11月19日网络存储复习.doc

上传人:laozhun 文档编号:2392027 上传时间:2023-02-17 格式:DOC 页数:15 大小:158.50KB
返回 下载 相关 举报
11月19日网络存储复习.doc_第1页
第1页 / 共15页
11月19日网络存储复习.doc_第2页
第2页 / 共15页
11月19日网络存储复习.doc_第3页
第3页 / 共15页
11月19日网络存储复习.doc_第4页
第4页 / 共15页
11月19日网络存储复习.doc_第5页
第5页 / 共15页
点击查看更多>>
资源描述

《11月19日网络存储复习.doc》由会员分享,可在线阅读,更多相关《11月19日网络存储复习.doc(15页珍藏版)》请在三一办公上搜索。

1、1. Which local replication technology does EMC TimeFinder/Mirror implement?A. Copy on First AccessB. Copy on First writeC. Full Volume MirroringD. Pointer basedAnswer: C2. Which logical component of a storage environment is host resident?A. MemoryB. PortC. DiskD. File SystemAnswer: D3. A customer re

2、quires a local replica of a database that must remain available on a 24*7 basis. The application consistent replica of the file system, which operation should be performed?A. Stop the application prior to the creation of the replicaB. Quiesce and flush the file system buffers before the creation the

3、 replicaC. Unmount the file system prior to the creation of the replicaD. Quiesce and flush the file system buffers after the creation of the replicaAnswer: B4. What is an advantage of reporting on storage arrays?A. Planning for storage groupB. Monitoring number of arraysC. Planning for capacityD. M

4、onitoring number of disks in a RAID groupAnswer: C5. What is the sequence of steps in a business continuity planning process?1. Perform risk analysis2. Collect data on various business processes3. Test, train and maintain4. Develop a disaster recovery planA. 3-4-1-2B. 2-3-1-4C. 2-1-4-3D. 3-2-1-4Answ

5、er: C6. What does a pull operation in SAN based remote replication indicate?A. Data is pulled to one remote array from another remote arrayB. Data is pulled to the control array from remote arrayC. Data is pulled to one control array from another control arrayD. Data is pulled to the remote array fr

6、om control arrayAnswer: B7. A customer wants to deploy business continuity solution between to data center which are 500 Km apart Which solution want to connectivity between the two FC-SANs in the most cost-effective way?A. IP switches communicating over TCPB. FC switches communicating over FCPC. Na

7、tive iSCSI communicating over TCP/IPD. FCIP gateways communicating over TCP/IPAnswer: D8. In full volume mirroring when is the target accessible?A. Only after synchronization and detached from sourceB. Only before initial synchronization and detached from sourceC. Only before initial synchronization

8、 and attached to sourceD. Only after synchronization and attached to sourceAnswer: A9. How many devices can be connected to a storage array in a point-to-point configuration?A. 2B. Depends upon number of array portsC. 15 million devicesD. 127Answer: A10. How many domain ids are reserved in fibre cha

9、nnel address space?A. 16B. 239C. 256D. 17Answer: B11. What is a feature of pointer-based virtual replication?A. Source need not be healthy for restoreB. Reduction in storage requirement for the replicasC. Replica can not hold more than 30% of the changed dataD. Source can not hold more than 30% of t

10、he changed dataAnswer: B (P87)12. How does asynchronous remote replication improve application performance compared to synchronous remote replications?A. Reads are serviced by the remote replicaB. Reads are serviced by the sourceC. Writes are acknowledged immediately by the remote replicaD. Writes a

11、re acknowledged immediately by the sourceAnswer: D13. Which describes a feature of internal DAS?A. Local storage provisioningB. High CPU utilizationC. High scalabilityD. Array based managementAnswer: B14. In an intelligent disk system, what is the role of the back-end?A. To move data between a host

12、and the array cacheB. To communicate between Tag RAM and data storeC. To communicate between a host and the storage systemD. To move data between an array cache and the disksAnswer: D15. Which RAID type is most suitable for an application with large sequential reads?A. RAID 5B. RAID 3C. RAID 1D. RAI

13、D 0Answer: B (P18)16. Which three subject areas taken together define storage security?A. Access control, information security, and networkingB. Access control, encryption, and networkingC. Encryption, networking, and storageD. Information security, networking, and storageAnswer: D17. A business wan

14、ts to backup 1 TB of data containing 100,000 files and another 1TB of data containing 1 million files. Which write need more time ?A. Number of files is irrelevantB. Both will take same timeC. 1 million filesD. 100,000 filesAnswer: D18. What are five core elements of a data center infrastructure?A.

