Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

SNIA S10-210 - Storage Networking Management and Administration

Page: 3 / 3
Total 97 questions

A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.

Which solution will meet the requirements?

A.

Add sufficient SSDs to an existing nearline storage system.

B.

Add sufficient SSDs to an existing enterprise storage platform.

C.

Add sufficient SAS drives to an existing enterprise storage platform.

D.

Add sufficient SAS drives to an existing nearline storage system.

Five out of 4S servers using one particular enterprise storage system are experiencing performance degradation during normal working hours. All 48 servers have similar workload characteristics. There are multiple disk groups that make up your enterprise storage.

What should be monitored to determine the root cause?

A.

IOPS per RAID array

B.

Cache read hit ratio

C.

Traffic levels on the SAN switches

D.

Clone sessions

You want to visibly verify FC port initialization by reading an analyzer trace. Your objective is to find the frames associated with the initialization protocol to ensure that the FC device is operating correctly during the login process, to be recognized as part of the switched fabric, and appear in a directory of attached FC devices.

What must all Fibre Channel devices do to accomplish this?

A.

Log in using the Name server.

B.

Log in using the Fabric Controller.

C.

Log in using the Management server.

D.

Log in using the Fabric Login server.

You are provisioning storage to a host with multipathing software installed and correctly configured. You discover that there are four paths to LUNs instead of the expected eight paths.

Why does this happen?

A.

Incorrect zoning

B.

Incorrect multipathing policy

C.

Incorrect LUN masking

D.

Incorrect LUN size

A storage subsystems Web browser management interface reports that the subsystem has become degraded and remotely opens a service request with the vendor. Your vendors level three storage support engineer wants to remotely access your storage subsystem for troubleshooting.

What is a SNIA Storage Security Best Current Practices solution?

A.

Open firewall ports to allow the vendor's support engineer to access the Web browser management interface.

B.

Provide the vendor's support engineer with a temporary user ID that has sudo access to become a super user on the storage subsystem; this ensures an audit trail for all remote support activities.

C.

Provide the vendor's support engineer with a shared remote control session where you can monitor what the support engineer is doing while troubleshooting the subsystem without needing to share credentials.

D.

Provide a temporary user ID to allow the vendor's support engineer to access the Web browser management interface remotely over HTTP/TLS.

Which two cloud deployment models address data privacy issues? (Choose two.)

A.

Community

B.

Public

C.

Private

D.

Hybrid

E.

Campus

The CIO would like to segregate management device IP network traffic from server IP network traffic within the data center to limit potential security threats.

What would be used to accomplish this?

A.

IPsec

B.

Firewall

C.

VLANs

D.

PKI

You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.

Which data protection method should be used in this case?

A.

Encrypting data-in-flight

B.

Encrypting data-at-rest

C.

Password protect each file

D.

Use file permissions

Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.

Which two FC provided mechanisms would you implement first? (Choose two.)

A.

LUN masking

B.

Device authentication and authorization

C.

Zoning

D.

Key management system