CompTIA Storage+ Powered by SNIA

Size: px
Start display at page:

Download "CompTIA Storage+ Powered by SNIA"

Transcription

1 CompTIA Storage+ Powered by SNIA Number: SG0-001 Passing Score: 800 Time Limit: 120 min File Version: CompTIA SG0-001 CompTIA Storage+ Powered by SNIA Version: 4.1 CompTIA SG0-001 Exam Topic 1, Volume A

2 Exam A QUESTION 1 Which two (2) are advantages of ISL over-subscription? (Choose two.) A. efficient ISL bandwidth utilization B. lowers cost-per-port per installation C. higher performance per ISL D. enables zoning simplicity E. more available F_Ports E /Reference: : QUESTION 2 The SAN audit reports that there is a single fabric in a full mesh topology. Which three (3) benefits result from migrating to dual fabrics with full mesh topologies? (Choose three.) A. less inter-switch links B. simplifies manageability C. protection from human error D. reduction in maintenance activity E. decreased maintenance disruption CE /Reference: : QUESTION 3 What two (2) benefits does SCSI Command Tag Queueing provide? (Choose two.) A. allows I/O requests to be queued to the device B. determines the most efficient way to order & process commands C. tags I/O requests so they can be executed first in first out D. allows SCSI I/O throughput to equal rates of fibre channel E. determines queue depth position B /Reference: : QUESTION 4 You have a single fabric with four servers connecting to an edge switch in a core edge configuration with single 2Gb/s ISLs to the core. Each server has an average throughput requirement of 40MB/s. Under which circumstance would you need to add a second ISL?

3 A. to provide a redundant path B. to avoid congestion on the ISL C. to separate out FSPF updates D. to provide a management path /Reference: : QUESTION 5 Two servers have been connected to a SAN with redundant fabrics and the zone configuration needs to be changed. How can you safely change the zone configuration? A. Save the current zone configuration to disk, modify it and apply it to both fabrics simultaneously to avoid segmentation. B. Modify the zone configuration on one fabric, test it, and then modify the zone configuration on the second fabric. C. Modify the zone configuration on one fabric, test it, and then copy the zone configuration to the second fabric. D. Modify the zone configuration on both fabrics at the same time, enable them simultaneously to avoid segmentation. /Reference: : QUESTION 6 A customer has a database server that processes a great deal of data very quickly. They have identified a bottleneck in the storage subsystem and requested a change to the RAID configuration. How would you configure the new RAID group? (Choose two.) A. Stripe across 7200 rpm drives B. Stripe across 15K rpm drives C. RAID 6 D. RAID 1+0 E. RAID 5 D

4 /Reference: : QUESTION 7 Which set of SCSI components are required to support SCSI command tag queuing? A. adapter, adapter driver, device, device driver B. adapter, device, device driver C. adapter, device driver, controller, controller firmware D. device, device driver /Reference: : QUESTION 8 What enables a virtual machine to have a unique World Wide Port Name? A. Address Replacement Protocol B. Virtual Machine Address Translation C. N_Port ID Virtualization D. extended WWID Architecture /Reference: : QUESTION 9 An application administrator seeks to improve the I/O performance of the server's SAN-attached storage. Which HBA parameter setting change can affect the performance? A. Queue Depth B. PCI Connection Type C. NL-Port Mode D. SCSI ID Mapping /Reference: : QUESTION 10 A two fabric merge has failed leaving you with segmented fabrics. Which could be the the cause of the segmented fabrics? A. unique domain Ids

5 B. identical zone names C. timeouts set to equal values D. non-compatible interoperability modes /Reference: : QUESTION 11 Your customer has upgraded to faster tape technology and the backup is now taking longer. No other changes have been made. What is a possible cause of the performance degradation? A. tape buffer overload B. hardware compression C. backup server cannot sustain required throughput D. serpentine recording changed to helical scan technology /Reference: : QUESTION 12 A production cluster is attached to redundant disk fabrics and a tape fabric. Each cluster member has access to twelve (12) TB of RAID 5 production storage and twelve (12) TB of RAID 0 local replica accessed through eight HBAs single initiator zoned to sixteen storage ports on one storage subsystem. The tape fabric includes one connection to each server and connections to four (4) 1Gb FC to SCSI gateways connected to ten (10) LTO II (35MB/s) tape drives. The standby cluster member performs multi-threaded backups using the local replica. All HBAs and ports are 2Gb/s. If the recovery time is equal to backup time, where is the bottleneck? A. Tape HBA B. Disk HBAs C. Tape Drives D. FC to SCSI Gateway /Reference: : QUESTION 13 After a company experienced a localized disaster, the Business Continuance Plan was reviewed. The plan was revised to include a Recovery Time Objective (RTO) of four (4) hours and a Recovery Point Object (RPO) of one hour. What two (2) processes must be implemented to support this requirement? (Choose two.) A. mirrored snapshots of data and applications B. backup tapes recovered from offsite storage C. data snapshots from the previous day

