CHONG  CHEN NENG
Quiz por , criado more than 1 year ago

SNIA Storage Foundations Certification Practice Exam ( For Practice Purposes) 65 question Full score 65

191
0
0
CHONG  CHEN NENG
Criado por CHONG CHEN NENG mais de 8 anos atrás
Fechar

S10-110 Exam

Questão 1 de 65

1

What is Software Defined Storage?

Selecione uma das seguintes:

  • virtualized storage with a Fibre Channel interface

  • virtualized storage with an Ethernet interface

  • physical storage with a service management interface

  • virtualized storage with a service management interface

Explicação

Questão 2 de 65

1

Which entity is responsible for making cloud services available for cloud consumers?

Selecione uma das seguintes:

  • cloud provider

  • cloud auditor

  • cloud storage

  • cloud infrastructure

Explicação

Questão 3 de 65

1

What is a SNIA standard that defines an interface used by applications to create, retrieve, update and delete elements from the cloud?

Selecione uma das seguintes:

  • FTP

  • CDMI

  • S3

  • SFTP

Explicação

Questão 4 de 65

1

A customer is considering mixing disk technologies in the same storage array to provide additional capabilities that they require.
In this scenario, what would be a benefit of doing this?

Selecione uma das seguintes:

  • to allow for more encrypted data to be stored on the array

  • to improve the performance of the array

  • to perform compression before writing data to the HDDs

  • to perform deduplication before writing data to the HDDs

Explicação

Questão 5 de 65

1

Which two technologies use NAND flash memory (non-volatile) technology to store data? (Choose two.)

Selecione uma ou mais das seguintes:

  • quad-level cell (QLC)

  • single-level cell (SLC)

  • interim-level cell (ILC)

  • mufti -level cell (MLC)

Explicação

Questão 6 de 65

1

What are two requirements of a server cluster with regards to storage technologies? (Choose two.)

Selecione uma ou mais das seguintes:

  • a switch fabric

  • a file locking mechanism

  • a back-end storage database

  • shared storage

Explicação

Questão 7 de 65

1

What is the default port that iSCSI traffic uses?

Selecione uma das seguintes:

  • 443

  • 3260

  • 80

  • 53

Explicação

Questão 8 de 65

1

According to SNIA, what is a data structure signed with a digital signature that is based using a public key and confirms that the key belongs to the subject identified in the structure called?

Selecione uma das seguintes:

  • secure key

  • certificate

  • public key

  • private key

Explicação

Questão 9 de 65

1

A physical server is having a native or bare-metal hypervisor installed before being deployed.
In this scenario, which statement is correct?

Selecione uma das seguintes:

  • The hypervisor runs as a program on a host operating system and supports only one instance of a virtual server

  • The hypervisor runs directly on the server hardware and supports the creation of multiple concurrent instances of virtual servers

  • The hypervisor runs directly on the server hardware and supports the creation of only one instance of a virtual server.

  • The hypervisor runs as a program on a host operating system and supports multiple concurrent instances of virtual servers.

Explicação

Questão 10 de 65

1

What is an implementation of a secure, multi-tenant cloud environment that is externally available to all users?

Selecione uma das seguintes:

  • private

  • public

  • secure

  • hybrid

Explicação

Questão 11 de 65

1

What are two scenarios where using disk replication is a valid risk mitigation strategy? (Choose two.)

Selecione uma ou mais das seguintes:

  • a primary storage array non-recoverable hardware failure

  • an extended power failure at the primary site

  • information destruction due to a security breach

  • system instability due to a bad OS updatesystem instability due to a bad OS update

Explicação

Questão 12 de 65

1

Which interface is used for 40GbE?

Selecione uma das seguintes:

  • Twinax

  • Small Form Factor pluggable (SFP+)

  • multimode fiber (MMF)

  • Quad Small Form Factor pluggable {QSFP+)

Explicação

Questão 13 de 65

1

You have a RAID 5 set with five disks at 400 GB each. Approximately how much usable space would this configuration yield?

Selecione uma das seguintes:

  • 1 terabyte

  • 2 terabytes

  • 1.2 terabytes

  • 16 terabytes

Explicação

Questão 14 de 65

1

What are the requirements for a boot from SAN? (Choose two.)

Selecione uma ou mais das seguintes:

  • Zoning of the LUN containing the OS image is required

  • An active path to the LUN is required.

  • The host server and storage should be from the same vendor

  • Only CNAs can be used

Explicação

Questão 15 de 65

1

Which statement describes an N_Port login?

