Anda di halaman 1dari 18

Configuring and Monitoring NetApp E-Series Storage Systems

Final Assessment Course ID: STRHW-ILT-COMNESES Rev. 1.0

Objectives
By the end of this exercise, you should be able to: Assess your knowledge of E-Series storage system configuration and monitoring objectives Identify topics for further investigation

NetApp Confidential

Instructions
In this assessment, you test your knowledge of the topics covered by the Configuring and Monitoring NetApp E-Series Storage Systems class. For the following multiple-choice questions, select the best answer.

NetApp Confidential

2012 NetApp. All rights reserved.

NetApp Confidential

Which of the following components does NOT have a redundant partner in the DE6600 disk shelf? A. ESM B. Fan module C. Power module D. None of these

NetApp Confidential

When would you expect to see the SAA LED on? A. When the component is functionally normally. B. When power has been turned on to the component. C. When the component has failed. D. When it is safe to remove the component.

NetApp Confidential

When you power off a storage system, which component should be powered off first? A. The controller shelf B. All disk shelves C. The configuration database D. The SANtricity client

NetApp Confidential

2012 NetApp. All rights reserved.

NetApp Confidential

Why is it a best practice to cable disk shelves to a controller shelf using the top-down-bottom-up method? A. It protects against drawer failure. B. It protects against power outages. C. It protects against shelf failure. D. It protects against disk failure.

NetApp Confidential

What is the preferred method of zoning from host ports to controller ports in a SAN? A. One-to-one B. One-to-many C. Two-to-two D. Many-to-two

NetApp Confidential

What is the SANtricity Client?


A. A host I/O performance modeling interface B. A host server process that enables storage system management with the storage data path C. Inter-process communication that supports computer program subroutines D. A GUI or CLI run on a host server used for storage system management E. An OS dependent collection of utilities for servers attached to SANtricity managed storage systems

NetApp Confidential

2012 NetApp. All rights reserved.

NetApp Confidential

What is SMutil?
A. A host I/O performance modeling interface B. A host server process that enables storage system management with the storage data path C. Inter-process communication that supports computer program subroutines D. A GUI or CLI run on a host server used for storage system management E. An OS dependent collection of utilities for servers attached to SANtricity managed storage systems

NetApp Confidential

10

What uses the Access Volume? A. Legacy operating environments B. Redundancy check C. Persistent Monitor D. SMAgent E. XOR parity calculations

NetApp Confidential

11

What is best practice recommendation for the system monitor?


A. It should run on all storage manager clients. B. It should be stopped during a controller firmware upgrade. C. It should be stopped during storage system normal operations. D. It should only run on one client connected to the storage system. E. It should only be run on Windows server systems.

NetApp Confidential

12

2012 NetApp. All rights reserved.

NetApp Confidential

Management connections between the SANtricity client and the controllers use which communication API by default? A. HIC B. HTTP C. HTTPS D. SYMbol E. ATM

NetApp Confidential

13

In-band communication occurs between which components? A. The LAN and the ESMs B. The ESMs and the disks C. The I/O host and the controller D. The controller and the disk shelf ESMs

NetApp Confidential

14

Which file contains information about the management domain? A. EMWdata_vxx.bin B. firmware-inventory.txt C. storage-array-config.cfg D. storage-array-profile.txt E. performance-statistics.csv

NetApp Confidential

15

2012 NetApp. All rights reserved.

NetApp Confidential

What character must enclose commands written at the SMcli on a Windows host? A. \ B. / C. D.

NetApp Confidential

16

Which SANtricity client utility associates a LUN with a host OS storage system device? A. dsmutil B. SMdevices C. hot_add D. lun_mapper E. hot_show_all

NetApp Confidential

17

In the Array Management window, which tab provides access to Ethernet management port configuration and premium feature enablement? A. Setup B. Hardware C. Configuration D. Host Mappings E. Storage & Copy Services

NetApp Confidential

18

2012 NetApp. All rights reserved.

NetApp Confidential

What function do hot spares provide? A. Efficiency for configuring volumes to maximize capacity usage B. Spare capacity for disk pools in event of disk failure C. Spare capacity for volume groups in event of disk failure D. Spare capacity for both volume groups and disk pools

NetApp Confidential

19

What term describes a cache mechanism periodically writing dirty data to disk? A. Filling B. Cleaning C. Flushing D. Fetching E. Scrubbing