6 D. operating system and application reinstallation media E. hot or warm site E /Reference: : QUESTION 14 Last month, you successfully merged two (2) local SAN islands into a single core/edge fabric topology and connected storage devices to the core switches. Performance benchmarks were met or exceeded. In recent days, server administrators have documented a slow down in performance as I/O demands have increased. Storage administrators report that all storage ports are under- utilized. What is the most likely explanation? A. conflicts between SAN routing protocols B. storage port buffer credit limits have restricted I/O capabilities C. multiple process login failures D. over utilization of one or more ISLs /Reference: : QUESTION 15 University IT provides shared Fibre Channel storage services. All storage subsystems and fibre channel switches are located in the secure campus datacenter. Each college and department provides their own systems and staff. Central IT provides fabric, storage and backup administration. Which security mechanism is most important in this Fibre Channel infrastructure? A. FCPAP B. link encryption C. switch authentication D. port authentication /Reference: : QUESTION 16 A server administrator notices when a specific server is re-booted its SAN storage is sometimes visible and sometimes it is not. After examining the SAN switch logs, no FLOGI message has been received on that port. Which HBA parameter is a most likely cause? A. Port Link/Speed is set to Autonegotiate. B. WWPN reset timeout is set too low. C. R_A_TOV does not match. D. HBA Port Type is set to "E-Port"

7 /Reference: : QUESTION 17 The customer has an existing fabric switches installed from one manufacturer. They have decided to add a redundant fabric using switches from a different manufacturer. Interoperability is their main concern. What is important when considering interoperability in the SAN? A. switch interoperability mode B. HBA firmware/driver code C. zone naming convention D. virtualization engine /Reference: : QUESTION 18 You are the system administrator of a medium-sized manufacturing company. The chief executive officer (CEO) is concerned about business continuity in case of a disaster. He constituted a project team to develop a business continuity and disaster recovery solution. The team is discussing online backup strategies. What affects time-to-create and incremental update of a copy-on-write snapshot? A. number of files B. number of LUNs C. size of snap volume D. size of LUN /Reference: : QUESTION 19 A storage configuration was created which stores large amounts of infrequently used documents. The storage implementation is based on serial attached SCSI (SAS) and an edge expander. Almost all ports are utilized, and a second edge expander will be installed. What is required to connect SATA devices to the SAS domain? A. SAS-SATA adapter B. SAS-SATA protocol converter C. cable with two SATA connectors D. cable with a SAS and a SATA connector

8 /Reference: : QUESTION 20 The storage administrator has a request to add more storage to support added features on an application. Which two (2) steps must be taken for the application to recognize the added storage? (Choose two.) A. re-scan the SCSI bus B. enable array re-scanning C. configure LUN masking D. zone the host to the subsystem port E. increase the HBA time out value C /Reference: : QUESTION 21 A company has implemented a stretch cluster, active/passive configuration, between two sites that are 100km apart in conjunction with synchronous data replication. They want to perform an upgrade to the primary server and need to run the application at the secondary site with minimal disruption, while still maintaining data integrity. What is the safest procedure to failover the application to the remote site without any data loss? A. stop services on local host, failover cluster alias, failover storage B. stop services on local host, failover application, failover cluster alias C. stop services on local host, failover storage, failover cluster alias D. stop services on local host, failover cluster alias, failover application /Reference: : QUESTION 22 A company has merged its two existing SANs that were in adjacent buildings. The data center in each location had been utilizing at least half of its total SAN bandwidth. Now they now plan to migrate all production data to one data center and replicate that data across the new ISLs to the other data center which will now only be used for for disaster recovery purposes. What is the potential impact to performance after completing this reconfiguration? A. no change to SAN performance B. increased performance for production traffic C. decreased performance for production traffic D. ISL over-subscription will determine performance /Reference: :

9 QUESTION 23 A customer has a SAN consisting of two FC switches with a single 4Gb/s ISL between them. There are six hosts attached to one switch, with an average throughput of 30MB/s each, and a single storage subsystem port connected to the second switch at 2Gb/s. The deployment is performing poorly and you have been tasked with identifying the possible cause. What is the cause of the degraded performance? A. ISL oversubscription B. HBA oversubscription C. Switch oversubscription D. Target oversubscription /Reference: : QUESTION 24 Which portion of the 24-bit (aabbcc) fibre channel address identifies the domain ID? A. aa B. cc C. aabb D. bbcc /Reference: : QUESTION 25 You have noticed some unusual behavior in your storage environment. You need to troubleshoot the problem and review the available options there are to resolve the issues and to restore stability. What will restore stability to the environment? A. Install system upgrades promptly after successful testing. B. Align applications to information policy management requirements. C. Limit collaboration with other organizations with similar storage networks and configurations. D. An annual security audit should be performed and system logs should be scrutinized for unusual activity. /Reference: : QUESTION 26 Click the Exhibit button.

