欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > DOC文档下载  

    11月19日网络存储复习.doc

    • 资源ID:2392027       资源大小:158.50KB        全文页数:15页
    • 资源格式: DOC        下载积分:8金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要8金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    11月19日网络存储复习.doc

    1. Which local replication technology does EMC TimeFinder/Mirror implement?A. Copy on First AccessB. Copy on First writeC. Full Volume MirroringD. Pointer basedAnswer: C2. Which logical component of a storage environment is host resident?A. MemoryB. PortC. DiskD. File SystemAnswer: D3. A customer requires a local replica of a database that must remain available on a 24*7 basis. The application consistent replica of the file system, which operation should be performed?A. Stop the application prior to the creation of the replicaB. Quiesce and flush the file system buffers before the creation the replicaC. Unmount the file system prior to the creation of the replicaD. Quiesce and flush the file system buffers after the creation of the replicaAnswer: B4. What is an advantage of reporting on storage arrays?A. Planning for storage groupB. Monitoring number of arraysC. Planning for capacityD. Monitoring number of disks in a RAID groupAnswer: C5. What is the sequence of steps in a business continuity planning process?1. Perform risk analysis2. Collect data on various business processes3. Test, train and maintain4. Develop a disaster recovery planA. 3-4-1-2B. 2-3-1-4C. 2-1-4-3D. 3-2-1-4Answer: C6. What does a pull operation in SAN based remote replication indicate?A. Data is pulled to one remote array from another remote arrayB. Data is pulled to the control array from remote arrayC. Data is pulled to one control array from another control arrayD. Data is pulled to the remote array from control arrayAnswer: B7. A customer wants to deploy business continuity solution between to data center which are 500 Km apart Which solution want to connectivity between the two FC-SANs in the most cost-effective way?A. IP switches communicating over TCPB. FC switches communicating over FCPC. Native iSCSI communicating over TCP/IPD. FCIP gateways communicating over TCP/IPAnswer: D8. In full volume mirroring when is the target accessible?A. Only after synchronization and detached from sourceB. Only before initial synchronization and detached from sourceC. Only before initial synchronization and attached to sourceD. Only after synchronization and attached to sourceAnswer: A9. How many devices can be connected to a storage array in a point-to-point configuration?A. 2B. Depends upon number of array portsC. 15 million devicesD. 127Answer: A10. How many domain ids are reserved in fibre channel address space?A. 16B. 239C. 256D. 17Answer: B11. What is a feature of pointer-based virtual replication?A. Source need not be healthy for restoreB. Reduction in storage requirement for the replicasC. Replica can not hold more than 30% of the changed dataD. Source can not hold more than 30% of the changed dataAnswer: B (P87)12. How does asynchronous remote replication improve application performance compared to synchronous remote replications?A. Reads are serviced by the remote replicaB. Reads are serviced by the sourceC. Writes are acknowledged immediately by the remote replicaD. Writes are acknowledged immediately by the sourceAnswer: D13. Which describes a feature of internal DAS?A. Local storage provisioningB. High CPU utilizationC. High scalabilityD. Array based managementAnswer: B14. In an intelligent disk system, what is the role of the back-end?A. To move data between a host and the array cacheB. To communicate between Tag RAM and data storeC. To communicate between a host and the storage systemD. To move data between an array cache and the disksAnswer: D15. Which RAID type is most suitable for an application with large sequential reads?A. RAID 5B. RAID 3C. RAID 1D. RAID 0Answer: B (P18)16. Which three subject areas taken together define storage security?A. Access control, information security, and networkingB. Access control, encryption, and networkingC. Encryption, networking, and storageD. Information security, networking, and storageAnswer: D17. A business wants to backup 1 TB of data containing 100,000 files and another 1TB of data containing 1 million files. Which write need more time ?A. Number of files is irrelevantB. Both will take same timeC. 1 million filesD. 