SNIA S10-210 - Storage Networking Management and Administration
A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.
Which solution will meet the requirements?
Five out of 4S servers using one particular enterprise storage system are experiencing performance degradation during normal working hours. All 48 servers have similar workload characteristics. There are multiple disk groups that make up your enterprise storage.
What should be monitored to determine the root cause?
You want to visibly verify FC port initialization by reading an analyzer trace. Your objective is to find the frames associated with the initialization protocol to ensure that the FC device is operating correctly during the login process, to be recognized as part of the switched fabric, and appear in a directory of attached FC devices.
What must all Fibre Channel devices do to accomplish this?
You are provisioning storage to a host with multipathing software installed and correctly configured. You discover that there are four paths to LUNs instead of the expected eight paths.
Why does this happen?
A storage subsystems Web browser management interface reports that the subsystem has become degraded and remotely opens a service request with the vendor. Your vendors level three storage support engineer wants to remotely access your storage subsystem for troubleshooting.
What is a SNIA Storage Security Best Current Practices solution?
Which two cloud deployment models address data privacy issues? (Choose two.)
The CIO would like to segregate management device IP network traffic from server IP network traffic within the data center to limit potential security threats.
What would be used to accomplish this?
You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.
Which data protection method should be used in this case?
Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.
Which two FC provided mechanisms would you implement first? (Choose two.)