10 Calculate the fan-in ratio for ZONE_A. A. 9:1 B. 9:2 C. 5:1 D. 3:1 /Reference: : QUESTION 27 You are installing a x16 PCI-E HBA into a server and notice that you only have a x8 slot available. What is the impact of this action? A. The HBA will negotiate and only use x8 lanes. B. The slot must be reconfigured for x16 support. C. The HBA cannot be installed into a x8 slot. D. The slot will negotiate to support the x16 HBA. /Reference: : QUESTION 28 A two fabric merge has failed, leaving you with segmented fabrics. Investigation of the switch domain IDs shows that there is an ID conflict between two of the switches. What is the corrective action?

11 A. no action is necessary, the ID conflict will be resolved by negotiation B. utilize the name server editor to change the domain ID within the fabric C. change the domain ID on the switch that needs to be changed and allow negotiation to resolve the issue D. take one of the switches offline (disabled), change the domain ID, and bring the switch back online (enabled) /Reference: : QUESTION 29 When replacing an HBA, which two steps should be performed prior to connecting the HBA to the fabric? (Choose two.) A. activate the zone set B. disable zoning for the old HBA C. update the alias map with the new WWN D. create a new zone for the old HBA to ensure isolation of the defective component E. rename the active zone(s) to match the new HBA's WWN C /Reference: : QUESTION 30 When preparing to merge two fabrics, which two items should be checked before connecting the fabrics? (Choose Two.) A. zones sets are activated B. timeout values are set properly C. new configurations are enabled to allow the merge D. fabrics are co-located to prevent segmentation E. interoperability modes are configured per vendor instructions E /Reference: : QUESTION 31 The fabric security has been compromised and an unauthorized administrative session is established, removing zones from the active zone set. Which two (2) countermeasures should you take to reduce this risk? (Choose two.) A. redirect logging to syslog of a protected system B. enable port authentication using DH-CHAP

12 C. enable access control list and role based access control D. disable Telnet and enable secure shell E. enable storage access controls and link encryption D /Reference: : QUESTION 32 Which three (3) backup methods support application recovery of a database? (Choose three.) A. Use software snapshot technology that takes a point in time snapshot. B. Cold backup method where the database services have been stopped before the backup. C. Copy-on-Write technology built into the database that can be used by backup software. D. File system backup method including transaction log needed to run the backup and restore. E. Copy the database folder to another location and back up the files in the normal fashion. BC /Reference: : QUESTION 33 A customer with sixteen non-clustered SAN attached hosts has a storage subsystem with thirty- two disk drives. The customer wishes to protect their data using RAID 1. Each server has a need to see three separate volumes for their final configuration. What must be configured on the storage subsystem to meet their storage allocation needs? A. multiple scsi targets to each mirror volume B. single logical unit and use host-based LVM C. separate virtual paths for each mirror volume D. separate logical units for each server volume /Reference: : QUESTION 34 What are two (2) valid steps when adding a new host to an existing fabric? (Choose two.) A. create new zone B. remove zone members C. add new zone member D. deactivate the zone set E. merge new zone C

13 /Reference: : QUESTION 35 You are diagnosing a performance problem with a Fibre Channel attached server that is configured to run multipathing with dynamic I/O load balancing. You are not seeing the expected performance. You have determined that the server configuration is correct and that the fabric paths are not congested. What could be a possible cause for the lower than expected performance? A. storage ports are configured to run half duplex B. storage architecture is cache centric C. storage ports are configured to run full duplex D. storage architecture is controller centric /Reference: : QUESTION 36 What determines the principle switch in a Fibre Channel Fabric? A. highest Domain ID B. highest world wide name C. assigned priority D. lowest Domain ID /Reference: : QUESTION 37 During the preparation of a server for the SAN connection, you configure the Fibre Channel host bus adapter. Where does the Fibre Channel HBA send error and debug information to? A. connected SAN switch B. server's operating system C. console output of the server D. central management station /Reference: : QUESTION 38

