Click here to load reader
Upload
andre-cabelo
View
88
Download
0
Tags:
Embed Size (px)
Citation preview
Which layer defines the structure, and organization of FC data?
FC-1
FC-2
FC-4
FC-0
What is a purpose of zoning?
To provide a logical connection between array ports and host HBAs
To isolate switch ports into separate logical SANs
To provide a logical connection between LUNs on two storage arrays
To provide a logical connection from LUNs on a storage array to different HBAs
Which EMC ControlCenter component gathers the information about Managed Objects?
Agent
Repository
Store
Server
Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target?
Log shipping
Asynchronous
Logical Volume Manager
Synchronous
What is a characteristic of an integrated NAS system?
Pooled and centralized storage
Allows host to connect directly to the storage array
Offers multiple connectivity options with the back-end
Allows access to under-utilized SAN storage
What is true about virtual machines?
Created on the concatenated server
Created on server with only internal storage
Created on the same physical server
Created on the same logical server
Which statement applies to integrated NAS systems?
NAS components and storage arrays are both managed by array management software
NAS components are managed by NAS software and storage arrays are managed by array software
NAS components and storage arrays are managed by NAS software
Integrated NAS systems require an external storage array connection
In a 5 disk RAID 5 implementation, what is the storage capacity overhead?
80%
20%
100%
25%
Which SAN management activity includes volume provisioning?
Formatting
Storage allocation
Concatenation
Partitioning
How can you recover from a loss of confidentiality?
Confidentiality cannot be recovered
Combine detective and preventive controls to prevent the loss
Implement backup and restore processes
Deterrent controls are sufficient to prevent the loss
Which cache flushing technique has the highest impact on the host I/O processing?
Forced flushing
Low watermark flushing
High watermark flushing
Idle flushing
What is a basic feature of a CAS implementation?
Object name resolution using DNS
Distributed object management
Object transport via Fibre Channel
Globally unique identifier for every data object
In an EMC CLARiiON remote replication solution, what is the relationship between the sizes of the primary and secondary MirrorView/A LUNs?
The primary must be smaller than or equal to the secondary
The primary must be smaller than the secondary
The primary must be larger than or equal to the secondary
The primary must be the same size as the secondary
What is the correct sequence of operations for data object retrieval in CAS? 1. Retrieval request is sent to the CAS via CAS API over IP 2. Application finds Content Address of object to be retrieved 3. CAS authenticates the request and delivers the object 4. Object is needed by an application
3-1-2-4
4-2-1-3
1-4-3-2
1-3-2-4
What is a purpose of iSNS?
To translate iQN-format names into EUI-format names
To assist with discovery of iSCSI targets
To implement TCP offload for better bandwidth
To translate EUI-format names into iQN-format names
You are backing up two file systems from two servers over the LAN: • Backup client A with 10 files, 100 MB each and • Backup client B with 1000 files, 1 MB each. What will happen under identical backup infrastructures?
B will generate more catalog entries
A will generate more catalog entries
A and B will take the same time to complete
A will take more time to complete
What does a push operation in SAN based remote replication indicates?
Data is pushed from one control array to another control control array
Data is pushed from control array to remote array
Data is pushed from one remote array to another control remote array
Data is pushed from remote array to control array
By spoofing the identity of a remote storage site, which two security objectives can be violated?
Availability and integrity
Confidentiality and integrity
Confidentiality and availability
Confidentiality and authenticity
Which component of an intelligent storage system provides host connectivity?
Cache
Back-end
Front-end
Physical disks
In a backup and recovery environment, what is a benefit of sending multiple streams versus a single stream of backup data to tape?
Improved recovery time objective
Improved media utilization
Reduced recovery time
Improved write performance
How is “auditing” defined in the context of storage security?
Writing an audit record for each transaction involving storage
Reading and analyzing logs to show that a security policy is being enforced
Verifying integrity of all data blocks
Recording login activities on all servers accessing storage
How does EMC Invista appear to the host and storage?
Virtual initiator and Virtual target
Target and Initiator
Initiator and Target
Virtual target and Virtual initiator
Which cache algorithm will optimize a storage array’s I/O response time if sequential access is detected?
Read Ahead
Write-back
Flushing
Write-through
Which four activities are included in the process of developing an ILM strategy?
Analyzing, Implementing, Testing, Managing
Planning, Analyzing, Implementing, Testing
Classifying, Implementing, Managing, Organizing
Designing, Planning, Classifying, Managing
If the communication link between a mirror's primary image and its secondary image fails during an EMC CLARiiON MirrorView/A remote replication, what is the state of the secondary image?
Synchronizing
Inconsistent
Independent
Fractured
Who can be member of a zone?
NIC Cards
Nodes within SAN
ISL Trunks
ToE cards
Which statement describes Content Address (CA)?
An identifier that uniquely addresses the content of a file but not its location
An identifier that uniquely addresses the content, quality, condition, and other characteristics of data
An identifier that uniquely addresses the name and location of a file
An address that enables communication between CAS objects
What is a disadvantage of a Fibre Channel hub when compared to a Fibre Channel switch?