Selecione uma das seguintes:

  • a process by which a server HBA port logs in to a fabric

  • a process by which FC initiators establish sessions with targets

  • a process by which users obtain access to a host

  • a process by which two FC-4 layer processes establish communication

Explicação

Questão 16 de 65

1

What are two characteristics of Challenge-Handshake Authentication Protocol (CHAP)? (Choose two.)

Selecione uma ou mais das seguintes:

  • CHAP uses a hash mechanism so the clear text authentication piece is never sent.CHAP uses a hash mechanism so the clear text authentication piece is never sent.

  • CHAP uses a parity algorithm to jumble the credentials for security.

  • CHAP uses a Point-to-Point Protocol (PPP) method.

  • CHAP is required for iSCSI initiator authentication

Explicação

Questão 17 de 65

1

What is the purpose of a host bus adapter (HBA)?

Selecione uma das seguintes:

  • to connect a switch port to front end storage

  • to provide host backups to tape media

  • to connect a host to a switch

  • to use a host CPU to interface with storage controllers

Explicação

Questão 18 de 65

1

Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)

Selecione uma ou mais das seguintes:

  • internet Protocol Security (IPsec)

  • ACLs

  • encryption at rest

  • Challenge Handshake Authentication Protocol (CHAP)

Explicação

Questão 19 de 65

1

Which level of data access does a SAN device provide compared to NAS?

Selecione uma das seguintes:

  • file access

  • block access

  • packet access

  • object access

Explicação

Questão 20 de 65

1

What would be placed in a Fibre Channel zone?

Selecione uma das seguintes:

  • Ip address

  • MAC address

  • IQN of an initiator

  • World Wide Port Name (WWPN)

Explicação

Questão 21 de 65

1

You want to replace multiple copies of data, at variable levels of granularity, with references to a shared copy to save storage space and/or bandwidth.
Which data reduction method would satisfy the requirement?

Selecione uma das seguintes:

  • deduplication

  • compression

  • thin provisioning

  • conditioning

Explicação

Questão 22 de 65

1

According to SNIA, what is the term that describes a mechanism allocating the physical capacity of a volume or file system as applications write data?

Selecione uma das seguintes:

  • thick provisioning

  • thin provisioning

  • hybrid provisioning

  • static provisioning

Explicação

Questão 23 de 65

1

Which type of cloud allows management of backups to local, public, and/or private clouds to meet the varying requirements of cost, availability, latency, and security?

Selecione uma das seguintes:

  • public

  • private

  • hybrid

  • secure

Explicação

Questão 24 de 65

1

Which device would communicate to a DAS?

Selecione uma das seguintes:

  • NIC

  • switch

  • HBA

  • DB9 serial cable

Explicação

Questão 25 de 65

1

According to SNIA, what are two valid storage tiering types? (Choose two.)

Selecione uma ou mais das seguintes:

  • storage cache tiering

  • host tiering

  • application tiering

  • cloud tiering

Explicação

Questão 26 de 65

1

What describes the process of moving data between different classes of disks and storage, based on policy?

Selecione uma das seguintes:

  • data clustering

  • IOPS monitoring

  • storage tiering

  • LUN migration

Explicação

Questão 27 de 65

1

Your company needs to buy more disks for new servers and are considering SSD and HDD solutions What are two reasons why you would recommend using SSD? (Choose two.)

Selecione uma ou mais das seguintes:

  • lower cost

  • no moving parts

  • better performance

  • high capacity

Explicação

Questão 28 de 65

1

You want to use a light-weight communication API for cloud access. What would you use in this situation?

Selecione uma das seguintes:

  • Representational State Transfer (REST)

  • Simple Object Access Protocol (SOAP)

  • Internet Engineering Task Force (IETF)

  • World Wide Web Consortium (W3C)

Explicação

Questão 29 de 65

1

Which backup technique is the slowest in terms of backup time?

Selecione uma das seguintes:

  • full backup

  • incremental backup

  • differential backup

  • mirror backup

Explicação

Questão 30 de 65

1

Which two statements about jumbo Ethernet frames are correct? (Choose two.)

Selecione uma ou mais das seguintes:

  • Jumbo frame is an Ethernet frame with a payload greater than 1500 bytes.

  • Jumbo frames are always a fixed standard length of 9000 bytes.

  • Jumbo frames can increase the latency on a network due to the transmission of larger frames

  • Jumbo frames enable the transmission of iSCSI packets on the IP network.

Explicação

Questão 31 de 65

1

Which hardware component transports FC and IP traffic?

Selecione uma das seguintes:

  • RAID array

  • iSCSI

  • NIC

  • CNA

Explicação

Questão 32 de 65

1

You want to improve disk space usage efficiency while maintaining high availability. In this scenario, which solution satisfies this requirement?

