk

Cache, Host

Storage System, Host


Storage System, Physical Disks

Question 25:

___is a technology used for network-based local and remote replications

Continuous data protection

Synchronous data protection

Asynchronous data protection

Resynchronous data protection

Question 26:

____port in a switched fabric is an end point in the fabric.

Expansion port

Fabric Port

Node Port

Generic Port

Question 27:

What is the process that writes physical address information to disk

Concatenating

Formatting

partitioning

Striping

Question 28:

What is the purpose of a blckup?

Prevent unauthorized access to data

Prevent data corruption

Restore the original data in the event of data loss

Allow multiple simultaneous access of data


Question 29:

CIFS was originally derived from

PCB

NTFS

SMB

NIS

Question 30:

When a____is issued to the source for the first time after replication session activation, the
original data at that address is copied to the target. After this operation, the new data is
updated on the source

read

write

request

Response

Question 31:

Cache is organized into___which is the smallest unit of cache allocation.

Tracks

Pages

Sectors

Segments

Question 32:

____helps to track unauthorized configuration of the storage array and ensures that only
authorized users are allowed to access it

Information assurance
Information Lifecycle Management

Demilitarized zone

Monitoring security

Question 33:

Which term refers to the information that can be accessed on a disk drive by all the heads
without having to seek

sector

cylinder

read cache

parity partition

Question 34:

____is an identical image of the source at some specific timestamp

production host

Target

The PIT replica

Fast recovery

Question 35:

____refers to the various entry points that an attacker can use to launch an attack & An
attacker can use all the external interfaces supported by that component to execute various
attacks.

work factor

attack vector

Attack surface

Repudiation
Question 36:

which are the products in the RSA Data Protection Manager family..

Application Decryption and Tokenization Enterprise Key Management.

Application Encryption and Tokenization Enterprise Key Management.

Application Decryption and Tokenization Enterprise Management.

Application Encryption and Tokenization Enterprise Management.

Question 37:

Which statement is true of parity based RAID

Parity is read each time a read is performed

Parity is read only when a full stripe is read

Parity is updated each time a writee is performed

Parity is updated when writes fill a stripe

Question 38:

An algorithm that continuously monitors data access in cache and identifies the cache pages
that have not been accessed for a long time is called as__

Least Recently Used (LRU)

Most Recently Used (MRU)

Not Recently Used

Very Recently Used

Question 39:

Which utility typically enables abstraction of storage within a server

LVM

Switch Zoning

SAN appliance
SMI-S monitioring tool

Question 40:

Which one is not risk terms in Risk Triad.

threats

Domain

assets

Vulnerabilities

Question 41:

Security Zones A in FC SAN is

Switch to Switch

Access Control-Switch OOO

Authentication at the Management Console

Switch to Storage

Question 42:

SAN implementations use___

Twisted Pair Cables

Coaxial Cables

Optical fiber cabling

Radio Waves
Question 43:

What is the advantage of NAS?

Is appropriate for block level access

uses existing network infrastructure

Is not limited to the throughout of the LAN

Is not impacted by traffic on the LAN

Question 44:

Security Zones G in FC SAN is

Switch to Storage

Distance Extension

Access Control-Switches

Firewall

Question 45:

When the file system replication and check process are completed, the replica file system
can be___ for operational use.

pulled

flushed

mounted

Received

Question 46:

When the replica is created, all the writes to the source devices must be captured on the
replica devices to ensure data___
inconsistent

Asynchronous

consistency

synchronous

Question 47:

Your Government has aregulation stating that financial data must be kept for seven years
which type of backup statisfies this regulation__

Archive

Disaster Recovery

Block level

Operational

Question 48:

Within an Internet SCSI session, _____is used to sequentially number status responses

Status sequence number

Internet SCSI Discovery

Internet SCSI PDU

Command Sequence Number

Question 50:

____is a step or a series of steps necessary to complete an attack.

attack vector

integrity

Attack surface

assets

You might also like