0% found this document useful (0 votes)
126 views6 pages

Untitled

Uploaded by

sgjky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views6 pages

Untitled

Uploaded by

sgjky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1 . Why is it important for organizations to accelerate their digital transformation efforts?

 Maintain a competitive advantage in digital environment

2 . What is an accurate statement about unstructured data?

 Difficult to extract information from data using traditional application and requires considerable
resources
3. Under the IaaS model, which elements are managed by the provider?
 virtualization , servers , networking
4 . Which cloud computing characteristic allows on demand capacity scaling in real time?
 Rapid Elasticity
5 . An organization wants to migrate to a new payroll application . they lack the skills to deploy
and administer the new application .
Which cloud service model will meet their their need ?
 Software as a service
6 . An organization is evaluating a cloud deployment solution that allows them to select various
cloud service providers . They want to avoid vendor lock – in issues while optimizing
performance and cost
Which recommended cloud deployment model will meet their requirement ?
 Multi – cloud
7 . Which cloud deployment model allows provisioning of a cloud infrastructure only for use by
a single organization having multiple tenants?

 Private cloud
8 . Which technology is used in the media and entertainment industry to enable contant - based
search and create video subtitles using natural language processing ?
 Machine learning
9 . What is true regarding information-centric storage architecture?
 Storage capacity can be increased dynamically without impacting information availability .
10 . What is true about software defined architecture?
 Provides a unified management platform for centralized monitoring and administration

11 . Which logical components are required in compute systems?


 Operating system file system logical volume manager device driver
12 . Which hypervisor component is responsible for assigning system resources to virtual
machine ?
 VMM
13 . Which system has a chassis with slots holding multiple servers and provides an integrated
power supply, cooling, networking, and management functions?
 Blade computer system
14 . Solid – state (flash ) drive - stores data on semiconductor-based memory
Optical disc drive (HDD) - Stores data on a circular disk with a ferromagnetic
coating
Magnetic disk drive - stores data on a polycarbonate disc with a reflective
coating
Magnetic tape drive - Stores data on a thin plastic film with a magnetic
coating
15 . Which statement describes the purpose of containers?
 Bundles an application with required software libraries to run anywhere
16 . In which format do block – based storage systems store data ?
 Fixed block of 512 bytes each
17 . what is the time taken by the platter of a hard disk drive to position data under the read
/right head?
 Rotational Latency
18 . What is the stripe size of a 5 – disk RAID 5 group with a strip size of 32 KB ?
 128 KB
19 . Which block – based storage system component connects hosts to the storage system ?
 Front – end ports .
20 . What is an advantage of sub-LUN tiering?
 Improved performance
21 . Which statement are both accurate about scale – up NAS system ?
 Provides the ability to independently grow capacity and performance Can add NAS controllers
that contain CPU and memory
22 . What is used to track where objects and metadata are stored in an OSD system ?
 Object Storage database
23 . What is an accurate statement about NAS ?
 Enables both UNIX and Microsoft Windows users to seamlessly share the same data
24 . what are the essential components of an object in an object – based storage system ?
 Data , user – defined attributes , metadata , and object ID
25 . In a Fibre Channel (FC) protocol stack, what is the function of the FC-1 layer?
 Provides transmission words , primitive signals , and link initialization

26 . What is a domain ID represented in Fiber Channel (FC) addressing ?