100,000 filesAnswer: D18. What are five core elements of a data center infrastructure?A. Applications, Databases, Servers/Operating System, SAN, and JBODB. Applications, Databases, JBOD ,Networks, and Storage ArraysC. Applications, Databases, Servers/Operating System, DAN, and NASD. Applications, Databases, Servers/Operating System, Networks, and Storage ArraysAnswer: D19. What is a characteristic of parity-based RAID?A. Parity is updated each time when both read and write are performedB. Parity is read each time a read is performedC. Parity is updated each time a write is performedD. Parity is updated only when writes fill a stripeAnswer: C20. What is the data access pattern that is most affect by slow seek times?A. Random, small writesB. Sequential, small readsC. Random, large readsD. Sequential, large writesAnswer: A21. Which term refers to the writing of physical address information to a disk?A. StripingB. PartitioningC. File system mountingD. FormattingAnswer: D22. A customer complains about frequent traffic disruptions to their SAN. After analysis, it was found that the R&D group was created a application traffic while testing new products. What would you suggest that this customer implement?A. Server VirtualizationB. Virtual SANC. Storage virtualizationD. Virtual LANAnswer: B23. Which statement is true about C-Clip?A. A virtual package that contains mete-data and BLOBB. A virtual package that contains CDF and BLOBC. A virtual package that contains CA and BLOBD. A virtual package that contains C-Clip ID and BLOBAnswer: A24. How can the exposure to loss of uncommitted cached data be minimized?A. Write-backB. WatermarkingC. Write-throughD. Cache bypassingAnswer: C25. Which business continuance solution will enable the minimum RTO?A. Using tape restore at a hot siteB. Clustered production serversC. Using a data vault to a host siteD. Using periodic replication at a hot siteAnswer: B26. An application uses ten 9 GB Devices. A pointer based replica of the application is required every 4 hours. Each replica will be kept for 24 hours. The data changes by 10% every 4 hours. How many replica devices are required?A. 90B. 60C. 120D. 6Answer: B27. What does SAN security architecture recommend?A. Multiple integrated layers of securityB. Single integrated solution for securityC. Multiple isolated layers of securityD. Multiple isolated solutions for securityAnswer: D28. Which NAS solution is the easiest to deploy in an existing EMC SAN environment?A. Bridged NAS with iSCSI technologyB. Gateway NAS system solutionC. Integrated NAS system with iSCSI technologyD. Integrated NAS system solutionAnswer: B29. In the diagram, which zone(s) represent hard zone?A. Zone 2B. Zone 1 and 3C. Zone 3D. Zone 1Answer: A30. What is one reason a company might choose to deploy NAS?A. For array managed data securityB. For host managed storage volumesC. To obtain content addressed storageD. To support a heterogeneous operation environmentAnswer: D31. What monitoring characteristic per you to assess the risk of failure of FC Switch ports before the ports actually fail?A. PerformanceB. AccessbilityC. CapacityD. SecurityAnswer: B32. Consider a disk I/O system in which an I/O request arrives at a rate of 100 IOPS and the service time is 4 ms. What is the utilization?A. 80%B. 4%C. 10%D. 40%Answer: D U = a × RS33. A customer with a SAN environment is primarily concerned about cabling flexibility. For this customer, which zoning method should be used?A. Mixed zoningB. Port zoningC. Hard zoningD. WWN zoningAnswer: D34. An application uses ten 20 GB Devices. A pointer based replica of the application is required. The replica will be kept for 24 hours. The data changes by 20% every 24 hours. How much storage should be allocated for theA. 40GBB. 200 GBC. 20 GBD. 4 GBAnswer: A35. In the context of protecting the FC storage infrastructure, what is an example of infrastructure integrity?A. Preventing node login to the fabric without proper authorizationB. Implementing iSNS discovery domainsC. Not permitting physical access to the nodesD. Improving the FSPF algorithm to determine to isolated nodesAnswer: A36. What attribute other than individual identity or group membership can be used to restrict access in the context of information security?A. Host network addressB. HBA World Wide NameC. RoleD. Shared passwordsAnswer: C37. What is the requirement for native iSCSI implementation?A. Host with NIC and array with FCIP portB. Host with iSCSI HBA and array with FC portC. Host with ToE card and array with iSCSI portD. Host with software iSCSI initiator and array with FCIP portAnswer: C38. What does a cache dirty page indicate?A. Data requested by host but not yet fetchedB. Data read from disk but not accessed by the hostC. Data that has changed but is not yet written to diskD. Data that has changed and has been written to diskAnswer: C39. What is the failure that RAID technology guards against?A. Switch failureB. Disk failureC. Host Bus adapter failuresD. Host failuresAnswer: B40. Which service is used by iSCSI initiator to discover targets?A. Internet storage name serviceB. Storage internet name seviceC. Domain name serviceD. Network information serviceAnswer: A41. What is the function of FC-1 layer in the Fibre Channel protocol?A. Interface mappingB. Routing and flow