Selecione uma das seguintes:

  • RAID 0

  • RAID 1

  • RAID 5

  • RAID 10

Explicação

Questão 33 de 65

1

Which device would be an NDMP server1?

Selecione uma das seguintes:

  • a NAS device

  • a disk storage device

  • a tape storage device

  • a DAS device

Explicação

Questão 34 de 65

1

Which two technologies are part of the Data Center Bridging (DCB) standard? (Choose two.)

Selecione uma ou mais das seguintes:

  • Priority-based Flow Control (PFC)

  • Enhanced Transmission Selection (ETS)

  • Fibre Channel over IP (FCIP)

  • Internet key Exchange (IKE)

Explicação

Questão 35 de 65

1

At which point in the communication chain is multi-pathing initiated?

Selecione uma das seguintes:

  • the operating system device driver level

  • the switch level

  • the storage array level

  • the physical cable interface level

Explicação

Questão 36 de 65

1

Your customer has a Fibre Channel SAN environment and has properly zoned servers for storage with front end controller ports. When an administrator goes to initialize a provisioned volume, it is not seen on the server.
What would cause this problem1?

Selecione uma das seguintes:

  • an unplugged cable

  • a multi-path I/O failure

  • a corrupted volume

  • improper LUN masking

Explicação

Questão 37 de 65

1

A company is concerned with high space usage on ils storage devices, especially during certain periods of time when the same or similar information is being sent or received.
Which solution will address this concern?

Selecione uma das seguintes:

  • data compression

  • encryption

  • thin provisioning

  • deduplication

Explicação

Questão 38 de 65

1

What should a valid iSCSI qualified name include?

Selecione uma das seguintes:

  • the iSCSI string

  • date code, in yyyy-mm format

  • the WWN string

  • initials of company name

Explicação

Questão 39 de 65

1

What are two NAS file access protocols? (Choose two.)

Selecione uma ou mais das seguintes:

  • SMB

  • iSCSI

  • NFS

  • FCP

Explicação

Questão 40 de 65

1

Which type of server initiates an NDMP backup?

Selecione uma das seguintes:

  • directory server

  • NDMP server

  • application server

  • database server

Explicação

Questão 41 de 65

1

Which feature would be used for SAN traffic isolation?

Selecione uma das seguintes:

  • zoning

  • multi-pathing

  • volume management

  • failover

Explicação

Questão 42 de 65

1

Which statement is correct regarding LUNs?

Selecione uma das seguintes:

  • a method for encapsulating Fibre Channel frames

  • a representation of segmented storage space to be provided to their servers

  • a scenario where log file servers reach maximum disk capacity

  • a method for optimizing LAN traffic

Explicação

Questão 43 de 65

1

You explain to a customer that storage data compression can be used on most data types. However, there are exceptions.
Which file type is an exception?

Selecione uma ou mais das seguintes:

  • *.txt

  • *.bat

  • *.jpg

  • *.ora

Explicação

Questão 44 de 65

1

Which two statements regarding hybrid drives are correct? (Choose two.)

Selecione uma ou mais das seguintes:

  • Flash memory stores frequently accessed content.

  • Flash memory is located on the motherboard of the server

  • Flash memory is located on the HDD circuit board.

  • Flash memory is not used with a hybrid drive.

Explicação

Questão 45 de 65

1

At which level would you apply LUN masking?

Selecione uma das seguintes:

  • file system level

  • switch level

  • zone alias level

  • controller level

Explicação

Questão 46 de 65

1

You are consulting for a major financial institution and are verifying their current disaster recovery processes. Your client has a Recovery Point Objective (RPO) of zero.
In this scenario what does this mean?

Selecione uma das seguintes:

  • The customer has a zero data loss requirement

  • The customer has no data at risk.

  • The customer has a zero tolerance policy.

  • The customer has a zero chance of failure.

Explicação

Questão 47 de 65

1

What is another name for a storage volume?

Selecione uma das seguintes:

  • Converged Network Adapter (CNA)

  • logical unit number (LUN)

  • storage port

  • Host Bus Adapter (HBA)

Explicação

Questão 48 de 65

1

Which two connection sequences are supported for direct-attached storage? (Choose two.)

Selecione uma ou mais das seguintes:

  • Fibre Channel Host HBA -> FC Switch -> FC Target Device on Storage Controller

  • Fibre Channel Host HBA -> FC Target Device on Storage Controller

  • SAS Host HBA -> SAS Target Storage Controller

  • iSCSI Host Software Initiator -> Ethernet Switch -> iSCSI Host Target Initiator

Explicação

Questão 49 de 65

1

When presenting a single volume to multiple hosts, which type of service needs to be running on the hosts?

