Sunteți pe pagina 1din 19

2. What is a function of N_Port ID Virtualization (NPIV)? (Select the correct answer.

NPIV is a Fibre Channel protocol that enables you to assign the same physical link to multiple iSCSI
initiators.

NPIV allows multiple protocols to pass over Fibre Channel media, enabling a single port to handle
any assigned protocol.

NPIV makes multiple Fibre Channel ports appear as a single virtual port.

NPIV makes a single Fibre Channel port appear as multiple virtual ports, each having its own N_Port
ID and virtual WWN.

3. What is one advantage of a point-to-point (P2P) topology? (Select the correct answer.)

All ports share the available bandwidth.

Loss of one component does not interrupt the link.

It offers greater data security.

Full bandwidth is available for the link.

4. A customer is designing an HPE BladeSystem with a Fibre Channel SAN. They are using a single
director-type switch with 512 useable Fibre Channel ports in addition to ICL ports. What must the
customer do in order to ensure that all the ports in the SAN are supported?

Enable Class 3 communication to guarantee fixed latency and in-order delivery.

Enable buffer-to-buffer flow control to relieve port-to-port congestion.

Configure Virtual Fabric with 10-bit addressing.

Configure a Name server to run on the switch.


5. Which network topology design meets these criteria?

- Ease of scalability by adding switches and other devices


- Multiple paths for internal fabric resiliency
- Support for a mix of local data access and the occasional centralized data access

(Select the correct answer.)

Full mesh topology

Single switch fabric

Cascading topology

Ring fabric topology

6. Which statements correctly describe the use of SAS edge expanders? (Select two.)

There can only be one edge expander per SAS domain.

Server-attached storage configurations typically use edge expanders.

Edge expanders can address up to 128 SAS addresses or drives in a segment.

When an edge expander is incorporated into the architecture, up to 128 segments can exist within a
SAS domain.

Each SAS domain must have one primary and one backup edge expander.

7. Which part of the 24-bit Fibre Channel port address relates to the domain ID of the switch? (Select
the correct answer.)

attached N_ports and NL_Ports


domain bits 23 to 16

individual FL_Ports supporting loops

octets with a value of 256

8. Which network topology design meets these criteria?

- Easy installation and configuration of servers and storage


- Maximum fabric performance because all communicating devices connect to the same switch
- Support for local, centralized, and distributed data access needs

(Select the correct answer.)

Single switch fabric

Cascading topology

Full Mesh topology

Ring fabric topology

9. Which HPE resource describes how HPE storage systems, storage management tools, and Fibre
Channel products can be used in SAN? (Select the correct answer.)

Core to Edge Design Guide

Watson Cook Book

HPE RT3 Reference Guide

SAN Design Reference Guide

10. Refer to the graphic.


Which type of zoning is illustrated in the graphic? (Select the correct answer.)

Hardware enforcement zone

Traffic isolation zone

LSAN zone

QoS zone

11. Refer to the diagram.

In this diagram, label “B” refers to which data protection goal? (Select the correct answer.)

Recovery Point Objective (RPO)

Recovery Time Objective (RTO)

Recovery Time Actual (RTA)

Recovery Consistency Objective (RCO)

12. A customer is working in the test and development department to test new scenarios that use
servers connected to shared storage. The customer wants to set up a quick fabric, and is not
concerned about any type of failover or redundancy.

Which type of topology should the customer implement? (Select the correct answer.)

Ring

Mesh
Cascading

Single-switch

13. Which network RAID levels can withstand a simultaneous failure of any two storage systems?
(Select three.)

RAID 5

RAID 10

RAID 8

RAID 10+1

RAID 10+2

RAID 6

14. An NPIV port allows a single HBA on a storage array to register with a fabric. What does NPIV use to
accomplish this? (Select the correct answer.)

LUN names

iSCSI initiators

FC-AL ports

Worldwide names

15. A customer has multiple store locations; all remote stores back up their data to the corporate
office. Which type of protection is this customer implementing? (Select the correct answer.)
edge

remote

centralized

cloud

16. What is a storage device port directly attached to a fabric called?

Select the correct response.

NL_Port

N_Port

FL_Port

F_Port

17. Refer to the diagram.

Which network RAID level does this diagram represent? (Select the correct answer.)

RAID 10+1

RAID 10+2

RAID 5

RAID 10
18. What is the name of the technique used to increase the overall endurance of NAND-based Solid
State Drives that continuously remaps logical SCSI blocks to different physical pages in the NAND
array? (Select the correct answer.)

defragmenting

wear leveling

over-provisioning

under-provisioning

19. Which statements about Native Command Queuing are correct? (Select three.)

It optimizes performance of cross-fabric traffic when multi-function routers are used.

It increases performance of SATA drives.

It reduces unnecessary disk drive head movement.

It is a function of HP Smart Array controllers.

It optimizes the order in which read and write operations are executed by SATA disk drives.

It increases bandwidth of SAS drives used in SANs.


20.

21.

