The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 4 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
 Multiple Choice Questions about Data Storage
Questions/cases provided by the EMC Academic Alliance
Â
Â
Data Storage
Name: ________________________ Note: Questions/cases provided by the EMC Academic Alliance
Part I: Multiple Choice Questions (Each correct answer 1.5 points)
1. What is an example of semi-structured data?
A. Database
B. Spreadsheet
C. Image
D. PDF file
2. Why do organizations seek to store, protect, optimize, and leverage information?
A. To derive new business opportunity
B. To increase dependency on fast and reliable access to information
C. To promote growth of digital information
D. To reduce the investment in deploying security
3. What is a benefit of Big Data analytics?
A. Enables mobile access to information
B. Enables data-driven decision making
C. Enables IT as a service
D. Enables elimination of IT silos
4. What is a benefit of virtualization?
A. It enables maintaining conformance to resource configuration standards
B. It automatically configures and provisions resources to support services
C. It consolidates and improves the utilization of physical IT resources
D. It ensures continuous availability of services in the event of a failure
5. Which statement is true about solid-state drive?
A. Stores data on a circular disk with a ferromagnetic coating
B. Stores data on a semiconductor-based memory
C. Stores data on a polycarbonate disc with a reflective coating
D. Stores data on a thin plastic film with a magnetic coating
6. Which storage architecture does the graphic represent? A.
B.
C.
D. Information-centric
Network-centric
Application-centric
Server-centric 7. Which factors affect the performance of a disk drive?
A. Rotational latency, number of platters, and data transfer time
B. Seek time, rotational latency, and number of read/write heads
C. Seek time, rotational latency, and data transfer time
D. Data transfer time, number of cylinders, and rotational latency
8. Which component of an intelligent storage system performs functions such as provisioning, tiering,
and cache management?
A. Controller
B. Solid-state drive
C. Flash cache
D. Host bus adapter
9. Which is the time taken by the platter of a hard disk drive to position data under the read/write head?
A. Seek time
B. Disk service time
C. Data transfer rate
D. Rotational latency
10. In the graphic, A1, A2, A3; B1, B2, B3; and C1, C2, C3 represent data.
Ap, Aq, Bp, Bq, Cp, and Cq represent parity. Which RAID level does the graphic represent? A. RAID 5
B. RAID 6
C. RAID 3
D. RAID 4
11. Which type of metaLUN provides only additional capacity without improving performance?
A. Striped
B. Mirrored
C. Concatenated
D. Parity
12. Which technology provides performance acceleration for read-intensive workloads and avoids
network latencies associated with I/O access to a storage array?
A. Inter-array storage tiering
B. Intra-array storage tiering
C. Storage flash caching
D. Server flash caching
13. Which type of write cache implementation does the graphic represent? A. Write-back cache
B. Write-through cache
C. Low watermark cache
D. High watermark cache
14. Which best describes Network-attached Storage (NAS)?
A. Stores data in the form of objects on flat address space based on its content
B. Provides compute system with block-based access to storage
C. An IP-based, dedicated, high-performance file sharing and storage device
D. A single integrated storage infrastructure that consolidates block, file, and object access
15. Which is true about scale-out NAS?
A. Pools multiple nodes in a cluster to work as a single NAS device
B. Scales performance and/or capacity non-disruptively of a single NAS system
C. Consolidates file, block, and object access
D. NAS systems have a fixed capacity ceiling
16. What is a benefit of SAN?
A. Enables consolidation and sharing of storage resources
B. Enables creating a server-centric storage environment
C. Consolidates LAN and WAN traffic into a common IP infrastructure
D. Enables high-speed data transmission between client workstations
17. Which is an accurate statement about software-defined networking?
A. Controller integrates the data plane and the control plane of network components
B. Controller performs physical cabling between network switches
C. Controller resides on the data plane of network components
D. Controller sends instructions for data plane to handle network traffic
18. Which fabric service distributes Registered State Change Notifications (RSCNs) to the node ports?
A. Management Server
B. Name Server
C. Fabric Controller
D. Fabric Login Server
19. What enables network traffic from multiple virtual SANs to traverse a single interswitch link?
A. Link aggregation
B. N_Port virtualization
C. Zoning
D. Trunking
20. Which iSCSI network component performs both iSCSI and TCP/IP processing?
A. iSCSI HBA
B. Software iSCSI adapter
C. TCP Offload Engine NIC
D. Standard NIC
21. Which is an accurate statement about switch aggregation? A. It enables ports in both the switches to forward network traffic simultaneously
B. It combines VLANs that are created on both the switches
C. It creates a trunk link between the switches to transfer untagged frames
D. It allows transmission of tunneling data between FC SAN islands
22. Which accurately describes a stretched VLAN?
A. It is a VLAN that spans across multiple sites over a WAN connection
B. It is a logical network that is created across multiple VLANs
C. It is a physical LAN that is created across two FC SAN islands
D. It is a VLAN that allows an Ethernet switch to join the VLAN automatically
23. Which component of an FCoE SAN provides functionality of both NIC and FC HBA?
A. VF_Port
B. Ethernet Bridge
C. Converged Network Adapter
D. Fibre Channel Forwarder
24. What is enabled by the congestion notification functionality of a Converged Enhanced Ethernet
network?
A. A switch to send a signal to other ports that need to stop their transmissions
B. A CNA to convey and configure its features with the other CNAs in the network
C. A name server to notify switches on the allocation of network bandwidth
D. A VF_Port to send PAUSE frames across eight virtual network links
25. Which layers of FC protocol stack are replaced with Ethernet according to FCoE protocol
specification?