controlC. Transmission of raw bitsD. Encoding and decodingAnswer: D (P45)42. What is the operating environment for EMC CLARiiON?A. Access LogixB. EnginuityC. FLARED. EMC LinuxAnswer: C43. What is the operating systemd of Celerra Control Station?A. Data access at real timeB. Centra StarC. Windows CED. LinuxAnswer: A (P86)44. To what does a redundant array of independent node architecture refer?A. Technology independent object storage networkB. Cluster storage and access node networkC. Data independent storage and host networkD. Location independent storage networkAnswer: B45. Which statement best applies to a Fibre Channel SAN?A. Multi-purpose client-server networkB. Dedicated storage networkC. Global interconnectivity networkD. Multi-protocol storage networkAnswer: B46. Which feature assures that the stored content has NOT been altered in the CAS system?A. Single instance storageB. Content integrityC. Content authenticityD. Content SecurityAnswer: B (P180)47. Which protocol implementation is used in a Fibre Channel SAN?A. SCSI over FCB. FC over SCSIC. FC over Serial Attached SCSID. FC over iSCSIAnswer: A48. What describes the sustained internal transfer rate of disk drives?A. It is the speed at which data moves from read/write head to platterB. It is the speed at which data moves from a track to internal bufferC. It is the advertised speed of the interfaceD. It is the speed at which data moves from platter to read/write headAnswer: B49. Which is used as backup media in virtual tape library?A. Optical disksB. TapesC. Virtual tapesD. DisksAnswer: D50. What is an advantage of using disk over tape when selecting a backup destination device?A. Better portabilityB. Quicker restoresC. Higher acquisition costD. Better RPOAnswer: B51. Which management task eliminates single points of failure in a data center?A. CapacityB. AvailabilityC. PerformanceD. SecurityAnswer: B52. Which one of the following is NOT an example of Storage Virtualization?A. CHS to LBA addressingB. LUN creationC. Virtual machinesD. Host based volume managementAnswer: C53. What is the Reserved LUN Pool in EMC CLARiiON SnapView replication?A. LUNs that can hold COFW dataB. LUNs that are reserved for use by a specific hostC. LUNs that can be used as hot sparesD. LUNs that are not assigned a RAID typeAnswer: A54. What should be considered when determining the optimal size of the log file in host based log shipping remote replication?A. Size of the standby databaseB. Size of the source databaseC. Frequency of log switchingD. Frequency of accessing databaseAnswer: C55. Which protection strategy can be applied to the security zone containing switches and routers?A. Implementing secured remote accessB. Masking based on source FCIDC. Use two factor authentication for network accessD. Using E port authentication for accessAnswer: D56. Which data center element organizes customer and product information?A. ServerB. Storage arrayC. Operating SystemD. DBMSAnswer: A57. Which mechanisms address threats to the application access domain by elevation of user privileges?A. Access control to storage objects and Access Control Lists(ACLs)B. Access control to storage objects and Storage access monitoringC. User authentication and information Rights Management(IRM)D. User authentication and user authorizationAnswer: A58. Which EMC Control Center component holds information about managed objects?A. AgentB. StoreC. RepositoryD. ServerAnswer: C59. What is the sequence of steps in NAS I/O?1. Storage array processes the request2. NAS device converts file I/O to block I/O3. File I/O request by client4. NAS device forwards the file to the clientA. 2-1-4-3B. 2-1-3-4C. 3-2-1-4D. 3-1-4-2Answer: C60. What is the maximum payload in a fibre channel frame?A. 2136 bytesB. 2048 bytesC. 2148 bytesD. 2112 bytesAnswer: D61. Which remote replication solution has the lowest bandwidth requirement?A. Array based synchronous replicationB. Host-based LVM MirroringC. Log shipping over IP networksD. Asynchronous ordered writesAnswer: C62. What is the process that writes physical address information to a disk?A. ConcatenatingB. FormattingC. PartitioningD. StripingAnswer: B63. Which Data Center element stores customer and product information when the server is connected to an array?A. ApplicationB. DatabaseC. ServerD. Storage ArrayAnswer: B64. What does a cache dirty bit flag?A. Changed data not yet written to diskB. Changed data written to diskC. Data read from disk but not accessed by the hostD. Data requested by host but not yet fetchedAnswer: A65. Which component of EMC ControlCenter holds the information collected about the Managed Objects?A. AgentB. RepositoryC. ServerD. StoreAnswer: B66. Which remote replication solution has the highest bandwidth requirements?A. Arra

    注意事项

    本文(11月19日网络存储复习.doc)为本站会员(laozhun)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开