To answer the question, drag the item on the right to the core principle on the left. SAI
Fault protection
Privacy
Authenticity
Reliability
Availability
Possession
data protection
information security
Which term refers to the reduction in the power of the light signal as it is transmitted? (Select the
correct answer.)
Attenuation ******
refraction
dispersion
modulation
Refer to the graphic.
flow control
arbitrated loop
soft zoning
Ring fabric
What is the OSI model?
a reference for how messages should be transmitted between any two points in a network ******
Which drive interconnect technology uses a point-to-point, full-duplex serial connection and
provides high performance and reliability needed by mission-critical, high I/O application
environments? (Select the correct answer.)
SAS
Which term describes the maximum targeted period in which data might be lost from an IT
service due to a major incident? (Select the correct answer.)
Assuming a tiering hierarchy that begins with Tier 0, which storage tier is called near line, employs
backup devices such as tapes and tape libraries, and is ideal for file recovery? (Select the correct
answer.)
Tier 2
Tier 3
Tier 4
Tier 5
Which statements correctly describe the use of SAS edge expanders? (Select two.)
Each SAS domain must have one primary and one backup edge expander.
Edge expanders can address up to 128 SAS addresses or drives in a segment.
When an edge expander is incorporated into the architecture, up to 128 segments can exist within a SAS domain.
Which type of topology is represented in the graphic? (Select the correct answer.)
What is the minimum number of storage systems required by network RAID 10+2? (Select the
correct answer.)
4 *****
A customer is designing an HPE BladeSystem with a Fibre Channel SAN. They are using a
single director-type switch with 512 useable Fibre Channel ports in addition to ICL ports. What
must the customer do in order to ensure that all the ports in the SAN are supported? Sai
Cascading topology
FCoE
iSCSI
FCIP
iFCP ******
Which statement regarding iSCSI technology is true? (Select the correct answer.)
The iSCSI protocol allows the SCSI command to be sent end-to-end over LANs, WANs, or the Internet.
Which type of cable is shown in the graphic? (Select the correct answer.)
Triple-mode SAI
Multimode ***
Laser
Single-mode SAI
A customer is working in the test and development department to test new scenarios that use
servers connected to shared storage. The customer wants to set up a quick fabric, and is not
concerned about any type of failover or redundancy.
Which type of topology should the customer implement? (Select the correct answer.) SAI
Ring
Single-switch ***
Cascading SAi
What is a function of N_Port ID Virtualization (NPIV)? (Select the correct answer.)
NPIV makes a single Fibre Channel port appear as multiple virtual ports, each having its own N_Port ID and virtual
WWN. ********
Which network RAID levels can withstand a simultaneous failure of any two storage systems?
(Select three.) Sai
RAID 8
RAID 5 *
RAID 10
RAID 10+1 *
RAID 6
RAID 10+2 *
An NPIV port allows a single HBA on a storage array to register with a fabric. What does NPIV use to
accomplish this? (Select the correct answer.)
Worldwide names ******
A customer has multiple store locations; all remote stores back up their data to the corporate
office. Which type of protection is this customer implementing? (Select the correct answer.)
Centralized *
RAID 6 **
When ports between two switches form an inter-switch link (ISL), what type are they? (Select
the correct answer.)
NL_Port
F_Port SAI
E_Port
FL_Port SAI
B_Port
What are the two types of expanders used in SAS topologies? (Select two.)
fan-out **
Edge ***
Refer to the diagram.
In this diagram, label “A” refers to which data protection goal? (Select the correct answer.)
Which part of the 24-bit Fibre Channel port address relates to the domain ID of the
switch? (Select the correct answer.) Sai
It optimizes performance of cross-fabric traffic when multi-function routers are used. *****
It optimizes the order in which read and write operations are executed by SATA disk drives.
Cascading topology
Hold SAI
Pre SAI
Stop
Pause
Which network RAID level does this diagram represent? (Select the correct answer.)
RAID 5 *****
Arrange the steps to properly boot SAN components into the correct order.
To answer the question, drag the step on the right to the order represented on the left.
First
Second
Third
Fourth
Boot the host system(s).
Power on the SAN fabric.
Confirm the target drives are visible.
Power on the storage arrays.
Which HPE resource describes how HPE storage systems, storage management tools, and Fibre
Channel products can be used in SAN? (Select the correct answer.)
Which type of zoning is illustrated in the graphic? (Select the correct answer.) Sai
Traffic isolation zone
What is the default data protection level assigned during volume creation, if at least two storage volumes are
available in the cluster?
RAID 10
N_Port
Each SAS domain must have one primary and one backup edge expander.
When an edge expander is incorporated into the architecture, up to 128 segments can exist within a SAS domain. SAI
Edge expanders can address up to 128 SAS addresses or drives in a segment. SAI
To answer the question, drag the component on the right to the letter on the left.
A
hosts
B
switches
C
storage
Device-level authentication must be on the list of permitted devices on the network in order to
communicate. Which additional function must a device be able to perform to prevent WWN
spoofing? (Select the correct answer.)
Single-Level Cell (SLC) drives provide faster write performance and greater reliability. ****1
Multi-Level Cell (MLC) drives cost less and provide higher storage densities.
MLC technology is based on two bit values per cell—either zero or one. ****1
SSDs connect to the host system using an optimized ESDI communication protocol.
What is the primary benefit of Fibre Channel over Ethernet? (Select the correct answer.)
A customer’s systems administrator has created a fully redundant SAN fabric with redundant
host bus adapters (HBAs), four switches, and redundant ports. However, the LUN is presented
incorrectly multiple times at the host.
A customer needs to implement a new fabric in a single location. The new fabric must have fully
redundant paths and hardware. Which type of fabric must the customer use? (Select the correct
answer.)