What are the two types of expanders used in SAS topologies? (Select two.)

cascaded

ring

edge

core

fan-out
22. What is the minimum number of storage systems required by network RAID 10+2? (Select the
correct answer.)

23.

24. Device-level authentication must be on the list of permitted devices on the network in order to
communicate. Which additional function must a device be able to perform to prevent WWN
spoofing? (Select the correct answer.)

to identify itself as a transitive trusted ally


to be primary in the ACLs

to decrypt encrypted data

to identify and authenticate itself

25. Which term describes the maximum targeted period in which data might be lost from an IT
service due to a major incident? (Select the correct answer.)

Recovery Time Actual (RTA)

Recovery Consistency Objective (RCO)

Recovery Time Objective (RTO)

Recovery Point Objective (RPO)

26. Which IP storage protocol is a gateway-to-gateway network standard that enables the
implementation of Fibre Channel functionality over an IP network? (Select the correct answer.)

iSCSI

FCoE

iFCP

FCIP

27. Which IP storage protocol is a gateway-to-gateway network standard that enables the
implementation of Fibre Channel functionality over an IP network? (Select the correct answer.)

FCoE

iFCP
iSCSI

FCIP

28.

29. What is the primary benefit of Fibre Channel over Ethernet? (Select the correct answer.)

higher I/O consolidation

increased performance

increased distance

better reliability
30.

31. Which term refers to the reduction in the power of the light signal as it is transmitted? (Select the
correct answer.)

dispersion

modulation

attenuation

refraction

32. Which drive interconnect technology uses a point-to-point, full-duplex serial connection and
provides high performance and reliability needed by mission-critical, high I/O application
environments? (Select the correct answer.)

SATA

ATA
SAS

SCSI

33. What is a function of zoning? (Select the correct answer.)

restricts the communication across a fabric

controls data access between devices and WWNs

applies zoning to the switch port to which a device is connecte

restricts the fabric name service to show an allowed subset of devices

34. Which statement regarding iSCSI technology is true? (Select the correct answer.)

The iSCSI protocol uses SMB, which takes advantage of existing Internet infrastructure and
management facilities to address distance limitations.

iSCSI is a session layer protocol that describes how SCSI packets are transported over a TCP/IP
network.

Before establishing an iSCSI connection, the iSCSI initiator must discover ports that it can associate
the WWN to.

The iSCSI protocol allows the SCSI command to be sent end-to-end over LANs, WANs, or the
Internet.
35.

36.
37. What is the default data protection level assigned during volume creation, if at least two storage
volumes are available in the cluster? (Select the correct answer.)

network RAID 10

network RAID 10+2

network RAID 10+1

network RAID 6

network RAID 5

38.

39. Which RAID technology has the following characteristics?

- Does not have a performance penalty for read operations


- Does have a performance penalty on write operations
- Can handle two disk failures
- Requires a minimum of four disk drives
- Reduces storage capacity by two disk drives

(Select the correct answer.)

RAID 5

RAID 1+0

RAID 6

RAID 1

40. A customer needs to implement a new fabric in a single location. The new fabric must have fully
redundant paths and hardware. Which type of fabric must the customer use? (Select the correct
answer.)

Cascading topology

Single switch fabric

Full mesh topology

Ring fabric topology

41
42.

What is the OSI model?

industry standards for how data should be protected, backed up, and made available for recovery

industry standards for how to use Fibre Channel protocols to send data over the Internet

a reference for how messages should be transmitted using NVIP

a reference for how messages should be transmitted between any two points in a network

43. A company’s policy restraints require security to be implemented only at the SAN. Which
technique can the company implement at the SAN storage array level? (Select the correct answer.)

Data-at-rest encryption

User access level


Data-in-flight encryption

Fabric active encryption

44.

When ports between two switches form an inter-switch link (ISL), what type are they? (Select the
correct answer.)

FL_Port

NL_Port

E_Port

B_Port

F_Port

45.

Assuming a tiering hierarchy that begins with Tier 0, which storage tier is called near line, employs
backup devices such as tapes and tape libraries, and is ideal for file recovery? (Select the correct
answer.)

Tier 2

Tier 3

Tier 4

Tier 5

46.

What is one advantage of an iSCSI SAN? (Select the correct answer.)


It does not require special host bus adapters (HBAs).

It operates on a clear text protocol.

It uses the host CPU for processing.

It allows you to build a lossless packet network.

47. What is one advantage of MPIO? (Select the correct answer.)

consolidates backups

enables Boot-from-SAN

provides load balancing

allows full throughput with NPIV

48.
Which statements correctly describe the Solid State Drives? (Select three.)

Single-Level Cell (SLC) drives provide faster write performance and greater reliability.

SSDs connect to the host system using an optimized ESDI communication protocol.

Four distinct states can be stored in each SLC.

Server storage uses predominantly MLC technology.

MLC technology is based on two bit values per cell—either zero or one.

Multi-Level Cell (MLC) drives cost less and provide higher storage densities.

S-ar putea să vă placă și