14 When installing two PCI-X HBAs into a server to create the fastest access to the SAN, which configuration would be used? A. serial system architecture B. cascaded system buses C. single dual-port HBA D. separate system buses /Reference: : QUESTION 39 What two (2) technologies are commonly used in a business continuity plan? (Choose two.) A. tape backup with restore to a remote site B. subsytem-based synchronous replication to a remote site C. subsystem-based asynchronous replication to a remote site D. subsystem-based replication in the same datacenter E. virtual tape library with restore to a remote site C /Reference: : QUESTION 40 CIFS is a stateful service. What maintains a history of connection activities? A. server only B. application C. client and server D. domain controller /Reference: : QUESTION 41 You are trying to upgrade an existing 1Gb/s FC SAN that is using 62.5 micron multi-mode cable from a tape library to a server that is 175 meters away to 2Gb/s Fibre Channel. After switching to the 2Gb/s Fibre Channel equipment, a connection to the server cannot be maintained. When a connection is made, numerous errors are reported. What is the cause of the errors? A. 2Gb/s Fibre Channel must convert to LC from SC connectors B. 2Gb/s Fibre Channel must use 50 micron multi-mode cable C. 2Gb/s Fibre Channel cable length requires an optical splitter

15 D. 2Gb/s Fibre Channel cable length has been exceeded /Reference: : QUESTION 42 A customer's database environment includes remote synchronous mirroring across a DWDM link. Which two (2) business management requirements will be met by the implementation? (Choose two.) A. cost B. service C. continuity D. availability E. configuration D /Reference: : QUESTION 43 You are looking at a Fibre Channel trace log and you notice that the class 2 communication session between one initiator and target continually stops and then restarts. You suspect that there is a flow control problem between this pair of devices. Which login communication session would you analyze in the trace log for the number of flow control credits that have been allocated? A. port login B. loop login C. fabric login D. process login /Reference: : QUESTION 44 There are two datacenters separated by twelve (12) km with IP connections linking the two sites. Site A is the primary production site, Site B is for test/development & disaster recovery. Site A synchronously replicates data to Site B for disaster recovery purposes via a merged SAN fabric between the two sites. The communication between the two sites is lost. What storage event will occur as a result of this? A. SAN Fabric will do a build fabric following segmentation B. SAN Fabric applications will stop executing I/O C. SAN Fabric will do a reconfigure fabric following segmentation D. SAN and non-san disk I/O will be halted

16 /Reference: : QUESTION 45 You have just completed installing, cabling, zoning, and device masking for a new server. HBA configuration was successful, yet the host cannot see the storage after executing a device find command. Investigation at the switch reveals that the host is not "seen" at the switch port. Light is visible at either end of the fiber but no link light is seen on the switch. What is the most likely cause of the problem? A. the switch ports are enabled B. the HBA on the subsystem is not online C. the zone has not been activated D. transmit and receive fibers are reversed /Reference: : QUESTION 46 You have been asked to add 2 new PCI-X cards into an existing server architecture and notice that they run at different clock speeds. The system has both shared and dedicated PCI bus slots available. In order to maximize performance, which PCI cards should be installed in which slots? (Choose two.) A. PCI-X bus slots are speed independent B. PCI-X 133 installed in a dedicated bus slot C. PCI-X 100 installed in a dedicated bus slot D. PCI-X 100 installed in a shared bus slot E. PCI-X 133 installed in a shared bus slot D /Reference: : QUESTION 47 You have been asked to review your fabric management plan for effectiveness and efficiency, and to ensure that you are meeting its stated requirement. What should you check to see if you are meeting the defined SLAs? A. viability of 1Gb/s FC technology to minimize problems with support B. backup and recovery test results and their impact on fabric infrastructure C. actual expenditure on fabric services against the predicted expenditure D. frequency of fabric failures and the number of services impacted

17 /Reference: : QUESTION 48 A Fibre Channel switch failed in your fabric and a replacement switch has been delivered. Which two (2) actions should be taken before plugging the replacement switch into the fabric? (Choose two.) A. Delete the fabric records of the old switch from the Fabric. B. Configure the new switch in to the current zone configuration. C. Delete the zone configuration information on the replacement switch. D. Set the Domain ID of the replacement switch to the Domain ID of the failed switch. D /Reference: : QUESTION 49 Click the Exhibit button. Servers in your environment are connected to one physical infrastructure which consists of different logical fabrics. Which feature do you use to implement this topology? A. NPIV B. Virtual Fabric C. Zoning D. Segmentation

18 /Reference: : QUESTION 50 A customer has deployed redundant switched fabrics in a HA environment which also includes non-ha, singleattached test servers. A new project requires additional connectivity for new HA servers to be placed into production, but there are not enough free ports available in one of the existing fabrics to complete the HA deployment. Which option would allow for the addition of the new hosts while maintaining the redundant infrastructure at least cost? A. Add a new switch to the problem fabric to increase available ports on the switches. B. Add a new switch to both fabrics to increase available ports on the switches. C. Add ISL's between the existing fabrics to leverage all available ports on the switches. D. Cascade the existing switches into a new director class switch and add the hosts to the director. /Reference: : QUESTION 51 Which typical data characteristics would define archival data? (Choose two.) A. short-term B. long-term C. offline D. online E. dynamic C /Reference: : QUESTION 52 What is the primary reason for making an adjustment to the queue depth? A. number of LUNs presented to the HBA changes B. average size of I/O blocks going through the HBA changes C. read/write ratio of I/O going through the HBA changesread/write ratio of I/O? going through the HBA changes D. size of cache on the storage system changes /Reference:

