Anda di halaman 1dari 12

Identify whether each core principle is related to information security or data protection.

To answer the question, drag the item on the right to the core principle on the left. SAI

Fault protection
Privacy
Authenticity
Reliability
Availability
Possession
data protection
information security

Which term refers to the reduction in the power of the light signal as it is transmitted? (Select the
correct answer.)

Attenuation ******

refraction

dispersion

modulation
Refer to the graphic.

Which topology is illustrated in the graphic? (Select the correct answer.)

flow control

arbitrated loop

soft zoning

virtual SAN SAI


A company’s policy restraints require security to be implemented only at the SAN. Which
technique can the company implement at the SAN storage array level? (Select the correct answer.)
SAI

Data-at-rest encryption ******

Refer to the graphic.


Which type of fabric topology is illustrated in the graphic? (Select the correct answer.)

Cascading fabric SAI

Full mesh fabric SAI

Token fabric SAI

Ring fabric
What is the OSI model?

a reference for how messages should be transmitted between any two points in a network ******

Which drive interconnect technology uses a point-to-point, full-duplex serial connection and
provides high performance and reliability needed by mission-critical, high I/O application
environments? (Select the correct answer.)

SAS
Which term describes the maximum targeted period in which data might be lost from an IT
service due to a major incident? (Select the correct answer.)

Recovery Point Objective (RPO) *****

Assuming a tiering hierarchy that begins with Tier 0, which storage tier is called near line, employs
backup devices such as tapes and tape libraries, and is ideal for file recovery? (Select the correct
answer.)

Tier 2

Tier 3

Tier 4

Tier 5
Which statements correctly describe the use of SAS edge expanders? (Select two.)

Each SAS domain must have one primary and one backup edge expander.
Edge expanders can address up to 128 SAS addresses or drives in a segment.

When an edge expander is incorporated into the architecture, up to 128 segments can exist within a SAS domain.

Server-attached storage configurations typically use edge expanders.

There can only be one edge expander per SAS domain.


Refer to the graphic.

Which type of topology is represented in the graphic? (Select the correct answer.)

Point-to-point (FC-P2P) SAI

Any port (FC-AP) SAI

Arbitrated loop (FC-AL) SAI

Switched fabric (FC-SW) ???


What is the name of the technique used to increase the overall endurance of NAND-based Solid
State Drives that continuously remaps logical SCSI blocks to different physical pages in the
NAND array? (Select the correct answer.)

wear leveling *****

What is a function of zoning? (Select the correct answer.)

controls data access between devices and WWNs *

What is the minimum number of storage systems required by network RAID 10+2? (Select the
correct answer.)

4 *****
A customer is designing an HPE BladeSystem with a Fibre Channel SAN. They are using a
single director-type switch with 512 useable Fibre Channel ports in addition to ICL ports. What
must the customer do in order to ensure that all the ports in the SAN are supported? Sai

Configure Virtual Fabric with 10-bit addressing.


Which network topology design meets these criteria?

- Ease of scalability by adding switches and other devices


- Multiple paths for internal fabric resiliency
- Support for a mix of local data access and the occasional centralized data access

(Select the correct answer.)

Ring fabric topology ***

Single switch fabric SAI

Cascading topology

Full mesh topology SAI


Which IP storage protocol is a gateway-to-gateway network standard that enables the
implementation of Fibre Channel functionality over an IP network? (Select the correct
answer.)

FCoE

iSCSI

FCIP

iFCP ******
Which statement regarding iSCSI technology is true? (Select the correct answer.)

The iSCSI protocol allows the SCSI command to be sent end-to-end over LANs, WANs, or the Internet.

Refer to the graphic.

Which type of cable is shown in the graphic? (Select the correct answer.)

Triple-mode SAI
Multimode ***

Laser

Single-mode SAI
A customer is working in the test and development department to test new scenarios that use
servers connected to shared storage. The customer wants to set up a quick fabric, and is not
concerned about any type of failover or redundancy.

Which type of topology should the customer implement? (Select the correct answer.) SAI

Ring

Single-switch ***

Mesh **** SAI

Cascading SAi
What is a function of N_Port ID Virtualization (NPIV)? (Select the correct answer.)

NPIV makes a single Fibre Channel port appear as multiple virtual ports, each having its own N_Port ID and virtual
WWN. ********

Which network RAID levels can withstand a simultaneous failure of any two storage systems?
(Select three.) Sai

RAID 8

RAID 5 *

RAID 10

RAID 10+1 *

RAID 6

RAID 10+2 *
An NPIV port allows a single HBA on a storage array to register with a fabric. What does NPIV use to
accomplish this? (Select the correct answer.)
Worldwide names ******

A customer has multiple store locations; all remote stores back up their data to the corporate
office. Which type of protection is this customer implementing? (Select the correct answer.)

Centralized *

Which RAID technology has the following characteristics?

- Does not have a performance penalty for read operations


- Does have a performance penalty on write operations
- Can handle two disk failures
- Requires a minimum of four disk drives
- Reduces storage capacity by two disk drives

(Select the correct answer.)

