how should the error detection (E_D_TOV) and resource allocation (R_A_TOV) time out values be set?
In a multiple switch fabric, how should the error detection (E_D_TOV) and resource allocation
(R_A_TOV) time out values be set?
Which configuration setting can you change to increase throughput?
You determine that throughput between a server and an FC storage array is lower than expected.
Your privileges only allow you to change the configuration of the HBA on the server.
Which configuration setting can you change to increase throughput?
What is the key factor for maximizing performance of the link?
A customer wants to deploy a disaster recovery site 30 km away from the primary data center
using a Fibre Channel link. What is the key factor for maximizing performance of the link?
What are two examples of active, malicious attacks possible in IP Storage transport environments?
What are two examples of active, malicious attacks possible in IP Storage transport
environments? (Choose two)
Which two protocols should be disabled?
A new FC switch has been installed into the data center. You want to disable any unsecure
protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)
What is the most likely cause?
Infrastructure parameters include a small core edge design with all peripherals (disk and tape)
located in the core and all hosts connected to edge switches. Each host includes two HBAs, fabric
A and B respectively, with all disks visible on both fabrics and tape devices divided between
fabrics. The tape devices are single initiator zoned to LTO II tape drives. You are recovering a 200
GB journaling file system, 70% utilized; spread over eight mirrored spindles using 4×32 striping.
During recovery of one host, other hosts on the same edge report SCSI errors. What is the most
likely cause?
Which portion of the 24-bit (aabbcc) fibre channel address identifies the area?
Which portion of the 24-bit (aabbcc) fibre channel address identifies the area?
What is the basic order of a snapshot creation process?
What is the basic order of a snapshot creation process?
Which setting on the HBA needs to be configured?
You are asked to set up a server to boot from a SAN.
Which setting on the HBA needs to be configured?
Which three countermeasures should you take to reduce this risk?
A hacker has compromised the fabric by hijacking an administrative session, removing zones from
the active zone set. Which three countermeasures should you take to reduce this risk? (Choose
three) .