19 : QUESTION 53 What is a recommended guideline for merging two Fibre Channel fabrics? A. Change domain ID to consecutive values. B. Disable zoning on all switches prior to merging fabrics. C. Connect the fabrics using one ISL at a time. D. Log out from the principal switch prior to merging fabrics. /Reference: : QUESTION 54 Which three (3) processes occur during a fabric merge? (Choose three.) A. TOV distribution B. zone set passing C. FSPF trunk distribution D. principle switch negotiation E. name server communication DE /Reference: : QUESTION 55 Click the Exhibit button. You are integrating a local tape backup solution in your IT environment. What can cause the Gigabit Ethernet to become the bottleneck in this backup environment? A. agent installation during backup sessions

20 B. metadata if millions of files are backed up C. second file copy of backup data to the catalog database D. data traffic through the backup server to the tape library /Reference: : QUESTION 56 A four-way cluster is attached to two fabrics. Each member has two HBAs connected to each fabric. Each fabric has two subsystem connections. Each cluster member is a primary for one application. All LUNs appear on all storage ports with workload equally distributed across all. Each host has two dedicated HBAs for tape that can each see four independent LTO II (35MB/s) tape drives. All files are large and involve sequential I/O. Performance reporting shows a large read pending at the host during multi-threaded backup. What is the most probably cause for the large read pending at the host? A. native command queuing B. SCSI Queue Depth too high C. SCSI Queue Depth too low D. throttling threshold is too high /Reference: : QUESTION 57 A customer has a SAS-based storage environment with a SAS domain and some standalone servers, each with multiple built-in SAS disks. The implementation includes direct routing, table routing and subtractive routing. What is table routing? A. routing along multiple parallel connections B. routing along a physical point-to-point connection C. routing between devices connected to an edge expander D. routing between devices connected to different edge expanders /Reference: : QUESTION 58 You have recently upgraded a tape drive on a older switch to operate at 120MB/s from 80MB/s. Prior to purchasing the tape drives, you tested server dumps to a disk array across multiple ports and saw speeds exceeding 150MB/s. With the new tape drive, you have not seen any dump speed exceed 100MB/s. What is the most likely cause? A. The new tape drive has logged into the fabric as a storage initiator. B. The switch only has 1Gb/s ports.

21 C. You have not yet reset the switch port buffer credits. D. The tape drive has logged in as an iscsi device. /Reference: : QUESTION 59 You have an existing disk subsystem with 16 drives that provides volumes for six Windows hosts on 2Gb/s links. You decide to add another 16 drive tray to double the number of raw hard drives in order to support five (5) new UNIX servers. The average server throughput is 20 MB/s. The disk subsystem is dual ported and configured active-passive. What is likely to occur? A. The zone configuration on the fabric will control the traffic flow to the disk subsystem. B. The added server demand on the disk subsystem will saturate the ports. C. The disk subsystem will notice the extra servers and go active-active to support the load. D. The Windows systems will receive precedence as they were registered first on the disk subsystem. /Reference: : QUESTION 60 You are about to allocate storage to a host that includes adding new paths, devices, and zones to the configuration. What must be done prior to making any changes to the configuration? (Choose two.) A. create new zones B. activate change tracking C. activate the new zone set D. backup the configuration E. copy the active zone set E /Reference: : Topic 2, Volume B QUESTION 61 You are installing a x8 PCI-E HBA into a server and notice that you only have a x16 slot available. What is the impact of this action? A. The HBA will negotiate and use x16 lanes. B. The slot must be reconfigured for x8 support. C. The HBA cannot be installed into a x16 slot. D. The slot will negotiate to support the x8 HBA.

22 /Reference: : QUESTION 62 What concept can reduce the number of ports required for ISLs? A. zoning B. locality C. trunking D. routing /Reference: : QUESTION 63 Which two (2) processes occur during a fabric merge? (Choose two.) A. TOV negotiation B. zone set passing C. FSPF trunk negotiation D. name server communication E. subordinate switch negotiation D /Reference: : QUESTION 64 In a multiple switch fabric, how should the error detection (E_D_TOV) and resource allocation (R_A_TOV) time out values be set? A. according to the number of switches in the fabric B. as a multiple of the number of ports on the switch C. the same on all N_Ports and switches in the fabric D. double the values set on the core switch /Reference: : QUESTION 65

