Data size is beyond the capability of traditional software processes.
Which term is used to describe an idle component in a RAID array that becomes a temporary replacement for a failed component disk.
What application is most benefited by using RAID 3?
The primary benefit of data striping is more efficient reads/writes simultaneously across the strip.
What is the stripe size of a five disk parity RAID 5 set that has a stripe size of 64KB?
Which is a benefit of compute virtualization?
Improves compute utilization
What best describes virtual machines (VMs)?
VMs are discrete sets of files
What accurately describes virtualization?
Abstracts physical resources into logical resources.
Which is a feature of information-centric architecture?
Storage is managed centrally and independent of servers.
Which is an example of structured data?
Which requirement refers to the ability of a storage solution to grow with the business?
An application generates 400 small random IOPS with a read/write ration of 3:1 What is the RAID-corrected IOPS on the disk for RAID5?
Which factors contribute to the overall service time of a mechanical disk?
Average seek time, rotational latency, and data transfer rate
Which statement is true about software RAID implementation?
It uses host CPU cycles to perform RAID calculations.
What is concatenation?
Grouping multiple physical drives into a logical drive
Each device in the FC environment is assigned a 64 bit unique identifier called a World Wide Name (WWN).
Which type of fabric login enables the exchange of upper layer protocol-related parameters between N_Ports?
An EUI (Extended Unique Identifier) is a local unique identifier based on IEEE EUI-64 naming standard.
Which mechanism provides protection to uncommitted data in cache against power failure.
Which process provides data access control by restricting host access to specific LUN(s)?
Which of the following are parts of an Intelligent Storage System?
Front End Ports, Cache, Back End Ports, Physical Disks
In traditional storage provisioning, which LUN expansion technique provides improved performance?
Which protocol encapsulates FC frames onto IP packets?
Which cable type provides minimum signal attenuation over long distances?
Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
IQN (iSCSI Qualified Name)
What is an F_Port in FC SAN?
Switch port that connects an N_Port
Which mode of flushing is activated when the cache reaches 100% of its capacity?
Which of these are considered strengths of SAN?
A SAN can be used as the shared data storage in a cluster. Multiple servers can access the same storage devices at the same time. A SAN provides high availability at all times.
Which of these are categories of data storage?
Enterprise Storage Consumer Storage
What are the advantages of load balancing?
High performance High availabilty
Which process gives the appearance of more physical space than what is actually present?
Which protocol does NAS use on an Unix system?
Which controls the power supplied to the spindle motor and its speed?
What are the advantages of using a dual controller array?
No or limited loss performance after a controller failure ensures high availability. All drives and cache can be used to service all workloads.
What facts are true about hot-pluggable on networks?
Hot-pluggable on networks refer to the addition or removal of a node without affecting the startup of the running network. Once a node is hot-plugged, all the other devices on the network must be able to identify it and share the information across it.
Which connectivity protocols are used to extend an FC SAN over IP networks? (choose 2)
It is a collection of raw facts from which conclusions may be drawn.
contracts, forms, images, manuals, X-rays, audio, video, email attachments, instant messages, invoices, Web Pages, documents, rich media, PDF
It refers to data sets whose sizes are beyond the ability of commonly used software tools to capture, store, manage, and process within acceptable time limits.
It is a facility that contains storage, compute, network, and other IT resources to provide centralized data-processing capabilities.
Key characteristics of a Data Center.
Data Integrity Availability, Security, Manageability, Performance, Scalability, Capacity
Key management activities include
Monitoring, Reporting, Provisioning
Enables individuals and organizations to use IT resources as a service over network. Enables self-service requesting and automates request-fulfillment process Enables consumption-based metering
A software program that provides logic for computing operations
Commonly deployed applications in a data center.
Business applications, Management applications, Data protection applications, Security applications
It is the technique of presenting an application to an end user without any installation, integration, or dependencies on the underlying computing platform.
Resource that runs applications with the help of underlying computing components.
Include CPU, memory, and input/output (I/O) devices
Include OS, device driver, file system, volume manager, and so on
In a virtualized environment virtualization layer works between
OS and hardware
a software that enables the OS to recognize the specific device
Responsible for creating and controlling host level logical storage.
Logical Volume Manager
It is a technique of masking or abstracting the physical compute hardware and enabling multiple operating systems (OSs) to run concurrently on a single or clustered physical machine(s)
It is a technology which enables detachment of the user state, the OS, and the applications from endpoint devices.
