Which two (2) steps must be taken for the application to recognize the added storage?
The storage administrator has a request to add more storage to support added features on an
application. Which two (2) steps must be taken for the application to recognize the added storage?
(Choose two.)
Which two (2) processes occur during a fabric merge?
Which two (2) processes occur during a fabric merge? (Choose two.)
how should the error detection (E_D_TOV) and resource allocation (R_A_TOV) time out values be set?
In a multiple switch fabric, how should the error detection (E_D_TOV) and resource allocation
(R_A_TOV) time out values be set?
Which portion of the 24-bit (aabbcc) fibre channel address identifies the area?
Which portion of the 24-bit (aabbcc) fibre channel address identifies the area?
What are two (2) results of this expansion?
A company has been expanding its SAN physically throughout its campus headquarters. Distributed
servers throughout the campus access storage nodes that are also distributed. What are two (2)
results of this expansion? (Choose two.)
What is the primary reason for making an adjustment to the queue depth?
What is the primary reason for making an adjustment to the queue depth?
Which statements are correct when implementing this backup solution as shown in the exhibit?
After developing a business continuity solution for your company, you implement a backup solution
in your IT infrastructure with focus on backup and restore technologies. Which statements are
correct when implementing this backup solution as shown in the exhibit? (Choose two.)
What are two (2) valid steps when adding a new host to an existing fabric?
What are two (2) valid steps when adding a new host to an existing fabric? (Choose two.)
What are two (2) operational benefits of this implementation?
A company has implemented a stretch cluster between two sites that are 100km apart in
conjunction with synchronous data replication. What are two (2) operational benefits of this
implementation? (Choose two.)
Which security mechanism is most important to protect fabric services?
University IT has its storage subsystems and fabric switches distributed throughout the campus. Each
college and department provides their own systems and staff. Central IT provides fabric, storage and
backup administration. Which security mechanism is most important to protect fabric services?