Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

SNIA S10-210 - Storage Networking Management and Administration

Page: 1 / 3
Total 97 questions

You have received an emergency call from the night shift after they attempted to merge three small SANs in the engineering department. Once completed, all devices in SANs A and B communicate with one another but SAN C could not communicate with either of the other SANs because the fabric has become segmented.

Which statement is correct?

A.

The port is isolated until a fabric rebuild occurs,

B.

The port is isolated until a fabric re-configuration occurs.

C.

The system administrator must manually correct the issue that caused segmentation (port isolation) and then start the Build Fabric (BF) process.

D.

The system administrator must manually correct the issue that caused port isolation (segmentation) and then start the Reconfiguration Fabric (RCF) process.

What is the maximum distance between two 8 Gb FC ports that can be connected using 50 µOM3 grade multimode fiber cable?

A.

500 meters

B.

300 meters

C.

250 meters

D.

150 meters

A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.

Which two protocols should be disabled? (Choose two.)

A.

HTTPS

B.

Telnet

C.

SSH

D.

SNMPv1

What is a common protocol used in cloud communications?

A.

WebDAV

B.

SCP

C.

HTTP

D.

CDMI

You have been asked to create a LUN on a storage array that is comprised of 7,200 rpm SATA drives. Each drive is rated at 100 IOPS. The LUN should provide a minimum of 1100 IOPS and withstand multiple drive failures using the least number of drives.

How many drives and which RAID level should you use to create this LUN?

A.

11 drives and RAID 0

B.

12 drives and RAID 5

C.

13 drives and RAID 6

D.

22 drives and RAID 1

You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.

What should be used?

A.

Roles

B.

VSAN

C.

ACL

D.

Zone

Click the Exhibit button.

Referring to the exhibit, what are the two largest risks to a highly available solution? (Choose two.)

A.

Only two adapters per controller

B.

Only two adapters on the server

C.

Only one server

D.

Only one switch

What describes the FCoE transport protocol?

A.

Fibre Channel frames encapsulated within Ethernet frames, transmitted on a Fibre Channel infrastructure

B.

SCSI frames encapsulated within Ethernet frames, transmitted on an Ethernet infrastructure

C.

Fibre Channel frames encapsulated within FCoE frames, transmitted on an Ethernet infrastructure

D.

Fibre Channel frames encapsulated within Ethernet frames, transmitted on an Ethernet infrastructure

You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.

What is the cause?

A.

The database requires replication from a second storage array.

B.

The database requires synchronous storage replication.

C.

Two copies of databases are required at the DR site to be able to replay transaction logs.

D.

An installed agent is required for the database to be quiesce and replicated in crash-consistent state.

Which process allows for the reduction of disk space consumption on a shared storage of OS images used by 200 users?

A.

Thin provisioning

B.

Deduplication

C.

Synchronous replication

D.

Defragmentation