Selecione uma das seguintes:

  • clustering services

  • DNS services

  • directory services

  • DHCP services

Explicação

Questão 50 de 65

1

You are designing a synchronous remote mirror solution.
Which two factors regarding maximum distance must be considered in this scenario? (Choose two)

Selecione uma ou mais das seguintes:

  • the availability of high-speed communication links

  • the customer's application tolerance for latency

  • the customer's RTO requirement

  • the amount of storage required by the customer's application

Explicação

Questão 51 de 65

1

What do RAID 5 sets use to rebuild data?

Selecione uma das seguintes:

  • Flash memory

  • mirroring

  • parity

  • data quiescing

Explicação

Questão 52 de 65

1

What is the function of the Fibre Channel name server?

Selecione uma das seguintes:

  • It retrieves all files from a file store by name.

  • It provides service to register Fibre Channel N_Ports.

  • It partitions Logical Unit Numbers (LUNs).

  • It load balances the SAN traffic.

Explicação

Questão 53 de 65

1

Software Defined Storage (SDS) uses which type of technology to function?

Selecione uma das seguintes:

  • Application

  • replication

  • virtualization

  • authentication

Explicação

Questão 54 de 65

1

What is the name of the process by which a SAN dynamically extends volumes depending on server and application needs?

Selecione uma das seguintes:

  • copy On First Write (COFW)

  • deduplication

  • LUN expansion

  • thin provisioning

Explicação

Questão 55 de 65

1

Which technology uses lossless Ethernet?

Selecione uma das seguintes:

  • FC

  • FcoE

  • FCIP

  • iFCP

Explicação

Questão 56 de 65

1

Which software technique reduces the effects of a hardware component failure?

Selecione uma das seguintes:

  • volume management

  • multi-pathing

  • LUN masking

  • zoning

Explicação

Questão 57 de 65

1

What are two reasons for using a full backup? (Choose two.)

Selecione uma ou mais das seguintes:

  • When a host needs to have all of the data available to be restored.

  • When a host restore can be accomplished across multiple jobs and sessions.

  • When a backup requires minimal space consumption.

  • When a backup must be available in one backup image.

Explicação

Questão 58 de 65

1

You want to manage systems and devices on a network with traps that signal the occurrence of an event In this scenario, which protocol would you use?

Selecione uma das seguintes:

  • TLS

  • CDMI

  • SMTP

  • SNMP

Explicação

Questão 59 de 65

1

Which two statements are true about archiving? (Choose two.)

Selecione uma ou mais das seguintes:

  • Archiving is an open source technology based on Cinder and OpenStack.

  • The purpose of archiving is the long term preservation of information.

  • Archiving can be used as a response to meet regulatory requirements.

  • Archiving is performed exclusively to tape.

Explicação

Questão 60 de 65

1

A customer hires you to create an incremental backup scheme. Which solution would you recommend to the customer?

Selecione uma das seguintes:

  • Create a backup scheme that will do a full backup and then only backup selected files.

  • Create a backup scheme that will do a full backup and then only backup changed data since the last backup.

  • Create a backup scheme that will do a full backup and then only backup changes since the full backup.

  • Create a backup scheme that will do a full backup and then only backup files selected by the host owner.

Explicação

Questão 61 de 65

1

Which type of device would you typically use for file access storage?

Selecione uma das seguintes:

  • SAN

  • NAS

  • DAS

  • HBA

Explicação

Questão 62 de 65

1

What are three iSCSI configuration optimization techniques? (Choose three.)

Selecione uma ou mais das seguintes:

  • Combine iSCSI data traffic with management IP traffic for maximum efficiency.

  • Enable jumbo frames

  • Isolate iSCSI traffic from other IP frames.

  • Place a firewall between initiators and targets for security

  • Enable flow control on switches.

Explicação

Questão 63 de 65

1

Which storage technology uses optics for connectivity?

Selecione uma das seguintes:

  • LTO tape

  • SAS

  • SATA

  • Fibre Channel

  • iSCSI

Explicação

Questão 64 de 65

1

What is the process called that Solid State Drives (SSDs) use to reclaim space taken by previously stored data?

Selecione uma das seguintes:

  • garbage collection

  • coalescing

  • write amplification

  • IOPS resizing

Explicação

Questão 65 de 65

1

What is a set of data processing components that are automatically provisioned by providers, accessed over a network, and provides secure multi-tenancy?

Selecione uma das seguintes:

  • network infrastructure

  • database infrastructure

  • storage infrastructure

  • cloud infrastructure

Explicação