Flexibility of access due to enablement of thin clients, Improved data security, Simplified data backup and PC Maintenance
Desktop virtualization benefits
a defined format for communication between sending and receiving devices
Parallel Small computer system interface
Serial Attached SCSI
Time taken by a disk to complete an I/O request, depends on:
Seek time, Rotational latency, Data transfer rate
It is a process that prepares for, responds to, and recovers from a system outrage that can adversely affects business operations
It is the ability of an IT infrastructure to function according to business expectations, during its specified time of operation.
Average time available for a system or component to perform its normal operations between failures
MTBF =total uptime/number of failures
Average time required to repair a failed component
MTTR =total downtime/number of failures
Point-in-time to which systems and data must be recovered after an outage Amount of data loss that a business can endure
Recovery-Point Objective (RPO)
Time within which systems and applications must be recovered after an outage Amount of downtime that a business can endure and survive
Recovery-Time Objective (RTO)
It refers to the failure of a component of a system that can terminate the availability of the entire system or IT service
Single Points of Failure
It is an additional copy of production data that is created and retained for the sole purpose of recovering lost or corrupted data
Gather the data that is to be backed up and send it to storage node
Manages backup operations and maintains backup catalog
Responsible for writing data to backup device Manages the backup device
Application is up and running, with users accessing their data during backup
Hot or Online Backup
Requires application to be shutdown during the backup process
Cold or Offline Backup
Creates and backs up server configuration profiles, based on user-defined schedules
Server Configuration Backup
Common backup implementations in a NAS environment are:
Server-based, Serverless, NDMP 2-way, NDMP3-way
It is a process of identifying and eliminating redundant data
Creates a copy of the guest OS, its data, VM state, and configurations
A repository where fixed content is stored
Centralizes, automates, and accelerates data backup and recovery operations across the enterprise
It is a process of creating an exact copy (replica) of data
Captures the state and data of a running VM at a specific point in time (PIT) Uses a separate delta file to record all the changes to the virtual disk since the snapshot session is activated Restores all settings configured in a guest OS to the PIT
An identical copy of an existing VM
Provides continuous data protection and recovery to any PIT Uses splitting technology at server, fabric, or array to mirror to a write to a RecoverPoint appliance Provides automatic RecoverPoint appliance failover
Consumers deploy their software, including OS and application on provider's infrastructure
Consumers deploy consumer-created or acquired applications onto provider's computing platform
Consumers use provider's applications running on the cloud infrastructure
Cloud Deployment Models
Public, Private, Community, Hybrid
A systematic way of defining security requirements
Information Security Framework
Defines risk in terms of threats, assets, and vulnerabilities
Potential attacks that can be carried out on an IT infrastructure
Reduces the impact of vulnerabilities
Restricts devices that can attach to a particular switch port
Include device connection and switch connection control policies
Access control lists
Prevents unauthorized switch from joining a fabric
Enables multiple independent tenants to be serviced using the same set of storage resources
Provides packet filtering and monitoring of the VM-to-VM traffic
Provides identity, security, and access-control management for physical, virtual, and cloud-based environments
RSA Identity and Access Management
ensure that the availability requirements of all the components and services are constantly met
ensure adequate availability of resources, based on their service level requirements
ensure the optimal operational efficiency of all components
ensure confidentiality, integrity, and availability of information
Involves gathering information from various components or processes and generating reports
Enables multiple tenants to share the same storage resources provided by a single landlord (resource provider)
Suite of application for managing and monitoring storage infrastructure
Enterprise Management Platform
It is a technique of establishing a hierarchy of storage types and identifying the candidate data to relocate to the appropriate storage type to meet service level requirements at a minimal cost.
Moves entire LUN from one tier to another Does not give effective cost and performance benefits
A LUN is broken down into smaller segments and tiered at that level Provides effective cost and performance benefits
Enables creation of a large capacity secondary cache using SSDs Enables tiering between DRAM cache and SSDs
Enhances performance during peak workload. Non-disruptive and transparent to applications
Cache Tiering benefits
Contains storage resource management applications to manage a multi-vendor storage infrastructure
Enterprise Management Platform
Which monitoring parameter helps ensure the availability of adequate amount of resources and prevents service unavailability