A. FC-0, FC-1, and FC-2
B. FC-2 and FC-4
C. FC-0 and FC-1
D. FC-1, FC-2, and FC-4
26. Which best describes recovery-time objective (RTO)?
A. Point-in-time to which data must be recovered after an outage
B. Time available for a system or component to perform its normal operations between failures
C. Time within which systems and applications must be recovered after an outage
D. Amount of data loss that a business can endure
27. Which statement is true if the recovery-point objective (RPO) of an application is 2 hours?
A. Time to resume application operations must be less than 2 hours
B. Time to resume application operations must equal to 2 hours
C. No more than 2 hours of production data can be lost
D. Mean time between application failure is 2 hours
28. Which is true about business impact analysis?
A. Identifies which business units and processes are essential to the survival of the business
B. A part of business continuity process, which involves a set of policies and procedures for
restoring IT infrastructure
C. Defines the time window during which information must be accessible for business operations
D. Estimates the total cost of ownership for each business function
30. What is a key advantage of compute clustering?
A. Increases the number of VMs running on a compute system
B. Improves the speed of a compute system
C. Enables service failover in the event of compute system failure to another system
D. Reduces the storage required for a compute system
31. What best describes graceful degradation? A. Provides the capability to run VM without any downtime, even if the hypervisor fails
B. The ability of an application to maintain limited functionality even when some of the modules
are not available
C. A key mechanism in an application design that implement retry logic within a code, in order to
handle a service that is temporarily down
D. Provides the capability to run VM without any downtime even if the storage is not available
32. What is the role of a backup client?
A. Gathers the data that is to be backed up and send it to the storage node
B. Manages the backup operations
C. Sends tracking information to the backup server about the data written to the backup device and
controls one or more backup devices
D. Maintains the backup catalog
33. What is an advantage of incremental backup?
A. Requires lesser time to restore than cumulative backup
B. Requires less time to backup
C. Eliminates data deduplication
D. Increases backup window
34. When deploying a cold backup solution, what should be considered?
A. Application must be shut down during the backup process
B. Incremental backup cannot be performed
C. An open file agent must be deployed to perform the backup
D. Deduplication cannot be performed during the backup process
35. Why replica must be consistent with the source volume in a replication environment?
A. To ensure the usability of the replica
B. To reduce the size of the replica
C. To increase the retention period of the replica
D. To improve the performance of the replica
36. What is an advantage of implementing virtual machine (VM) clone?
A. Increases the performance of the source VM
B. Allows to restore VM to any previous PIT
C. Minimizes the total cost of ownership
D. Reduces the time required to deploy a new VM
37. What is true about pointer-based virtual replication?
A. Replica is immediately accessible when the replication session is started
B. Size of the replica should be greater than the size of the source volume
C. Replica and source must be in different storage system
D. Source need not to be healthy when restoring data from replica
38. In a CDP replication, which determines how far back the recovery points can go?
A. Type of the write splitter
B. Size of the journal volume
C. Size of the source volume
D. Type of the appliance
39. Which goal of information security ensures that authorized users have reliable and timely access to
resources?
A. Availability
B. Confidentiality
C. Integrity
D. Auditing 40. Which type of attack prevents legitimate users from accessing resources?
A. Account Hacking
B. Media Theft
C. Spoofing DR Site Identity
D. Denial of Services
41. Which are the four entities involved in the OAuth control mechanism?
A. Resource owner, resource server, client, and resources
B. Authorization server, compute system, client, and resources
C. Resource owner, resource server, client, and authorization server
D. Authorization owner, authorization server, client, and resources
42. Which security control has the ability to remotely wipe the data on the enrolled devices when a
threat is detected?
A. Mobile device management
B. Malware protection software
C. Intrusion Detection and Prevention System
D. Demilitarized zone
43. Which statement is true about data shredding?
A. It is a process of deleting data or residual representation of data and making it unrecoverable on
storage media
B. It is a cryptographic technique in which data is encoded and made indecipherable to
eavesdroppers or hackers
C. It is a security control designed to examine data packets traversing a network and compare them
to a set of filtering rules
D. It is a security tool that automates the process of detecting and preventing events that can
compromise the confidentiality, integrity, or availability of IT resources
44. Which characteristic of the storage infrastructure management provides automated arrangement
and coordination of component functions?
A. Service-focused approach
B. Software-defined infrastructure-aware
C. End-to-end visibility
D. Orchestrated operations
45. Which is an example of monitoring capacity?
A. Examining the free space on a storage pool
B. Measuring the throughput of an HBA
C. Tracking unauthorized access to a storage system
D. Identifying orchestration failure
46. Which management process maintains information on the inter-relationships among infrastructure
components?
A. Configuration management
B. Change management
C. Problem management
D. Monitoring
47. Which is an example of performance management?
A. Architecting a multi-site continuous data protection solution
B. Detecting and recording all unplanned events that degrade service quality
C. Separating sequential and random I/Os to different disk drives
D. Approving a request for modification of a service’s attributes 48.How vulnerabilities can be reduced in an IT environment?
A. By maximizing attack surface and minimizing work factor
B. By minimizing attack surface and maximizing work factor **
C. By maximizing both attack surface and work factor
D. By minimizing both attack surface and work factor
49.Which SAN security mechanism prevents a switch port from being enabled even after a switch
reboot?
A. Port lockdown
B. Persistent port disable **
C. Port binding
D. Port zoning
50.Which security mechanism ensures that a port can only be initialized with a specific port type?
A. Port lockdown **
B. Persistent port disable
C. Port binding
D. Port zoning
-----------