Documente Academic
Documente Profesional
Documente Cultură
NPIV is a Fibre Channel protocol that enables you to assign the same physical link to multiple iSCSI
initiators.
NPIV allows multiple protocols to pass over Fibre Channel media, enabling a single port to handle
any assigned protocol.
NPIV makes multiple Fibre Channel ports appear as a single virtual port.
NPIV makes a single Fibre Channel port appear as multiple virtual ports, each having its own N_Port
ID and virtual WWN.
3. What is one advantage of a point-to-point (P2P) topology? (Select the correct answer.)
4. A customer is designing an HPE BladeSystem with a Fibre Channel SAN. They are using a single
director-type switch with 512 useable Fibre Channel ports in addition to ICL ports. What must the
customer do in order to ensure that all the ports in the SAN are supported?
Cascading topology
6. Which statements correctly describe the use of SAS edge expanders? (Select two.)
When an edge expander is incorporated into the architecture, up to 128 segments can exist within a
SAS domain.
Each SAS domain must have one primary and one backup edge expander.
7. Which part of the 24-bit Fibre Channel port address relates to the domain ID of the switch? (Select
the correct answer.)
Cascading topology
9. Which HPE resource describes how HPE storage systems, storage management tools, and Fibre
Channel products can be used in SAN? (Select the correct answer.)
LSAN zone
QoS zone
In this diagram, label “B” refers to which data protection goal? (Select the correct answer.)
12. A customer is working in the test and development department to test new scenarios that use
servers connected to shared storage. The customer wants to set up a quick fabric, and is not
concerned about any type of failover or redundancy.
Which type of topology should the customer implement? (Select the correct answer.)
Ring
Mesh
Cascading
Single-switch
13. Which network RAID levels can withstand a simultaneous failure of any two storage systems?
(Select three.)
RAID 5
RAID 10
RAID 8
RAID 10+1
RAID 10+2
RAID 6
14. An NPIV port allows a single HBA on a storage array to register with a fabric. What does NPIV use to
accomplish this? (Select the correct answer.)
LUN names
iSCSI initiators
FC-AL ports
Worldwide names
15. A customer has multiple store locations; all remote stores back up their data to the corporate
office. Which type of protection is this customer implementing? (Select the correct answer.)
edge
remote
centralized
cloud
NL_Port
N_Port
FL_Port
F_Port
Which network RAID level does this diagram represent? (Select the correct answer.)
RAID 10+1
RAID 10+2
RAID 5
RAID 10
18. What is the name of the technique used to increase the overall endurance of NAND-based Solid
State Drives that continuously remaps logical SCSI blocks to different physical pages in the NAND
array? (Select the correct answer.)
defragmenting
wear leveling
over-provisioning
under-provisioning
19. Which statements about Native Command Queuing are correct? (Select three.)
It optimizes the order in which read and write operations are executed by SATA disk drives.
21.
What are the two types of expanders used in SAS topologies? (Select two.)
cascaded
ring
edge
core
fan-out
22. What is the minimum number of storage systems required by network RAID 10+2? (Select the
correct answer.)
23.
24. Device-level authentication must be on the list of permitted devices on the network in order to
communicate. Which additional function must a device be able to perform to prevent WWN
spoofing? (Select the correct answer.)
25. Which term describes the maximum targeted period in which data might be lost from an IT
service due to a major incident? (Select the correct answer.)
26. Which IP storage protocol is a gateway-to-gateway network standard that enables the
implementation of Fibre Channel functionality over an IP network? (Select the correct answer.)
iSCSI
FCoE
iFCP
FCIP
27. Which IP storage protocol is a gateway-to-gateway network standard that enables the
implementation of Fibre Channel functionality over an IP network? (Select the correct answer.)
FCoE
iFCP
iSCSI
FCIP
28.
29. What is the primary benefit of Fibre Channel over Ethernet? (Select the correct answer.)
increased performance
increased distance
better reliability
30.
31. Which term refers to the reduction in the power of the light signal as it is transmitted? (Select the
correct answer.)
dispersion
modulation
attenuation
refraction
32. Which drive interconnect technology uses a point-to-point, full-duplex serial connection and
provides high performance and reliability needed by mission-critical, high I/O application
environments? (Select the correct answer.)
SATA
ATA
SAS
SCSI
34. Which statement regarding iSCSI technology is true? (Select the correct answer.)
The iSCSI protocol uses SMB, which takes advantage of existing Internet infrastructure and
management facilities to address distance limitations.
iSCSI is a session layer protocol that describes how SCSI packets are transported over a TCP/IP
network.
Before establishing an iSCSI connection, the iSCSI initiator must discover ports that it can associate
the WWN to.
The iSCSI protocol allows the SCSI command to be sent end-to-end over LANs, WANs, or the
Internet.
35.
36.
37. What is the default data protection level assigned during volume creation, if at least two storage
volumes are available in the cluster? (Select the correct answer.)
network RAID 10
network RAID 6
network RAID 5
38.
RAID 5
RAID 1+0
RAID 6
RAID 1
40. A customer needs to implement a new fabric in a single location. The new fabric must have fully
redundant paths and hardware. Which type of fabric must the customer use? (Select the correct
answer.)
Cascading topology
41
42.
industry standards for how data should be protected, backed up, and made available for recovery
industry standards for how to use Fibre Channel protocols to send data over the Internet
a reference for how messages should be transmitted between any two points in a network
43. A company’s policy restraints require security to be implemented only at the SAN. Which
technique can the company implement at the SAN storage array level? (Select the correct answer.)
Data-at-rest encryption
44.
When ports between two switches form an inter-switch link (ISL), what type are they? (Select the
correct answer.)
FL_Port
NL_Port
E_Port
B_Port
F_Port
45.
Assuming a tiering hierarchy that begins with Tier 0, which storage tier is called near line, employs
backup devices such as tapes and tape libraries, and is ideal for file recovery? (Select the correct
answer.)
Tier 2
Tier 3
Tier 4
Tier 5
46.
consolidates backups
enables Boot-from-SAN
48.
Which statements correctly describe the Solid State Drives? (Select three.)
Single-Level Cell (SLC) drives provide faster write performance and greater reliability.
SSDs connect to the host system using an optimized ESDI communication protocol.
MLC technology is based on two bit values per cell—either zero or one.
Multi-Level Cell (MLC) drives cost less and provide higher storage densities.