23 Which portion of the 24-bit (aabbcc) fiber channel address identifies the area? A. cc B. bb C. aabb D. bbcc /Reference: : QUESTION 66 A company has been expanding its SAN physically throughout its campus headquarters. Distributed servers throughout the campus access storage nodes that are also distributed. What are two (2) results of this expansion? (Choose two.) A. increase in data accessibility B. decrease in resource utilzation C. increase in SAN I/O latency D. increase in application availability E. decrease in application availability C /Reference: : QUESTION 67 Click the Exhibit button. After developing a business continuity solution for your company, you implement a backup solution in your IT infrastructure with focus on backup and restore technologies. Which statements are correct when implementing this backup solution as shown in the exhibit? (Choose two.) A. backup impacts the LAN traffic B. multiplexing to tape reduces data traffic C. metadata is sent to the backup server D. servers can share the library for faster tape access E. backup server can directly backup snapshots of the primary storage C /Reference: : QUESTION 68 A company has implemented a stretch cluster between two sites that are 100km apart in conjunction with synchronous data replication. What are two (2) operational benefits of this implementation? (Choose two.)

24 A. decreased possibility of data inaccessibility B. protection against fabric service failure C. easier to manage SAN configuration D. increased application availability E. protection against ISL failure D /Reference: : QUESTION 69 University IT has its storage subsystems and fabric switches distributed throughout the campus. Each college and department provides their own systems and staff. Central IT provides fabric, storage and backup administration. Which security mechanism is most important to protect fabric services? A. node authentication B. switch authentication C. port authentication D. link encryption /Reference: : QUESTION 70 You have been asked to conduct a high-level inventory of a remote fibre channel SAN fabric. Your manager is worried that the remote site may include HBAs manufactured from a now bankrupt vendor. What information will be most useful to you to determine the HBA vendor? A. HBA Port Mode B. AL_PA setting for HBA port C. FC_ID of the HBA port D. World Wide Port Name /Reference: : QUESTION 71 You are implementing a remote synchronous replication strategy over the FC SAN for disaster recovery. Which two must you consider? (Choose two.) A. ISL aggregation B. throughput requirement C. location of principal switch D. acceptable latency to the application

25 E. disk subsystem RAID level compatibility D /Reference: : QUESTION 72 Users are complaining the response times are out of range on a retail application. Performance monitoring of the storage subsystem indicates that there are no problems. A check of the host error logs shows that there are excessive SCSI re-transmit errors. The 2Gb/s HBA on the host was recently replaced with a 4Gb/s HBA. What is the most probable cause of the timeout errors? A. the link is utilizing 9 micron fiber B. SCSI timeout value is set too small C. the switch port to the storage subsystem is set at 2Gb/s D. the distance from the host to the storage subsystem is greater than 175 meters /Reference: : QUESTION 73 What metric is used when determining how many storage subsystem ports can be attached to a single host port? A. fan-in B. buffer credits C. fan-out D. ISL oversubscription /Reference: : QUESTION 74 Identify the zoning object that is hardware enforced. A. alias B. E_Port C. zone set D. F_Port /Reference:

26 : QUESTION 75 A customer's switch command line indicates that the status of port 4 is isolated. You know that port 4 is connected to a target device. What is the problem? A. port speed inconsistency B. Domain ID inconsistency C. E_D_TOV mismatch D. Fibre type mismatch /Reference: : QUESTION 76 What must you do to implement boot from a Fibre Channel SAN in your server infrastructure? A. Configure the SAN Boot setting on the Fibre Channel HBA. B. Enable direct disk access on the SAN switch. C. Enable the BIOS on the Fibre Channel HBA. D. Perform a loopback data test on the Fibre Channel HBA. /Reference: : QUESTION 77 Your manager has attended an industry event and calls a meeting to discuss some ideas upon his return. One concept that caught his attention was the use of virtual fabrics. What are two (2) advantages of implementing virtual fabric technology? (Choose two.) A. ease of design B. isolation of Fault Domains C. independent SAN fabric management D. universally adopted technology E. separate fabric services E /Reference: : QUESTION 78 What is a concern when removing media from service? A. data on media should be erased

27 B. data on media should be archived C. tapes should be archived D. management information should be sanitized /Reference: : QUESTION 79 What function of SATA is the equivalent of SCSI command tag queuing? A. SATA command tag queuing B. SATA command queuing C. native command tag queuing D. native command queuing /Reference: : QUESTION 80 A minor power outage (brownout) has caused you to reboot all of the equipment in your infrastructure. After successful reboots, some of the storage devices are missing from the fabric configuration. Which action could fix the problems? A. replace the effected HBAs with new ones B. restore the active zone set from a backup C. restore the HBA configurations from backups D. replace the missing storage devices with new ones /Reference: : QUESTION 81 In what mode is NFS running when a link failure is transparent to both the server and client? A. session oriented B. stateful C. seamless D. stateless

