Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

SNIA S10-210 Storage Networking Management and Administration Exam Practice Test

Page: 1 / 10
Total 97 questions

Storage Networking Management and Administration Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What is the maximum distance between two 8 Gb FC ports that can be connected using 50 µOM3 grade multimode fiber cable?

Options:

A.

500 meters

B.

300 meters

C.

250 meters

D.

150 meters

Question 2

You are provisioning storage to a host with multipathing software installed and correctly configured. You discover that there are four paths to LUNs instead of the expected eight paths.

Why does this happen?

Options:

A.

Incorrect zoning

B.

Incorrect multipathing policy

C.

Incorrect LUN masking

D.

Incorrect LUN size

Question 3

You need to merge two existing FC fabrics. After connecting the ISL to join the fabrics, numerous switches segment.

What should be done to prevent the segmentation?

Options:

A.

Physically separate the switches to opposite sides of the data center.

B.

Move business critical applications to clusters.

C.

Increase the frequency of snapshots for critical data.

D.

Assign domain IDs which are unique across both fabrics.

Question 4

Click the Exhibit button.

Which protocol is represented by the frame shown in the exhibit?

Options:

A.

FCoE

B.

iSCSI

C.

Ethernet

D.

Fibre Channel

Question 5

You have determined that the root cause of your problem is related to invalid characters being intermittently transmitted on your 4 Gb FC link.

What describes this condition?

Options:

A.

Disparity error character

B.

Link hardware cannot detect k28.3 characters

C.

Link hardware cannot detect k28.5 characters

D.

Character does not fit in allowed 8b/10b codes or special characters

Question 6

Click the Exhibit button.

Referring to the exhibit, what are the two largest risks to a highly available solution? (Choose two.)

Options:

A.

Only two adapters per controller

B.

Only two adapters on the server

C.

Only one server

D.

Only one switch

Question 7

Click the Exhibit button.

The customer configuration shown in the exhibit is not meeting the throughput needs of a newly installed application. The application's I/O profile consists of 100% 4 kilobyte reads and all servers require a sustained bandwidth of 150 MBps.

Which location within the configuration presents a performance bottleneck?

Options:

A.

Links between hosts and Switch A

B.

Inter-switch link between Switch A and Switch B

C.

Inter-switch link between Switch B and Switch C

D.

Links between Switch C and storage subsystem

Question 8

A new server needs to start from LUN 1 instead of LUN 0.

Which HBA setting must be configured?

Options:

A.

Selectable Boot

B.

Persistent Binding

C.

Enable Target Reset

D.

LUNs per Target

Question 9

Which two high availability elements can be achieved by remote storage replication? (Choose two.)

Options:

A.

Recoverability

B.

Fault tolerance

C.

Robustness

D.

Redundancy

E.

Serviceability

Question 10

A colleague asks you if the added cost of using encrypting tape drives and sending the tapes off-site is warranted, since your IT organization already has large security investments such as firewalls and database table encryption.

What is your response?

Options:

A.

The correct firewall rule set would make encrypted tape drives obsolete, but there has not always been strong confidence in the firewall administrators.

B.

Encrypted database tables only protect data against inappropriate access by super users such as database or server administrators abusing root privileges.

C.

Encrypt tape drives as part of a defense in depth strategy to ensure that one security mechanism being compromised does not expose all information to a malicious user.

D.

The existing firewalls and database table encryption do not replace encrypted tape drives, but implementing an intrusion protection system (IPS) will make tape encryption obsolete.

Question 11

You have received an emergency call from the night shift after they attempted to merge three small SANs in the engineering department. Once completed, all devices in SANs A and B communicate with one another but SAN C could not communicate with either of the other SANs because the fabric has become segmented.

Which statement is correct?

Options:

A.

The port is isolated until a fabric rebuild occurs,

B.

The port is isolated until a fabric re-configuration occurs.

C.

The system administrator must manually correct the issue that caused segmentation (port isolation) and then start the Build Fabric (BF) process.

D.

The system administrator must manually correct the issue that caused port isolation (segmentation) and then start the Reconfiguration Fabric (RCF) process.

Question 12

When troubleshooting an issue on a host, you discover that the existing file system partition has been corrupted after you provisioned a LUN to another host connected to the same FC fabric.

What is the cause of this problem?

Options:

A.

Incorrect zoning

B.

Incorrect LUN masking

C.

Incorrect multipathing policy

D.

Incorrect LUN size

Question 13

You have twelve 500 GB drives and you need to provide two LUNs using RAID 6 protection for a customer.

What will be the size of each LUN?

Options:

A.

1.5 TB

B.

1.75 TB

C.

2 TB

D.

2.25 TB

Question 14

You want to prevent unauthorized switches from connecting to your company's fabrics.

What should you do?

Options:

A.

Configure ACLs.

B.

Implement CHAP.

C.

Deploy FC-SP policy.

D.

Implement binding lists.

Page: 1 / 10
Total 97 questions