Q:
Identify the tasks involved in Storage Capacity management
belongs to collection: STORAGE AREA NETWORKS MCQ
STORAGE AREA NETWORKS MCQ
- What is the most basic level of storage?
- A NAS solution is most appropriate for what type of data environment?
- Which three statements describe differences between Storage Area Network (SAN) and Network Attached Storage (NAS) solutions? Choose three
- I/O requests to disk storage on a SAN are called
- What’s the demerits of DAS ?
- Which topology is best suited for medium sized enterprise
- Disk controller driver in DAS architecture is replaced in SAN either with _____________
- Which storage technology requires downtime to add new hard disk capacity?
- In SAN storage model, the operating system view storage resources as ________ devices
- Identify a network file protocol in the below mentioned set
- What will be used by SAN to provide connectivity between hosts and storage?
- In FC structure which layer maps block I/O SCSI commands into FC frames?
- What are the major benefits of SAN?
- Which data storage technology offers the best performance?
- Identify the data storage technology used in the data center?
- Which of the following is not a non volatile storage device?
- Which of the following is sequential access storage device?
- Which of the Following is not an off-line storage device?
- Pick the wrong statement about the hard disk?
- Which of the following statements about various hard disks is wrong?
- Which of the following is false?
- Which of the following is not true about JBOD?
- Pick odd one out
- Which one of the following is not an advantage of RAID?
- Pick the false statement about RAID 0
- Pick the false statement
- Which of the following provides byte level striping?
- State true or false. Nested RAID provides better performance characteristics than the RAID levels that comprise them
- State true or false. RAID Level 6 has dual parity where as RAID Level 5 has single parity and both does block level striping
- State true or false. RAID Level 7 does Asynchronous cached striping with dedicated parity
- Which of the following is false about tape devices?
- Select the correct option regarding tape drive
- A tape library does not contain
- Which of the following is not true about a tape silo?
- For long term storage (archival) of data which of the following storage devices is generally used
- Which of the following Company manufactures Tape Library?
- Which of the following Company manufactures RAID devices?
- Following are some of the file sharing protocols
- File access protocols operate in which layer of the OSI model?
- NFS and CIFS are
- The file access protocols are primary features of
- NFS stands for
- NFS doesn’t have the following characteristics
- NIS is used for?
- AutoFS is a feature used for?
- Following are Naming services
- Which command is used to view NFS shared directories?
- Which file would you edit to mount an NFS filesystem at system boot time?
- Which command would mount the directory utilities from the server named compsciedu on the local mount point /opt/sf?
- CIFS runs over the following protocols:
- CIFS doesn’t support the following?
- CIFS is used in the following OS?
- CIFS was originally derived from
- CIFS authentication is done by
- SMB was originally developed by
- RPC is used for
- A “Fiber Connector” is used to
- SFP(Small form-factor pluggable) uses which kind of Fiber Connector?
- Fiber Optic Cable uses
- Single-mode fiber supports transmission distance up to
- As per the color coding schemes which color is used for multi mode fiber cable?
- What is used to facilitate conversion between two forms of media?
- What is the typical I/O Data rate supported by Qlogic 24xx series of FC HBA?
- Each FC HBA has a
- When a Fiber Channel switch is implemented in a SAN, the network is referred to
- A SAN network can have
- Which of the following company manufactures FC switches?
- An FC analyzer can be used to
- To increase the distance of a fiber you will use
- GBIC, GLM and SFPs carry out
- Which of the following company manufactures FC HBA?
- In FC, which of the following are analogous to IP address in data networks?
- Who determines the WWN of FC end point?
- Which of the following is the use of trunking?
- Which field of the frame header signifies the presence of optional header?
- Which of the following uniquely identifies an upper layer protocol command within a FC system?
- In a fabric topology what is the discovery process that allocates fabric address to the participating n-ports?
- Which FC layer is responsible for exchange/frame and sequence management?
- Which of the following login is associated with creating an ULP level image pair?
- What is the mechanism used to do flow control between participating N-Ports in a FC communication?
- In FCP (FC protocol for SCSI), which of the following phases is not mandatory for read type commands?
- Which of the following is (are) not the responsibility of RSCN service in a fabric?
- Which component of the FC frame header has details about the ULP?
- Which of the following enforces access control in SAN/FC switches?
- What is the significance E-Port?
- What is SAS?
- Which of the following is true?
- SAS Domain can have:
- Which of the following is false?
- Which of the following is false?
- Which of the following is false?
- Which of the following is true for Expander device?
- Which of the following is false?
- Which of the following layer is present in a SAS port?
