What is Software Defined Storage?
virtualized storage with a Fibre Channel interface
virtualized storage with an Ethernet interface
physical storage with a service management interface
virtualized storage with a service management interface
Which entity is responsible for making cloud services available for cloud consumers?
cloud provider
cloud auditor
cloud storage
cloud infrastructure
What is a SNIA standard that defines an interface used by applications to create, retrieve, update and delete elements from the cloud?
FTP
CDMI
S3
SFTP
A customer is considering mixing disk technologies in the same storage array to provide additional capabilities that they require. In this scenario, what would be a benefit of doing this?
to allow for more encrypted data to be stored on the array
to improve the performance of the array
to perform compression before writing data to the HDDs
to perform deduplication before writing data to the HDDs
Which two technologies use NAND flash memory (non-volatile) technology to store data? (Choose two.)
quad-level cell (QLC)
single-level cell (SLC)
interim-level cell (ILC)
mufti -level cell (MLC)
What are two requirements of a server cluster with regards to storage technologies? (Choose two.)
a switch fabric
a file locking mechanism
a back-end storage database
shared storage
What is the default port that iSCSI traffic uses?
443
3260
80
53
According to SNIA, what is a data structure signed with a digital signature that is based using a public key and confirms that the key belongs to the subject identified in the structure called?
secure key
certificate
public key
private key
A physical server is having a native or bare-metal hypervisor installed before being deployed. In this scenario, which statement is correct?
The hypervisor runs as a program on a host operating system and supports only one instance of a virtual server
The hypervisor runs directly on the server hardware and supports the creation of multiple concurrent instances of virtual servers
The hypervisor runs directly on the server hardware and supports the creation of only one instance of a virtual server.
The hypervisor runs as a program on a host operating system and supports multiple concurrent instances of virtual servers.
What is an implementation of a secure, multi-tenant cloud environment that is externally available to all users?
private
public
secure
hybrid
What are two scenarios where using disk replication is a valid risk mitigation strategy? (Choose two.)
a primary storage array non-recoverable hardware failure
an extended power failure at the primary site
information destruction due to a security breach
system instability due to a bad OS updatesystem instability due to a bad OS update
Which interface is used for 40GbE?
Twinax
Small Form Factor pluggable (SFP+)
multimode fiber (MMF)
Quad Small Form Factor pluggable {QSFP+)
You have a RAID 5 set with five disks at 400 GB each. Approximately how much usable space would this configuration yield?
1 terabyte
2 terabytes
1.2 terabytes
16 terabytes
What are the requirements for a boot from SAN? (Choose two.)
Zoning of the LUN containing the OS image is required
An active path to the LUN is required.
The host server and storage should be from the same vendor
Only CNAs can be used
Which statement describes an N_Port login?
a process by which a server HBA port logs in to a fabric
a process by which FC initiators establish sessions with targets
a process by which users obtain access to a host
a process by which two FC-4 layer processes establish communication
What are two characteristics of Challenge-Handshake Authentication Protocol (CHAP)? (Choose two.)
CHAP uses a hash mechanism so the clear text authentication piece is never sent.CHAP uses a hash mechanism so the clear text authentication piece is never sent.
CHAP uses a parity algorithm to jumble the credentials for security.
CHAP uses a Point-to-Point Protocol (PPP) method.
CHAP is required for iSCSI initiator authentication
What is the purpose of a host bus adapter (HBA)?
to connect a switch port to front end storage
to provide host backups to tape media
to connect a host to a switch
to use a host CPU to interface with storage controllers
Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)
internet Protocol Security (IPsec)
ACLs
encryption at rest
Challenge Handshake Authentication Protocol (CHAP)
Which level of data access does a SAN device provide compared to NAS?
file access
block access
packet access
object access
What would be placed in a Fibre Channel zone?
Ip address
MAC address
IQN of an initiator
World Wide Port Name (WWPN)
You want to replace multiple copies of data, at variable levels of granularity, with references to a shared copy to save storage space and/or bandwidth. Which data reduction method would satisfy the requirement?
deduplication
compression
thin provisioning
conditioning
According to SNIA, what is the term that describes a mechanism allocating the physical capacity of a volume or file system as applications write data?
thick provisioning
hybrid provisioning
static provisioning
Which type of cloud allows management of backups to local, public, and/or private clouds to meet the varying requirements of cost, availability, latency, and security?
Which device would communicate to a DAS?
NIC
switch
HBA
DB9 serial cable
According to SNIA, what are two valid storage tiering types? (Choose two.)
storage cache tiering
host tiering
application tiering
cloud tiering
What describes the process of moving data between different classes of disks and storage, based on policy?
data clustering
IOPS monitoring
storage tiering
LUN migration
Your company needs to buy more disks for new servers and are considering SSD and HDD solutions What are two reasons why you would recommend using SSD? (Choose two.)
lower cost
no moving parts
better performance
high capacity
You want to use a light-weight communication API for cloud access. What would you use in this situation?
Representational State Transfer (REST)
Simple Object Access Protocol (SOAP)
Internet Engineering Task Force (IETF)
World Wide Web Consortium (W3C)
Which backup technique is the slowest in terms of backup time?
full backup
incremental backup
differential backup
mirror backup
Which two statements about jumbo Ethernet frames are correct? (Choose two.)
Jumbo frame is an Ethernet frame with a payload greater than 1500 bytes.
Jumbo frames are always a fixed standard length of 9000 bytes.
Jumbo frames can increase the latency on a network due to the transmission of larger frames
Jumbo frames enable the transmission of iSCSI packets on the IP network.
Which hardware component transports FC and IP traffic?
RAID array
iSCSI
CNA
You want to improve disk space usage efficiency while maintaining high availability. In this scenario, which solution satisfies this requirement?
