Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is the storage protocol used between initiators and targets connected to an FCoE fabric?

A.

SATA

B.

SCSI

C.

SAS

D.

FCoE

Full Access
Question # 5

After provisioning a new LUN to a host, new storage cannot be detected on the host. Which three actions should be performed to troubleshoot this problem? (Choose three.)

A.

Scan memory on a host.

B.

Scan for new storage on the host,

C.

Verify that LUN mapping is correct.

D.

Verify that zoning on the FC switch is correct.

E.

Verify that the size of memory pages and block size is the same.

Full Access
Question # 6

Click the Exhibit button.

Referring to the exhibit, what are the two largest risks to a highly available solution? (Choose two.)

A.

Only two adapters per controller

B.

Only two adapters on the server

C.

Only one server

D.

Only one switch

Full Access
Question # 7

Click the Exhibit button.

What is the protocol stack shown in the exhibit?

A.

FCoE

B.

SCSI

C.

InfiniBand

D.

Fibre Channel

Full Access
Question # 8

You have been asked to implement a remote data replication scheme. The current data center is mostly constructed of FC components and the corporation is highly invested in the technology. The remote data center needs a synchronous replication solution.

What will accomplish this goal?

A.

iSCSI

B.

NAS

C.

FCIP

D.

FCoE

Full Access
Question # 9

Click the Exhibit button.

Referring to the exhibit, which RAID level is shown?

A.

RAID 4

B.

RAID 5

C.

RAID 0

D.

RAID 6

Full Access
Question # 10

A company has a storage subsystem that supports a variety of replication options. They have purchased an identical array and placed it at a secondary site 4,200 km away and want to keep the two arrays as closely synchronized as possible.

Which solution should be chosen?

A.

Asynchronous replication is the only replication option for distances of this length.

B.

Synchronous replication is the only replication option for distances over 4,000 km.

C.

Snapshots allow for data to be quickly captured, copied, and mounted from one storage array to another and is the ideal solution for all distances.

D.

Synchronous replication will keep the arrays in the closest sync and is ideal for short distances such as 4,200 km.

Full Access
Question # 11

A number of servers are experiencing slower than expected performance. Analyzing the server, switch, and storage logs do not indicate any issues. You have been asked by the customer to address this issue.

What will improve performance?

A.

Increase the current queue depth setting from 1.

B.

Change the frame size from 2148 bytes,

C.

Decrease the buffer-to-buffer credits setting.

D.

Enable write caching functionality for the device driver.

Full Access
Question # 12

Your company uses a cryptographic key system to encrypt tapes. After several years of use and thousands of tapes shipped to off-site locations, an IT audit reveals that encryption keys have been inadvertently stored as ciphertext on file shares to which everyone in the company has read permissions.

Which response reflects industry best practice?

A.

All data encrypted with the keys exposed as ciphertext should be considered safe.

B.

All data encrypted with the keys exposed as ciphertext and not yet sent off-site as an encrypted tape should be re-keyed (decrypted and re-encrypted using a new key).

C.

All data encrypted with the keys exposed as ciphertext should be re-keyed (decrypted and re-encrypted using a new key).

D.

All data encrypted with the keys exposed as ciphertext should be considered safe as ciphertext is very difficult to use.

Full Access
Question # 13

Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.

Which two FC provided mechanisms would you implement first? (Choose two.)

A.

LUN masking

B.

Device authentication and authorization

C.

Zoning

D.

Key management system

Full Access
Question # 14

Only one of many servers has poor performance within an enterprise SAN. The server administrator has found high disk timeout values without a decrease in throughput. The server has multiple paths to the storage system but only one path is active at this time.

What should the storage administrator monitor to assist with troubleshooting?

A.

Number of errors on the active storage port

B.

IOPS on the active storage port

C.

MBps on the active storage port

D.

Buffer-to-buffer utilization by the active storage port

Full Access