- Which of the following protocol has slowest speed?
- Which of the following protocol can have a maximum device connected?
- SAS port identifier is:
- SAS inherited the multi-channel concept from?
- Which of the following is false?
- Which of the following is not a transport layer protocol in a SAS port?
- iSCSI is mapping of
- iSCSI allows what type of access?
- iSCSI names are:
- Which of the following is not true of iSCSI names?
- Which of the following is not a valid iSCSI name?
- Which of the following is not a valid iSCSI name?
- Discovery session in iSCSI is used for:
- Which of the following are valid SendTargets commands?
- iSCSI targets can be discovered by
- Which of the following is false?
- Which of the following is false regarding multiple paths?
- Which of the following is invalid error recovery level?
- Which of the following companies have iSCSI products?
- Which of the following is correct about hardware RAID controllers?
- Which RAID type doesn’t use parity for data protection?
- Which one of these is characteristic of RAID 5?
- What is the unique characteristic of RAID 6 (Choose one)?
- Which of the following combinations can support RAID 05?
- Which of the following raid levels provides maximum usable disk space?
- Can you help decide on the RAID level to use –
- The mean time to failure of a single disk is 200000 hrs. If an array of disks is using 5 such disks, the mttf of the array is
- An array of disks is more likely to fail compared to a single disk. How is it that RAID arrays still manage to provide more data protection compared to a single disk?
- Which of the following suffers from write hole problem?
- If read and write performance is the only criterion, which would you choose?
- Which one of the following is an invalid RAID level?
- Which of the following RAID levels guarantees double disk failure protection?
- Which of the following RAID levels are nested?
- What is the name of raid module in a linux kernel?
- What is the minimum number of disks needed for Raid level 5?
- When one disk fails in a RAID 5 array with a hot spare, which one of the following statements is true?
- When one disk fails in a RAID 5 array without a hot spare, which one of the following statements is true:
- Which is the most common cause of soft errors in hardware?
- If X is the MTBF of a system and Y is the failure rate of the system then which one is true?
- Which one of the property is NOT a requirement for Fault Tolerance?
- Which of the operating system architecture is suitable for FT based systems?
- The common mechanism used to find latent failure in memory modules:
- Which one of the availability criteria is optimal for carrier grade class systems?
- MTTR is the best way to characterize
- An “Inode” represents
- Journaling is preferred for
- Examples of Journaling filesystem
- Hard links and soft links are same
- VFS
- Buffer cache helps to
- Wear leveling affects
- Deframentation is the process of
- The Superblock is required for
- Fileystem is created using command
- Pseudo filesystem (/procfs)
- Every File or directory has unique
- Inode bitmaps used for
- Dirty buffer cache contains
- What is SCSI?
- Nexus is a relation between
- Task can constitute
- Task manager
- Untagged task is represented by
- Which is not the main phase of I/O?
- Which of the following is false?
- What is incorrect about Command Descriptor block?
- What is a Logical Unit?
- Which of them is not a valid SCSI command?
- Control byte is
- Length of Logical Unit number is
- SCSI Domain should have:
- Which of the following is false?
- SATA initially came as a evolution/improvement over
- What is the BUS architecture used by SATA?
- Maximum number of SATA devices that can be connected through SATA is
- What is the maximum distance that you can connect through a SATA?
- What are the advantages of SATA over ATA?
- What is the maximum number of commands that you can queue when you use Native Command Queuing
- NCQ gives best improvement in performance when the access from the host is
- With Port Multiplier you can increase the number of devices to
- In Command Based switching which of the following is not true?
- Which of the below is component of SAN?
- What components on SAN can be virtualized?
- C-H-S is a terminology related to
- Which device implements Tape-Over-Tape Virtualization?
- What emulates the Scsi Media Changer command set?
- What is one significant advantage of Virtualization in datacenters?
- Powerpath is the MPIO software of
- Which is the correct statement?
- Decoupling the Host and real targets in a datacenter is a bliss because it
- Which of the following company manufactures Raid arrays?
- An FC jammer-analyzer can be used to
- Network level virtualization in a SAN fabric can be implemented by having virtualization engine running in
- VTL emulates
- Which of the following company manufacture San Fabric switches?
- A “Logical Volume Manager” helps in
- Physical Volumes are
- Logical Volumes _____
- A logical Extent(LE) and Physical extent(PE) are related as follows
- LVM is independent of device IDs because
- Concatenation is the technique of
- Which of the following is not a feature of LVM
- LVM does not incur much performance overheads because
- VGDA represents
- A Subprofile can reference other subprofiles
- Clients use which protocol to discover SMI Agents on Storage Area Network?
