What must be done prior to making any changes to the configuration?
You are about to allocate storage to a host that includes adding new paths, devices, and zones
to the configuration. What must be done prior to making any changes to the configuration?
(Choose two.)
What is the impact of this action?
You are installing a x8 PCI-E HBA into a server and notice that you only have a x16 slot available.
What is the impact of this action?
What concept can reduce the number of ports required for ISLs?
What concept can reduce the number of ports required for ISLs?
Which two (2) processes occur during a fabric merge?
Which two (2) processes occur during a fabric merge? (Choose two.)
how should the error detection (E_D_TOV) and resource allocation (R_A_TOV) time out values be set?
In a multiple switch fabric, how should the error detection (E_D_TOV) and resource allocation
(R_A_TOV) time out values be set?
Which portion of the 24-bit (aabbcc) fiber channel address identifies the area?
Which portion of the 24-bit (aabbcc) fiber channel address identifies the area?
What are two (2) results of this expansion?
A company has been expanding its SAN physically throughout its campus headquarters.
Distributed servers throughout the campus access storage nodes that are also distributed. What
are two (2) results of this expansion? (Choose two.)
Which statements are correct when implementing this backup solution as shown in the exhibit?
Click the Exhibit button.
After developing a business continuity solution for your company, you implement a backup
solution in your IT infrastructure with focus on backup and restore technologies. Which statements
are correct when implementing this backup solution as shown in the exhibit? (Choose two.)
What are two (2) operational benefits of this implementation?
A company has implemented a stretch cluster between two sites that are 100km apart in
conjunction with synchronous data replication. What are two (2) operational benefits of this
implementation? (Choose two.)
Which security mechanism is most important to protect fabric services?
University IT has its storage subsystems and fabric switches distributed throughout the campus.
Each college and department provides their own systems and staff. Central IT provides fabric,
storage and backup administration. Which security mechanism is most important to protect fabric
services?