RAID 0
RAID 1
RAID 5
RAID 10
Which device would be an NDMP server1?
a NAS device
a disk storage device
a tape storage device
a DAS device
Which two technologies are part of the Data Center Bridging (DCB) standard? (Choose two.)
Priority-based Flow Control (PFC)
Enhanced Transmission Selection (ETS)
Fibre Channel over IP (FCIP)
Internet key Exchange (IKE)
At which point in the communication chain is multi-pathing initiated?
the operating system device driver level
the switch level
the storage array level
the physical cable interface level
Your customer has a Fibre Channel SAN environment and has properly zoned servers for storage with front end controller ports. When an administrator goes to initialize a provisioned volume, it is not seen on the server. What would cause this problem1?
an unplugged cable
a multi-path I/O failure
a corrupted volume
improper LUN masking
A company is concerned with high space usage on ils storage devices, especially during certain periods of time when the same or similar information is being sent or received. Which solution will address this concern?
data compression
encryption
What should a valid iSCSI qualified name include?
the iSCSI string
date code, in yyyy-mm format
the WWN string
initials of company name
What are two NAS file access protocols? (Choose two.)
SMB
NFS
FCP
Which type of server initiates an NDMP backup?
directory server
NDMP server
application server
database server
Which feature would be used for SAN traffic isolation?
zoning
multi-pathing
volume management
failover
Which statement is correct regarding LUNs?
a method for encapsulating Fibre Channel frames
a representation of segmented storage space to be provided to their servers
a scenario where log file servers reach maximum disk capacity
a method for optimizing LAN traffic
You explain to a customer that storage data compression can be used on most data types. However, there are exceptions. Which file type is an exception?
*.txt
*.bat
*.jpg
*.ora
Which two statements regarding hybrid drives are correct? (Choose two.)
Flash memory stores frequently accessed content.
Flash memory is located on the motherboard of the server
Flash memory is located on the HDD circuit board.
Flash memory is not used with a hybrid drive.
At which level would you apply LUN masking?
file system level
switch level
zone alias level
controller level
You are consulting for a major financial institution and are verifying their current disaster recovery processes. Your client has a Recovery Point Objective (RPO) of zero. In this scenario what does this mean?
The customer has a zero data loss requirement
The customer has no data at risk.
The customer has a zero tolerance policy.
The customer has a zero chance of failure.
What is another name for a storage volume?
Converged Network Adapter (CNA)
logical unit number (LUN)
storage port
Host Bus Adapter (HBA)
Which two connection sequences are supported for direct-attached storage? (Choose two.)
Fibre Channel Host HBA -> FC Switch -> FC Target Device on Storage Controller
Fibre Channel Host HBA -> FC Target Device on Storage Controller
SAS Host HBA -> SAS Target Storage Controller
iSCSI Host Software Initiator -> Ethernet Switch -> iSCSI Host Target Initiator
When presenting a single volume to multiple hosts, which type of service needs to be running on the hosts?
clustering services
DNS services
directory services
DHCP services
You are designing a synchronous remote mirror solution. Which two factors regarding maximum distance must be considered in this scenario? (Choose two)
the availability of high-speed communication links
the customer's application tolerance for latency
the customer's RTO requirement
the amount of storage required by the customer's application
What do RAID 5 sets use to rebuild data?
Flash memory
mirroring
parity
data quiescing
What is the function of the Fibre Channel name server?
It retrieves all files from a file store by name.
It provides service to register Fibre Channel N_Ports.
It partitions Logical Unit Numbers (LUNs).
It load balances the SAN traffic.
Software Defined Storage (SDS) uses which type of technology to function?
Application
replication
virtualization
authentication
What is the name of the process by which a SAN dynamically extends volumes depending on server and application needs?
copy On First Write (COFW)
LUN expansion
Which technology uses lossless Ethernet?
FC
FcoE
FCIP
iFCP
Which software technique reduces the effects of a hardware component failure?
LUN masking
What are two reasons for using a full backup? (Choose two.)
When a host needs to have all of the data available to be restored.
When a host restore can be accomplished across multiple jobs and sessions.
When a backup requires minimal space consumption.
When a backup must be available in one backup image.
You want to manage systems and devices on a network with traps that signal the occurrence of an event In this scenario, which protocol would you use?
TLS
SMTP
SNMP
Which two statements are true about archiving? (Choose two.)
Archiving is an open source technology based on Cinder and OpenStack.
The purpose of archiving is the long term preservation of information.
Archiving can be used as a response to meet regulatory requirements.
Archiving is performed exclusively to tape.
A customer hires you to create an incremental backup scheme. Which solution would you recommend to the customer?
Create a backup scheme that will do a full backup and then only backup selected files.
Create a backup scheme that will do a full backup and then only backup changed data since the last backup.
Create a backup scheme that will do a full backup and then only backup changes since the full backup.
Create a backup scheme that will do a full backup and then only backup files selected by the host owner.
Which type of device would you typically use for file access storage?
SAN
NAS
DAS
What are three iSCSI configuration optimization techniques? (Choose three.)
Combine iSCSI data traffic with management IP traffic for maximum efficiency.
Enable jumbo frames
Isolate iSCSI traffic from other IP frames.
Place a firewall between initiators and targets for security
Enable flow control on switches.
Which storage technology uses optics for connectivity?
LTO tape
SAS
SATA
Fibre Channel
What is the process called that Solid State Drives (SSDs) use to reclaim space taken by previously stored data?
garbage collection
coalescing
write amplification
IOPS resizing
What is a set of data processing components that are automatically provisioned by providers, accessed over a network, and provides secure multi-tenancy?
network infrastructure
database infrastructure
storage infrastructure