15、Applications, Databases, Servers/Operating System, SAN, and JBODB. Applications, Databases, JBOD ,Networks, and Storage ArraysC. Applications, Databases, Servers/Operating System, DAN, and NASD. Applications, Databases, Servers/Operating System, Networks, and Storage ArraysAnswer: D19. What is a cha

16、racteristic of parity-based RAID?A. Parity is updated each time when both read and write are performedB. Parity is read each time a read is performedC. Parity is updated each time a write is performedD. Parity is updated only when writes fill a stripeAnswer: C20. What is the data access pattern that

17、 is most affect by slow seek times?A. Random, small writesB. Sequential, small readsC. Random, large readsD. Sequential, large writesAnswer: A21. Which term refers to the writing of physical address information to a disk?A. StripingB. PartitioningC. File system mountingD. FormattingAnswer: D22. A cu

18、stomer complains about frequent traffic disruptions to their SAN. After analysis, it was found that the R&D group was created a application traffic while testing new products. What would you suggest that this customer implement?A. Server VirtualizationB. Virtual SANC. Storage virtualizationD. Virtua

19、l LANAnswer: B23. Which statement is true about C-Clip?A. A virtual package that contains mete-data and BLOBB. A virtual package that contains CDF and BLOBC. A virtual package that contains CA and BLOBD. A virtual package that contains C-Clip ID and BLOBAnswer: A24. How can the exposure to loss of u

20、ncommitted cached data be minimized?A. Write-backB. WatermarkingC. Write-throughD. Cache bypassingAnswer: C25. Which business continuance solution will enable the minimum RTO?A. Using tape restore at a hot siteB. Clustered production serversC. Using a data vault to a host siteD. Using periodic repli

21、cation at a hot siteAnswer: B26. An application uses ten 9 GB Devices. A pointer based replica of the application is required every 4 hours. Each replica will be kept for 24 hours. The data changes by 10% every 4 hours. How many replica devices are required?A. 90B. 60C. 120D. 6Answer: B27. What does

22、 SAN security architecture recommend?A. Multiple integrated layers of securityB. Single integrated solution for securityC. Multiple isolated layers of securityD. Multiple isolated solutions for securityAnswer: D28. Which NAS solution is the easiest to deploy in an existing EMC SAN environment?A. Bri

23、dged NAS with iSCSI technologyB. Gateway NAS system solutionC. Integrated NAS system with iSCSI technologyD. Integrated NAS system solutionAnswer: B29. In the diagram, which zone(s) represent hard zone?A. Zone 2B. Zone 1 and 3C. Zone 3D. Zone 1Answer: A30. What is one reason a company might choose t

24、o deploy NAS?A. For array managed data securityB. For host managed storage volumesC. To obtain content addressed storageD. To support a heterogeneous operation environmentAnswer: D31. What monitoring characteristic per you to assess the risk of failure of FC Switch ports before the ports actually fa

25、il?A. PerformanceB. AccessbilityC. CapacityD. SecurityAnswer: B32. Consider a disk I/O system in which an I/O request arrives at a rate of 100 IOPS and the service time is 4 ms. What is the utilization?A. 80%B. 4%C. 10%D. 40%Answer: D U = a RS33. A customer with a SAN environment is primarily concer

26、ned about cabling flexibility. For this customer, which zoning method should be used?A. Mixed zoningB. Port zoningC. Hard zoningD. WWN zoningAnswer: D34. An application uses ten 20 GB Devices. A pointer based replica of the application is required. The replica will be kept for 24 hours. The data cha

27、nges by 20% every 24 hours. How much storage should be allocated for theA. 40GBB. 200 GBC. 20 GBD. 4 GBAnswer: A35. In the context of protecting the FC storage infrastructure, what is an example of infrastructure integrity?A. Preventing node login to the fabric without proper authorizationB. Impleme

28、nting iSNS discovery domainsC. Not permitting physical access to the nodesD. Improving the FSPF algorithm to determine to isolated nodesAnswer: A36. What attribute other than individual identity or group membership can be used to restrict access in the context of information security?A. Host network

29、 addressB. HBA World Wide NameC. RoleD. Shared passwordsAnswer: C37. What is the requirement for native iSCSI implementation?A. Host with NIC and array with FCIP portB. Host with iSCSI HBA and array with FC portC. Host with ToE card and array with iSCSI portD. Host with software iSCSI initiator and

30、array with FCIP portAnswer: C38. What does a cache dirty page indicate?A. Data requested by host but not yet fetchedB. Data read from disk but not accessed by the hostC. Data that has changed but is not yet written to diskD. Data that has changed and has been written to diskAnswer: C39. What is the

31、failure that RAID technology guards against?A. Switch failureB. Disk failureC. Host Bus adapter failuresD. Host failuresAnswer: B40. Which service is used by iSCSI initiator to discover targets?A. Internet storage name serviceB. Storage internet name seviceC. Domain name serviceD. Network informatio

