Which two (2) steps should you take before connection, to maintain security? (Choose two.)
You are adding a new Fibre Channel switch to an existing fabric. Which two (2) steps should you take before connection, to maintain security? (Choose two.)
What will be the result if you insert this new HBA into the same slot?
You have diagnosed that a FC HBA has failed. You need to replace it quickly to complete the overnight data transfer. The only card you have available is a PCI-X 2.0 version running at 533MHz. The failed HBA was inserted into a PCI-X shared bus slot. What will be the result if you insert this new HBA into the same slot?
In what mode is NFS running when a link failure is transparent to both the server and client?
In what mode is NFS running when a link failure is transparent to both the server and client?
Which action could fix the problems?
A minor power outage (brownout) has caused you to reboot all of the equipment in your infrastructure. After successful reboots, some of the storage devices are missing from the fabric configuration. Which action could fix the problems?
What function of SATA is the equivalent of SCSI command tag queuing?
What function of SATA is the equivalent of SCSI command tag queuing?
What is a concern when removing media from service?
What is a concern when removing media from service?
What are two (2) advantages of implementing virtual fabric technology? (Choose two.)
Your manager has attended an industry event and calls a meeting to discuss some ideas upon his return. One concept that caught his attention was the use of virtual fabrics. What are two (2) advantages of implementing virtual fabric technology? (Choose two.)
What must you do to implement boot from a Fibre Channel SAN in your server infrastructure?
What must you do to implement boot from a Fibre Channel SAN in your server infrastructure?
What is the problem?
A customer’s switch command line indicates that the status of port 4 is isolated. You know that port 4 is connected to a target device. What is the problem?
Identify the zoning object that is hardware enforced.
Identify the zoning object that is hardware enforced.