Professional Documents
Culture Documents
Virtualizing storage
Manage disk space efficiently without having to know the actual hardware details
Question 2:
NAS
SAN
DAS
CAS
Question 3:
Hard disk has multiple platters and each platter has two read/write heads one on each side
Question 4:
10 to 128
12 to 128
12 to 124
10 to 32
Question 5:
Question 6:
LVM-Based Replication
LUN-Based Replication
Full-Volume Mirroring
Question 7:
Restartability
Recoverability
production
Question 8:
which activity is not performed the key storage infrastructure management in a data center.
Availability Management
Capacity Management
Performance Management
Network Management
Question 9:
___is an easy-to-use management tool for encrypting keys at the database, fi le server, and
storage layers.
Tokenization
Application Encryption
Question 10:
Application
Session
Transport
Data link
Question 11:
TCP/IP
FTP
SNMP
DNS
Question 12:
You need to consolidate a storage environment. The applications require high bandwidth
and block level I/O Which Storage solution meets these requirements
CAS
DAS
NAS
SAN
Question 13:
Internet SCSI
TCP
RIP
FCIP
Question 14:
____are performed for various reasons, such as migrating from a smaller capacity LUN to
one of a larger capacity for newer versions of the application.
Data migrations
Testing platform
Fast recovery
Question 15:
In____replication, the logical volume manager is responsible for creating and controlling the
host-level logical volumes.
LUN-Based
LVM-based
LUN-Based
Storage Array-Based
Question 16:
Fast recovery
Testing platform
Data migration
Question 17:
Tape Cartridge
Flash Memory
Tape Library
CD-ROM
Question 18:
Which three statements describe differences between Storage Area Network (SAN) and
Network Attached Storage (NAS) solutions? Choose three. i. SAN is generally more
expensive but provides higher performance ii. NAS uses TCP/IP for communication between
hosts and the NAS server ill. NAS requires additional hardware on a host a host bus adapter
for connectivity iv. SAN uses proprietary protocols for communication between hosts and the
SAN fabric
i, ii, iii
i, ii, iV
ii, iii, iV
i, ii, iii
Question 19:
On intelligent arrays, write data is first placed in___and then written to disk
Cache
Front End
Host
Network
Question 20:
___cable carries multiple beams of light projected at different angles simultaneously onto the
core of the cable
Multimode fiber
Singlemode Fiber
Two mode fiber
Simple Fiber
Question 21:
Question 22:
RAID Level 2 provides bit level striping with Hamming code ECC
RAID Level 5 provides block level striping and error correction information
Question 23:
___provides end-to-end congestion management for protocols, such FCOE, that do not have
built-in congestion control mechanisms.
Congestion Notification
Question 24
Cache, Host
Question 25:
Question 26:
Expansion port
Fabric Port
Node Port
Generic Port
Question 27:
Concatenating
Formatting
partitioning
Striping
Question 28:
PCB
NTFS
SMB
NIS
Question 30:
When a____is issued to the source for the first time after replication session activation, the
original data at that address is copied to the target. After this operation, the new data is
updated on the source
read
write
request
Response
Question 31:
Tracks
Pages
Sectors
Segments
Question 32:
____helps to track unauthorized configuration of the storage array and ensures that only
authorized users are allowed to access it
Information assurance
Information Lifecycle Management
Demilitarized zone
Monitoring security
Question 33:
Which term refers to the information that can be accessed on a disk drive by all the heads
without having to seek
sector
cylinder
read cache
parity partition
Question 34:
production host
Target
Fast recovery
Question 35:
____refers to the various entry points that an attacker can use to launch an attack & An
attacker can use all the external interfaces supported by that component to execute various
attacks.
work factor
attack vector
Attack surface
Repudiation
Question 36:
which are the products in the RSA Data Protection Manager family..
Question 37:
Question 38:
An algorithm that continuously monitors data access in cache and identifies the cache pages
that have not been accessed for a long time is called as__
Question 39:
LVM
Switch Zoning
SAN appliance
SMI-S monitioring tool
Question 40:
threats
Domain
assets
Vulnerabilities
Question 41:
Switch to Switch
Switch to Storage
Question 42:
Coaxial Cables
Radio Waves
Question 43:
Question 44:
Switch to Storage
Distance Extension
Access Control-Switches
Firewall
Question 45:
When the file system replication and check process are completed, the replica file system
can be___ for operational use.
pulled
flushed
mounted
Received
Question 46:
When the replica is created, all the writes to the source devices must be captured on the
replica devices to ensure data___
inconsistent
Asynchronous
consistency
synchronous
Question 47:
Your Government has aregulation stating that financial data must be kept for seven years
which type of backup statisfies this regulation__
Archive
Disaster Recovery
Block level
Operational
Question 48:
Within an Internet SCSI session, _____is used to sequentially number status responses
Question 50:
attack vector
integrity
Attack surface
assets