 Unique number provided to each switch in the fabric .
27 . An IT organization wants to implement a fibre channel ( FC ) SAN that provides high
scalability and better utilizes their data storage systems. They wants to minimize the number of
inter – switch links (ISL) that are required for storage traffic .
Which FC SAN type should be recommended ?
 Core – edge .
28 . In the FC protocol stack , what is the function of the FC – 4 layer ?
 Defines application interfaces and maps storage protocols
29 . An IP SAN uses the Internet Protocol to transport which I/O block type ?
 Storage block I/O data over a LAN
30 . What is an accurate statement about a Converged network Adapter ( CAN ) ?
 Physical adapter that provides the functionality of both a standard NIC and an FC HBA in a single
device .
31 . A company needs to transmit data over long distances between their disparate FC SANs at
multiple geographic locations . Which recommended protocol should be adopted by the
company ?
 FCIP
32 . What is used to implement a fully functional SAN ?
 iSCSI
33 . what is true about an iSCSI HBA ?
 Performs both ISCSI and TCP / IP processing .
34. In a bridged iSCSI network , which type of network enables the iSCSI gateway to connect
servers to storage systems ?
 Server Ethernet ports and storage system N _Port .
35 . Why should organizations use Fibre Channel over IP ?
 To support replication of data across data centers for disaster recovery
36. Why should organizations deploy FCoE network in a data center environment ?
 To reduce the number of cables , NIC cards , and ports
37 . What provides user with self service access to pre – defined storage service ?
 Service catalog

38 . What is a feature of a business continuity solution ?


 Reduces investment costs associated with protecting information vital to business continuance .
39 . When using the erasure coding technique in an object – based storage system . data is
divided in to 8 data segments and 4 coding segments . What is the maximum number of disk
drive failures against which data is protected by the configuration ?
 4
40. A fiber channel switch has eight ports and all ports must be operational 24 / 7 . However , a
failure of Port 8 occurs on a particular week as follows .
Monday = 11 AM to 12 PM
Thursday = 8 AM to 11 AM
Saturday = 11 AM to 4 PM
Sunday = 10 PM to 1 AM
What is the availability of port 8 in that week ?
 92.8%
41 . An Ethernet switch has eight ports and all ports must be operational for 24 hours; from
Monday through Friday. However, a failure of Port 2 occurs as follows:

 Monday = 5 PM to 9 PM
 Wednesday = 4 PM to 9 PM
 Friday = 6 AM to 9 AM
 Saturday = 9 AM to 1 PM

What is the MTBF of Port 2?


 36
42 . information availability = X / (X+Y)
Refer to the Example :
What do X and Y represent in the formula for Information Availability ?
 MTBF and MTTR
43 . What accurately describes an image – based backup ?
 Recovery at both the virtual machine and file level is supported
44 . What are the functions of the storage node in a backup architecture ?
 Responsible for organizing client data and sending data to a backup device .
45 . Which component initiates scheduled backups during backup operations ?
 Backup Server
46 . Which component sends the restore metadata to the backup server during a recovery
operation ?
 Storage node
47 . What is an advantage of implementing email archiving ?
 Increase the mailbox space by moving old emails to archive storage
48 . What is a specialized replication technique that enables moving data from one storage
system to another with a data center without incurring downtime ?
 Migration
49 . Which factors affect the recovery point objective (RPO) in a storage system – based
asynchronous remote replication ?
 Size of the buffer and available network bandwidth
50 . During a write spilt operation in continuous data protection (CDP) replication , one of the
I/Os is received by the local CDP appliance . Which component received the offer I/O ?
 Production volume
51 . What is the function of a CDP appliance ?
 Manages both local and remote data replication .
52 . What specialized replication technique enables moving data between storage systems
within a data center , between data centers , and between the data center and the cloud ?
 Data migration
53 . What type of migration is used to move VMs from one compute system to another without
downtime or service disruption ?
 Hypervisor based migration
54 . What is true about synchronous remote replication ?
 Supports locality of reference to conserve link bandwidth .
55 . A company’s assets are continuously under attack . To deploy a security control mechanism
to protect these assets , what should be considered ?
 Easy access to assets by authorized users
56 . An organization wants to secure and protect the data from unauthorized access on a
storage medium.

Which security control helps to secure the data?


 Encryption

57 . What is the advantage of adopting OpenID by an organization ?


 Eliminates the need for the organization to deploy their own authentication system .
58 . Which security control allows a client to access protected resources from a resource server
on behalf of a resource owner ?
 OAuth
59 . What is provided by performing an infrastructure discovery ?
 Creating a list of infrastructure components and their related information
60 . What is an example of an Availability Management task in storage infrastructure
management?

 Designing a new replication solution for data redundancy

You might also like