Larger footprint
Limited interoperability
Limited performance
Higher cost
What is the role of virtualization technology?
Physical view of logical resources while preserving the usage interfaces
Physical view of logical resources with appropriate modifications of the usage interfaces
Logical view of physical resources while preserving the usage interfaces
Logical view of physical resources with appropriate modifications of the usage interfaces
Which component of the EMC ControlCenter displays information about managed objects?
Console
Repository
Server
Store
What is true about a file in the file system?
Can span multiple file system blocks
It is a smallest container of physical disk space
It must be mounted before use
Is always a contiguous area on physical disk
Which key requirement for data center elements can be achieved through automation of common tasks?
Availability
Scalability
Manageability
Data integrity
What is Meta-LUN?
LUN that stores mirroring information
LUN that stores meta-data
Formed by aggregating other LUNs
Formed by partitioning other LUNs
What happens when the EMC TimeFinder/Mirror split operation is performed?
All data from the BCV is copied to the standard volume
All data from the standard volume is copied to the BCV
Data is copied incrementally from the standard volume to the BCV
The BCV is made independently accessible
On what basis is information moved from one storage tier to another in a tiered storage approach?
Size of the tier
Cost of the tier
Value of information
Size of information
Which kind of replication requires ongoing involvement from the host to manage the replication?
Asynchronous
Disk buffered
Log shipping
Synchronous
What does the Rainfinity appliance use to provide data virtualization?
Control path cluster
VSAN
Infiniband
Global namespace manager
To ensure a consistent copy, when should application I/O be held?
Just before writing to storage array cache
Just prior to creating a point in time replica
Just after creating a point in time replica
Just after writing to storage array cache
Which metrics should be used to determine bandwidth requirements for asynchronous remote replication?
Peak Writes
Average Reads
Average Writes
Peak Reads
What is a benefit of a NAS solution?
Offers improved network bandwidth
Enables access to data with unique object IDs
Provides improved application block level I/O performance
Enables data sharing across host platforms
In a SAN-based backup environment, how does metadata travel?
Over SAN
Over LAN
Over both SAN and LAN
Over the same path as the data
What is an advantage of synchronous remote replication compared to asynchronous replication?
Less expensive
Lower data loss in the event of a disaster
Lower network bandwidth requirement
Usable over long distances
What is an accurate statement about a disk drive function?
Rotation speed of a spindle is varied to keep the head flying height constant
Rotation speed of a spindle depends on the disk zone being accessed
A spindle rotates at a constant speed
Individual platters on a spindle may rotate at different speeds
To ensure a consistent copy, when should application I/O be held?
Just prior to creating a point in time replica
Just before writing to storage array cache
Just after writing to storage array cache
Just after creating a point in time replica
Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target?
Logical Volume Manager
Asynchronous
Synchronous
Log shipping
What does a push operation in SAN based remote replication indicates?
Data is pushed from remote array to control array
Data is pushed from one control array to another control control array
Data is pushed from one remote array to another control remote array
Data is pushed from control array to remote array
In the context of security vulnerability management, what is the effect of increasing the work factor?
Decreases the number of steps in an attack vector
Increases the likelihood that the exploit will be discovered
Increases the time necessary to perform the exploit
Decreases the attack surface of the component in question
When is data copied from the source to the target using Copy on First Access replica technology?
All writes are issued to a location on the source
All reads are issued to a location on the source
A read is issued for the first time to a location on the source
A write is issued for the first time to a location on the source
An organization performs a full backup on 1st of every month. It takes a cumulative backup every Sunday and incremental backup everyday. On last Monday of the month, at 8:00 A.M. the file system gets corrupted. How many backups will be needed to recover the file system?
31
29
5
2
What is a purpose of zoning?
To provide a logical connection between LUNs on two storage arrays
To isolate switch ports into separate logical SANs
To provide a logical connection from LUNs on a storage array to different HBAs
To provide a logical connection between array ports and host HBAs
Which SAN connectivity option offers the greatest degree of scalability?
Core-Edge
Full Mesh
Switched Fabric
Arbitrated Loop
What happens when the EMC TimeFinder/Mirror split operation is performed?
The BCV is made independently accessible
All data from the BCV is copied to the standard volume
Data is copied incrementally from the standard volume to the BCV
All data from the standard volume is copied to the BCV
A company has a Recovery Point Objective (RPO) of four hours. What does this RPO mean in the event of a disaster?
Production must be resumed within four hours
A restartable copy of data must be obtained within four hours
Restore from backup must occur within four hours
No more than four hours of production data can be lost
Which cache flushing technique has the highest impact on the host I/O processing?
Idle flushing
Low watermark flushing
High watermark flushing
Forced flushing
For which remote replication technology is host involvement an absolute requirement?
Asynchronous
Synchronous
Disk buffered consistent point in time copies
Logical volume manager mirroring
What provides a layer of abstraction between the operating systems and the underlying hardware?
Virtual memory
Virtual storage
Virtual servers
Virtual networks