- Encoding mechanism of CIM Data as XML Elements ?
- Can a vendor implement additional Classes or support additional Properties than are defined in a Profile and still be considered conformant?
- CIM and WBEM has been defined by ?
- _________ instruments one or more aspects of the CIM Schema
- The server can operate directly on the underlying system by calling the system’s commands, services, and library functions
- Transport protocol used for XMLCIM is
- A single CIM based management application can manage storage arrays from multiple vendors
- Collects responses from providers and returns to the client
- To show CIM elements in diagram form, the SMI-S 1.1.0 uses a variation of which standard specification from OMG?
- A Subprofile defines additional CIM elements that a vendor may choose to implement in order to enhance a Profile
- Packages – these are similar to sub-profiles but optional for a parent profile
- CIMOM and Providers are hosted on CIM Client
- CIM Client can only Monitor but cannot control remote resources
- Storage management comprises of
- Identify the storage devices
- Which protocols are used for Storage management?
- Identify the difficulties the SAN administrator incur while dealing with diverse vendors
- How do Storage administrators ensure secure access to storage devices:
- Effective Storage management includes
- Identify the tasks involved in Storage Capacity management
- Identify the tasks involved in Storage Performance Management
- Effect of open standards like SMI(s)
- Task of Distributed Management Task Force is
- SMI-S Standard uses
- This is a repository for the storage, management, and dissemination of data in which the mechanical, lighting, electrical and computer systems are designed for maximum energy efficiency and minimum environmental impact
- This is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network
- Simply stated, these are large boxes that hold lots of hard disks
- This consists of the precautions taken so that the effects of a disaster will be minimized
- This is the practice of collecting computer files that have been packaged together for backup, to transport to some other location, for saving away from the computer so that more hard disks can be made available, or for some other purpose
- This is a way of storing the data in different places on same/different storage. By doing so I/O operations can overlap in a balanced way, improving performance and providing fault tolerance
- This is a method of reducing storage needs by eliminating redundant data
- This is the pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console
- This is the assignment of different categories of data to different types of storage media in order to reduce total storage cost. Categories may be based on levels of protection needed, performance requirements, frequency of use and other considerations
- This is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe
- This technology provides the benefits of disk storage in a system that emulates a tape library to existing backup software
- This is a feature of storage security that is gaining favor among enterprises that use storage area networks (SANs)
- Without this practice, backing up data is virtually useless
- This ensures proper adherence to government regulations regarding the integrity, accessibility and retention of important data
- There are endless rules and regulations in this area of storage technology
- The purpose of backup is:
- Which of the following backup technique is most space efficient?
- Which of the following qualifies as best DR (Disaster Recovery) site?
- Which of the following techniques can be used for optimizing backed up data space?
- To decide on a backup strategy for your organization, which of the following should you consider?
- Which of the following is false?
- Which of the following is Backup software?
- Which of the following statement is false for snapshots?
- Which of the following is true for CDP – Continuous Data Protection?
- Which of the following is false for D2D2T – Disk to Disk to Tape backup?
- Which of the following is false for NDMP protocol?
- The serverless backup technology mainly depends on
- Snapshot provides a mechanism to take backup of
- Snapshot provides information on
- The CDP is mainly based on
- Which snapshot technique is space efficient?
- Data protection is required to recover from
- The challenges for data protection are
- Name the mechanism which provides the highest level of data protection
- Which statements are true w.r.t SMART disks?
- The drawback of data mirroring is
- With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration? Volume manager provides protection against multiple disk failures
- Which are all the statements valid statements w.r.t volume manager?
- Point out the false statement. Volume can
- Identify the correct statements w.r.t. Journal File System (JFS)
- In a clustered volume manager scenario, identify the incorrect statement
- Bathtub Curve is used to represent the reliability characteristics of hardware components. Why is this not applicable to software modules?
- Which one of the below is measured by MTBF?
- In designing a fault-tolerant system which one of the methods is appropriate?
- A system has MTBF of 100,000 hours and MTTR of 30 minutes. What is the average down time of the system in one year?
- What is the most common redundancy configuration for HA?
- One of the common problems seen in a cluster configuration has a name which contains the most complex part of human body
- Which one of the following is a cluster, based on shared nothing model?
- The MTBF of system should be high for fault tolerant systems with
- Which one of the following is NOT a Single System Image Clustering Solution?
- The original message, before being transformed, is
- A transposition cipher reorders (permutes) symbols in aa
(d).All of the mentioned
need an explanation for this answer? contact us directly to get an explanation for this answer