Which protocol is represented in the exhibit?
How many tapes will be used to restore to the most current backup?
Your company does a full backup on Sunday night and incremental backups from Monday through
Saturday at midnight. The full backup requires two tapes and each incremental backup requires
one tape. There is a system failure Wednesday morning.
How many tapes will be used to restore to the most current backup?
Which data protection method should be used in this case?
You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the
drives is not usable.
Which data protection method should be used in this case?
Which type of RAID you would use?
You need to implement a solution for a high transaction database which should have the lowest
write latency as possible and still be able to sustain a failure of a single drive in a RAID group.
Which type of RAID you would use?
Which configuration setting can you change to increase throughput?
You determine that throughput between a server and an FC storage array is lower than expected.
Your privileges only allow you to change the configuration of the HBA on the server.
Which configuration setting can you change to increase throughput?
Which two protocols should be disabled?
A new FC switch has been installed into the data center. You want to disable any unsecure
protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)
Which setting on the HBA needs to be configured?
You are asked to set up a server to boot from a SAN.
Which setting on the HBA needs to be configured?
Which two should the storage administrator monitor to determine the root cause?
A small business with an IP SAN and NAS storage is experiencing slow response times on the
servers which have NAS storage resources.
Which two should the storage administrator monitor to determine the root cause? (Choose two.)
what should you do while limiting administrative complexity?
A database administrator (DBA) is complaining of slow write performance to a storage array. The
DBA would like to have access to real-time performance reporting of the storage array to correlate
array performance with database performance.
Following SNIA Storage Security Best Current Practices, what should you do while limiting
administrative complexity?
Which two FC provided mechanisms would you implement first?
Your CTO is concerned over misuse of corporate storage assets because an employee was found
to be hosting a music library on one of the SANs storage arrays. You have been instructed to
provide some level of device security to the corporate FC SAN. FC has a number of cost-effective
(free) industry standard protection mechanisms that provide or restrict user access to SAN
resources.
Which two FC provided mechanisms would you implement first? (Choose two.)