RAID 6 **

When ports between two switches form an inter-switch link (ISL), what type are they? (Select
the correct answer.)

NL_Port

F_Port SAI

E_Port

FL_Port SAI

B_Port
What are the two types of expanders used in SAS topologies? (Select two.)

fan-out **

Edge ***
Refer to the diagram.

In this diagram, label “A” refers to which data protection goal? (Select the correct answer.)

Recovery Point Objective (RPO) ***

Which part of the 24-bit Fibre Channel port address relates to the domain ID of the
switch? (Select the correct answer.) Sai

domain bits 23 to 16 ****


Which statements about Native Command Queuing are correct? (Select three.) Sai

It is a function of HP Smart Array controllers ****.

It optimizes performance of cross-fabric traffic when multi-function routers are used. *****

It optimizes the order in which read and write operations are executed by SATA disk drives.

It reduces unnecessary disk drive head movement. ****

It increases performance of SATA drives.

It increases bandwidth of SAS drives used in SANs.

- Easy installation and configuration of servers and storage


- Maximum fabric performance because all communicating devices connect to the same switch
- Support for local, centralized, and distributed data access needs

(Select the correct answer.)

Single switch fabric ******

Cascading topology

Ring fabric topology


Full Mesh topology
Priority traffic is being transported across an FCoE fabric with flow control enabled. Which
command should you issue to ensure that priority traffic is passed ahead of other traffic in the
queue? (Select the correct answer.)

Hold SAI

Pre SAI

Stop

Pause

Which network RAID level does this diagram represent? (Select the correct answer.)

RAID 5 *****

Arrange the steps to properly boot SAN components into the correct order.

To answer the question, drag the step on the right to the order represented on the left.

First
Second
Third
Fourth
Boot the host system(s).
Power on the SAN fabric.
Confirm the target drives are visible.
Power on the storage arrays.
Which HPE resource describes how HPE storage systems, storage management tools, and Fibre
Channel products can be used in SAN? (Select the correct answer.)

SAN Design Reference Guide

Watson Cook Book

Core to Edge Design Guide

HPE RT3 Reference Guide


Refer to the graphic.

Which type of zoning is illustrated in the graphic? (Select the correct answer.) Sai
Traffic isolation zone

What is the default data protection level assigned during volume creation, if at least two storage volumes are
available in the cluster?

RAID 10

What is a storage device port directly attached to a fabric called?

Select the correct response.

N_Port

Which two metrics measure drive reliability? (Select two.)

mean time between failures (MTBF)

mean time to failure (MTTF)

decreasing failure rate (DFR)

annualized failure rate (AFR)

time to live (TTL)


Which statements correctly describe the use of SAS edge expanders? (Select two.) Sai

There can only be one edge expander per SAS domain.

Each SAS domain must have one primary and one backup edge expander.

When an edge expander is incorporated into the architecture, up to 128 segments can exist within a SAS domain. SAI

Edge expanders can address up to 128 SAS addresses or drives in a segment. SAI

Server-attached storage configurations typically use edge expanders.


What is one advantage of an iSCSI SAN? (Select the correct answer.)
It does not require special host bus adapters (HBAs). ****
Refer to the diagram.

Identify the labeled components in the diagram.

To answer the question, drag the component on the right to the letter on the left.

A
hosts
B
switches
C
storage
Device-level authentication must be on the list of permitted devices on the network in order to
communicate. Which additional function must a device be able to perform to prevent WWN
spoofing? (Select the correct answer.)

to identify and authenticate itself *****

What is one cause of attenuation? (Select the correct answer.)

passive components such as cables and connectors **

What is one advantage of MPIO? (Select the correct answer.)

provides load balancing ******


Which statements correctly describe the Solid State Drives? (Select three.)

Single-Level Cell (SLC) drives provide faster write performance and greater reliability. ****1

Four distinct states can be stored in each SLC. *****1

Server storage uses predominantly MLC technology.

Multi-Level Cell (MLC) drives cost less and provide higher storage densities.

MLC technology is based on two bit values per cell—either zero or one. ****1

SSDs connect to the host system using an optimized ESDI communication protocol.
What is the primary benefit of Fibre Channel over Ethernet? (Select the correct answer.)

higher I/O consolidation *****

A customer’s systems administrator has created a fully redundant SAN fabric with redundant
host bus adapters (HBAs), four switches, and redundant ports. However, the LUN is presented
incorrectly multiple times at the host.

What should the admin do? (Select the correct answer.)

Verify the correct installation of the MPIO software.

Verify the correct installation of the FCoE initiators.

Remove two switches from the network. SAI

Update the software on the switches. SAI


What is one advantage of a point-to-point (P2P) topology? (Select the correct answer.)

Full bandwidth is available for the link. **

A customer needs to implement a new fabric in a single location. The new fabric must have fully
redundant paths and hardware. Which type of fabric must the customer use? (Select the correct
answer.)

Full mesh topology **

Single switch fabric SAI

Cascading topology SAI

Ring fabric topology SAI


In this diagram, label “B” refers to which data protection goal? (Select the correct answer.)

Recovery Time Objective (RTO) ****

Anda mungkin juga menyukai