28 /Reference: : QUESTION 82 You have diagnosed that a FC HBA has failed. You need to replace it quickly to complete the overnight data transfer. The only card you have available is a PCI-X 2.0 version running at 533MHz. The failed HBA was inserted into a PCI-X shared bus slot. What will be the result if you insert this new HBA into the same slot? A. HBA will run at 533MHz. B. HBA will run at 266MHz. C. HBA will run at 133MHz. D. HBA will run at 100MHz. /Reference: : QUESTION 83 Click the Exhibit button. You are troubleshooting an issue with Host 1 that should see newly installed storage devices A and B, however can only see Storage A and not Storage B. Which two (2) items should you check? (Choose two.) A. connectivity of the ISL between the two switches B. if Host 1 is logged into the switch C. if Storage A is logged into the switch D. if Host 1 is zoned to Storage B E. if Storage B is logged into the switch E /Reference: : QUESTION 84 You are adding a new Fibre Channel switch to an existing fabric. Which two (2) steps should you take before connection, to maintain security? (Choose two.) A. clear zone configuration B. change default password C. disable E_PORT functionality D. upgrade firmware using an isolated fabric E. disable unused ports E /Reference: :

29 QUESTION 85 A production cluster is attached to redundant disk fabrics and a tape fabric. Each fabric is contained within a single switch. Each cluster member has access to twelve (12) TB of RAID 5 production storage and twelve (12) TB of RAID 0 local replica accessed through eight (8) HBAs single initiator zoned to sixteen (16) storage ports on one storage subsystem. The tape fabric includes one (1) connection to each server and direct connections to ten (10) LTO II (35MB/s) tape drives. The standby cluster member performs multi-threaded backups using the local replica. All HBAs and ports are 2Gb/s. If the recovery time is equal to backup time, where is the bottleneck? A. tape HBA B. disk HBAs C. tape drives D. subsystem contention /Reference: : QUESTION 86 The SAN audit reports that there is a single fabric in a full mesh topology. Which three benefits result from migrating to dual fabrics with full mesh topologies? (Choose three.) A. requires fewer inter-switch links B. simplifies management C. minimizes disruption due to configuration error D. minimizes disruption due to maintenance E. reduces maintenance activity CD /Reference: : QUESTION 87 A company with departmental Fibre Channel SANs has decided that they now want to merge them into a large enterprise SAN to assist with resource allocation and improve resource utilization. What two (2) configuration parameters should the administrator check before connecting the SANs to minimize service disruption? (Choose two.) A. verify time out values match B. verify principle switch priorities match C. verify domain ID assignments are unique D. verify auto negotiation is enabled C /Reference: :

30 QUESTION 88 Which conflict would cause fabric segmentation? A. zone content mismatch B. only one zone set activated C. E_Ports not included in zone set D. inconsistent ISL zone configuration /Reference: : QUESTION 89 A HBA has failed in an application server that connects to a Fabric that uses WWPN zoning. Which two (2) steps should be completed after replacing the HBA to bring the application server back online? (Choose two.) A. Change the zone configuration. B. Change the application metadata server. C. Change the WWPN login of the HBA. D. Change the LUN masking configuration. D /Reference: : QUESTION 90 A customer has a SAS-based storage environment with a SAS domain and some standalone servers, each with multiple built-in SAS disks. The implementation includes direct routing, table routing and subtractive routing. Which role does a fanout expander play in subtractive routing? A. It routes between edge expanders connected to it. B. It forwards routing requests to all other connected edge expanders. C. It disables currently unused branches to increase throughput. D. It is the sole source of subtractive routing requests in the SAS domain. /Reference: :

31 QUESTION 91 You are the system administrator of a medium-sized manufacturing company. The chief executive officer (CEO) is concerned about business continuity in case of a disaster. He constituted a project team to develop a business continuity and disaster recovery solution. The team is discussing replication strategies. What two (2) dependencies need to be considered in time-to-create and incremental re-establishment of a split mirror? (Choose two.) A. LUN size B. file system C. changed data D. LDM E. sector size C /Reference: : QUESTION 92 What should the administrator verify before connecting a stand-alone populated switch to an existing fabric? A. Verify port type assignment B. Verify domain ID assignment C. Verify FC_ID port assignment D. Verify principle switch assignment /Reference: : Topic 3, Volume 3 QUESTION 93 Which characteristic differentiates an IP Storage adapter from a traditional Network Interface card (NIC)? A. link aggregation B. 2 Gb/s data rate C. larger frame size D. TCP/IP segmentation offload /Reference: : QUESTION 94 What are two advantages of IP storage networking? (Choose two.) A. Lower propagation delay