32、n serviceAnswer: A41. What is the function of FC-1 layer in the Fibre Channel protocol?A. Interface mappingB. Routing and flow controlC. Transmission of raw bitsD. Encoding and decodingAnswer: D (P45)42. What is the operating environment for EMC CLARiiON?A. Access LogixB. EnginuityC. FLARED. EMC Lin

33、uxAnswer: C43. What is the operating systemd of Celerra Control Station?A. Data access at real timeB. Centra StarC. Windows CED. LinuxAnswer: A (P86)44. To what does a redundant array of independent node architecture refer?A. Technology independent object storage networkB. Cluster storage and access

34、 node networkC. Data independent storage and host networkD. Location independent storage networkAnswer: B45. Which statement best applies to a Fibre Channel SAN?A. Multi-purpose client-server networkB. Dedicated storage networkC. Global interconnectivity networkD. Multi-protocol storage networkAnswe

35、r: B46. Which feature assures that the stored content has NOT been altered in the CAS system?A. Single instance storageB. Content integrityC. Content authenticityD. Content SecurityAnswer: B (P180)47. Which protocol implementation is used in a Fibre Channel SAN?A. SCSI over FCB. FC over SCSIC. FC ov

36、er Serial Attached SCSID. FC over iSCSIAnswer: A48. What describes the sustained internal transfer rate of disk drives?A. It is the speed at which data moves from read/write head to platterB. It is the speed at which data moves from a track to internal bufferC. It is the advertised speed of the inte

37、rfaceD. It is the speed at which data moves from platter to read/write headAnswer: B49. Which is used as backup media in virtual tape library?A. Optical disksB. TapesC. Virtual tapesD. DisksAnswer: D50. What is an advantage of using disk over tape when selecting a backup destination device?A. Better

38、 portabilityB. Quicker restoresC. Higher acquisition costD. Better RPOAnswer: B51. Which management task eliminates single points of failure in a data center?A. CapacityB. AvailabilityC. PerformanceD. SecurityAnswer: B52. Which one of the following is NOT an example of Storage Virtualization?A. CHS

39、to LBA addressingB. LUN creationC. Virtual machinesD. Host based volume managementAnswer: C53. What is the Reserved LUN Pool in EMC CLARiiON SnapView replication?A. LUNs that can hold COFW dataB. LUNs that are reserved for use by a specific hostC. LUNs that can be used as hot sparesD. LUNs that are

40、not assigned a RAID typeAnswer: A54. What should be considered when determining the optimal size of the log file in host based log shipping remote replication?A. Size of the standby databaseB. Size of the source databaseC. Frequency of log switchingD. Frequency of accessing databaseAnswer: C55. Whic

41、h protection strategy can be applied to the security zone containing switches and routers?A. Implementing secured remote accessB. Masking based on source FCIDC. Use two factor authentication for network accessD. Using E port authentication for accessAnswer: D56. Which data center element organizes c

42、ustomer and product information?A. ServerB. Storage arrayC. Operating SystemD. DBMSAnswer: A57. Which mechanisms address threats to the application access domain by elevation of user privileges?A. Access control to storage objects and Access Control Lists(ACLs)B. Access control to storage objects an

43、d Storage access monitoringC. User authentication and information Rights Management(IRM)D. User authentication and user authorizationAnswer: A58. Which EMC Control Center component holds information about managed objects?A. AgentB. StoreC. RepositoryD. ServerAnswer: C59. What is the sequence of step

44、s in NAS I/O?1. Storage array processes the request2. NAS device converts file I/O to block I/O3. File I/O request by client4. NAS device forwards the file to the clientA. 2-1-4-3B. 2-1-3-4C. 3-2-1-4D. 3-1-4-2Answer: C60. What is the maximum payload in a fibre channel frame?A. 2136 bytesB. 2048 byte

45、sC. 2148 bytesD. 2112 bytesAnswer: D61. Which remote replication solution has the lowest bandwidth requirement?A. Array based synchronous replicationB. Host-based LVM MirroringC. Log shipping over IP networksD. Asynchronous ordered writesAnswer: C62. What is the process that writes physical address

46、information to a disk?A. ConcatenatingB. FormattingC. PartitioningD. StripingAnswer: B63. Which Data Center element stores customer and product information when the server is connected to an array?A. ApplicationB. DatabaseC. ServerD. Storage ArrayAnswer: B64. What does a cache dirty bit flag?A. Chan

47、ged data not yet written to diskB. Changed data written to diskC. Data read from disk but not accessed by the hostD. Data requested by host but not yet fetchedAnswer: A65. Which component of EMC ControlCenter holds the information collected about the Managed Objects?A. AgentB. RepositoryC. ServerD. StoreAnswer: B66. Which remote replication solution has the highest bandwidth requirements?A. Arra

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号