NetApp Confidential

20

What function can the storage system use to preserve cache data in the event of a complete controller failure? A. Write caching B. Cache mirroring C. Read caching D. Pre-fetch caching E. SSD read cache

NetApp Confidential

21

2012 NetApp. All rights reserved.

NetApp Confidential

With a system cache block size of 32K, how much cache space per I/O is lost if incoming I/Os are all 48K writes? A. None B. 4K C. 8K D. 16K E. 24K

NetApp Confidential

22

Where is a record of almost all non-I/O related activity on the storage system recorded? A. Event Log B. Configuration database C. NVSRAM D. Storage Array Profile E. Cache backup device

NetApp Confidential

23

What can be performed by the controllers to provide error detection on the disk media? A. Cache flush B. Disk Monitor C. Cache Mirroring D. Event Log E. Media Scan

NetApp Confidential

24

2012 NetApp. All rights reserved.

NetApp Confidential

Which storage manager feature scans the system for issues, reports them, and suggests procedures that will correct the issue? A. Diagmon B. Recovery Guru C. Performance Monitor D. Storage System Diagnostics E. Event Log

NetApp Confidential

25

Where does the storage systems configuration database reside? A. On Controller A B. On the SANtricity client host C. On the first disk of all shelves D. On all disks in the storage system E. On the first disk of the controller shelf F. On the first disk of the first disk shelf

NetApp Confidential

26

Controller firmware package files start with which character(s)? A. N B. CFW C. DLP D. RC E. SMIA

NetApp Confidential

27

2012 NetApp. All rights reserved.

NetApp Confidential

Which of the following describes a difference between controller cache and SSD Read Cache?
A. Controller cache is enabled by default when a volume is created; SSD Read Cache is not enabled except by user configuration. B. Controller cache uses DIMM RAM banks; SSD Read Cache uses SSD disks. C. Controller cache is used by all I/O coming to the storage system; SSD Read Cache is only used by hot data blocks determined by the controllers . D. All of these.
NetApp Confidential 28

Which description most accurately represents how the storage system handles I/Os to the non-preferred controller with ALUA support?
A. They are shipped over to the owning controller to be managed, then returned through the non-preferred path after completion. B. They are rejected with a specific SCSI check condition and noted in the Event Log. C. The non-owning controller takes ownership of the volume in order to handle them, then restores ownership to the original controller. D. The controller handles them normally, updating both controllers cache to maintain consistency, which is why ALUA requires cache mirroring to be enabled. E. The controller handles them normally, updating both controllers cache to maintain consistency, which is why ALUA requires cache mirroring to be enabled.
NetApp Confidential 29

What technology is used by the Snapshot feature to ensure a point-in-time image is maintained of the base volume? A. Mirroring between the Snapshot images B. Copy-on-write to the repository C. Volume Copy of data to the repository D. Hot-spare-copy to repository blocks

NetApp Confidential

30

2012 NetApp. All rights reserved.

NetApp Confidential

10

Synchronous mirroring requires what type of connection between storage systems? A. InfiniBand B. iSCSI C. SAS D. FC E. Either FC or iSCSI

NetApp Confidential

31

What should the interval for an asynchronous mirror group usually be equal to? A. The corresponding applications RTO B. The corresponding applications RPO C. The amount of time required to copy the mirror repository to the remote site D. Half the corresponding applications RPO

NetApp Confidential

32

Which file contains a description of all the hardware and logical components and properties of the storage system, including the component serial numbers? A. Performance-statistics.csv B. Firmware-inventory.txt C. Storage-array-config.cfg D. Storage-array-profile.txt E. EMWdata_vxx.bin

NetApp Confidential

33

2012 NetApp. All rights reserved.

NetApp Confidential

11

Where can you access the Event Log? Choose two answers. A. In the hot_add utility B. In the messages utility C. On the Enterprise Management window Setup tab D. On the Array Management window Summary tab E. In the Support Data

NetApp Confidential

34

A foreign controller: A. Is the alternate controller in a failover scenario. B. Belongs to the first dynamic disk pool. C. Is new to the slot in which it is inserted. D. Has a controller serial number that is stored in the configuration database. E. Cannot determine the board identifier for the alternate controller in this storage system.

NetApp Confidential

35

What state is a controller in while it is activating a new version of firmware? A. Offline B. Service Mode C. Suspended D. Quiesced

NetApp Confidential

36

2012 NetApp. All rights reserved.

NetApp Confidential

12

When replacing a failed component in a shelf, why should you wait for 30 to 60 seconds after the removal of the failed component before inserting the replacement component? A. To ensure that the controller configuration database has a record of the change. B. To ensure that the storage manager has completed the component repair sleep cycle. C. To ensure that the administrator has time to complete ESD and air blocking procedures. D. To ensure that the host OS has completed start-ofday processing and has started sending I/O to the storage system.
NetApp Confidential 37

What is used by the controllers to send and receive SCSI commands? A. The disk interface type B. Inherent tools naming C. The initiator-target (I_T) nexus D. Media multipath numbering

NetApp Confidential

38

The multipath driver resides on the A. ESM B. Disk shelf C. Controller D. Management host E. I/O host

NetApp Confidential

39

2012 NetApp. All rights reserved.

NetApp Confidential

13

In a forced failover, the alternate controller A. Powers off the storage system to prevent data loss. B. Initiates the hot spare disk to replace a failed disk. C. Sends the Enterprise Management window a notification that the multipath driver failed. D. Takes forced ownership of all the LUNs owned by the failed controller.

NetApp Confidential

40

When a disk fails, which characteristic must the replacement disk have? A. Is equal to or greater in size than the failed disk B. Is a host port identifier for a host-mapped single host C. Is assigned by the SANtricity client to a disk pool D. Is assigned by the SANtricity client to a volume group
NetApp Confidential 41

If used incorrectly, which disk option might cause data corruption or data loss? A. Reconstruct B. Activate C. Conserve D. Revive

NetApp Confidential

42

2012 NetApp. All rights reserved.

NetApp Confidential

14

In the SANtricity client, how do you specify which multipath driver to use? A. set-dsmparams B. Select Storage & Copy Services > Create Mapping C. Select Host Mappings > Set Multipath D. Change the host type specification E. Set storageArray multipath dsm

NetApp Confidential

43

If an unresponsive storage system appears in the Enterprise Management window, which method might resolve the issue? A. Delete the EMWdatavxxx.bin file. B. Save and clear the Event Log. C. Restart the SANtricity monitoring agent. D. Set one controller in Service Mode, and then return it to service.

NetApp Confidential

44

Unless otherwise specified, what component do you upgrade first when you upgrade controller firmware? A. The ESM firmware B. The disk firmware C. The SAS interposer D. The SANtricity client E. The multipath driver

NetApp Confidential

45

2012 NetApp. All rights reserved.

NetApp Confidential

15

Start-of-day (SOD) refers to A. Starting or restarting the host-agent software B. A host interface fault-isolation diagnostic C. Normal controller startup processes D. A volume-group or disk pool initialization process E. Initiating the management of a storage system

NetApp Confidential

46

The path for the transfer of data between the controllers and the disks is named A. In-band communication B. Out-of-band communication C. The disk net route D. The drive channel E. The management pathway

NetApp Confidential

47

What is a typical cause of a SAS device miswire error? A. A cable is inserted into the wrong port of an ESM. B. An ESM or controller has failed. C. A cable from a host is in the wrong zone on the fabric switch. D. A wide SAS port has transitioned to narrow status.

NetApp Confidential

48

2012 NetApp. All rights reserved.

NetApp Confidential

16

Why is it important to have unique shelf IDs on all the shelves in the storage system? A. In order to differentiate between disk shelves and controller shelves. B. In order to determine if a disk shelf is cabled correctly. C. In order to correctly identify a failed disk. D. In order to verify a 7-segment display LED.

NetApp Confidential

49

Where do disk pools rebuild data to when a disk fails in the pool? A. They use hot spare disks. B. They use preservation disks. C. They use preservation pools. D. They use preservation capacity.

NetApp Confidential

50

Which controller in the E-Series has 12 Gbps SAS 3.0 expansion ports? A. E5500 B. E5400 C. E2700 D. E2600 E. None of these

NetApp Confidential

51

2012 NetApp. All rights reserved.

NetApp Confidential

17

What storage management package determines which path to use to send data from an I/O host to the controllers? A. SANtricity client B. SMutil C. SMagent D. Multipath driver

NetApp Confidential

52

Which of the following statements is true of thin provisioned volumes? Choose two. A. They are only available in volume groups. B. They are only available in disk pools. C. They report the virtual (total) capacity in Storage & Copy Services. D. They use repositories to track data written to the volume.

NetApp Confidential

53

You can re-take this assessment as many times as you would like, until you feel confident of your understanding and skill level.

NetApp Confidential

54

2012 NetApp. All rights reserved.

NetApp Confidential

18

Anda mungkin juga menyukai