32 B. Support up to 16 million devices C. Builds on SCSI and Ethernet technologies D. Takes advantage of existing knowledge base D /Reference: : QUESTION 95 What is a shared communication infrastructure device to which nodes on a multi-points bus or loop are physically connected? A. Hub B. Switch C. Gateway D. Managed switch /Reference: : QUESTION 96 Which architecture allows system-to-system communication and user level DMA with as little CPU interaction as possible, most particularly for clustering? A. FAIS B. FC-VI C. FC-CT D. FC-SW /Reference: : QUESTION 97 Which SMB security entity provides locking? A. Share ACL B. NFS export C. Deny modes D. CIFS authorization

33 /Reference: : QUESTION 98 Which three options are benefits of using storage based replication? (Choose three.) A. Minimal or no host load B. Host platform independent C. Minimal client network load D. Storage platform independent E. Minimal storage network load CD /Reference: : QUESTION 99 Which three standards are the responsibility of the Internet Engineering Task Force? (Choose three.) A. IEEE B. SNMP C. NDMP D. Policy for QoS E. IP over Fibre Channel DE /Reference: : IETF ( -- Internet Engineering Task Force. The standards body responsible for a wide variety of TCP/IP (Transmission Control Protocol/Internet Protocol) standards, including: SNMP, Simple Network Management Protocol - A protocol for monitoring and managing systems and devices in a network. The data being accessed is defined by a MIB (Management Information Base, also defined in the IETF). The functions supported by the protocol are the request and retrieval of MIB data, the setting or writing of data, and traps to signal the occurrence of events. IP over Fibre Channel Policy for QoS (quality of service) QUESTION 100 What is the minimal isci security level needed to protect against man-in-the-middle insertion, modification or deletion? A. None B. Encryption (IPsec) C. Initiator and Target Authentication D. Digest for header and data integrity

34 /Reference: : QUESTION 101 A customer is implementing a disaster recovery plan to backup data to a remote location 200 kilometersfrom their production facility. Which proposal should they use? A. Synchronously replicate data between the two sites using DWDM. B. Asynchronously replicate data between the two sites using DWDM. C. Synchronously replicate data between the two sites using a completely fibre solution. D. Asynchronously replicate data between the two sites using a completely fibre solution. /Reference: : QUESTION 102 Which SMI-S related acronym describes an object-oriented description of the entities and relationships in a business management environment, divided into core and common models? A. CIM B. SRM C. DRM D. DMTF /Reference: : QUESTION 103 Which virtualization technique requires the addition of an agent to each host for the purpose of managing storage allocation? A. Host-based LVM B. In-band appliance C. Out-of-band appliance D. Array-based LUN masking /Reference: : QUESTION 104 Which concept includes considerations such as data placement, deletion, repurposing, and regulatory archiving. A. Tiers of management

35 B. Backup and recovery C. Common data usage model D. Information lifecycle management /Reference: : QUESTION 105 What are three advantages of NAS? (Choose three.) A. File services can be extended to hundreds of devices B. Easy to implement using the same protocols as file servers C. Provides a high-speed data path between servers and storage D. Clients running different operating systems can share the same files BD /Reference: : QUESTION 106 What is the SNIA Shared Storage Model? A. Description of storage components and their differences B. Framework that captures the functional layers and properties of a storage system C. Specification, a design, a product, a recommendation of a storage infrastructure D. Systems architecture that describes partitioning of physical elements and their complex interactions /Reference: : QUESTION 107 Which transport method requires correct electrical termination on both ends? A. SBus B. ATAPI C. PCI bus D. SCSI bus /Reference: :

36 QUESTION 108 A customer with a split mirror backup infrastructure requires an emergency restore of a database. The data files and archive logs are co-located in the same file system. What is your first step after stopping the database? A. Restore B. Bring up the database in recovery mode C. Copy archive logs to an alternate location D. Change the database state to no archive logs /Reference: : QUESTION 109 A stock trading application requires disaster tolerant storage for both transactional and analytical processing. The implementation resulted in both a database and a data warehouse. A. As initial storage is extended to match capacity changes, remote storage is added dynamically. B. The storage administrator creates a series of policies that specify remote and local replication at the policy client. C. The storage administrator creates a series of policies that specify remote and local replication at the policy provider. D. As local storage is extended to match capacity changes, remote storage is reconfigurated within the capabilities of the storage pool. B /Reference: : QUESTION 110 Where is the virtualization performed that masks physical data layout? A. Network B. FC switch C. Host/server D. Storage device /Reference: : QUESTION 111 Which architectural model in the SCSI Architectural Model defines the objects, function and Behavior independent of the physical interface used to transport those objects or perform the functions?

37 A. FC-4 B. iscsi C. SCSI-3 D. SCSI-FCP /Reference: : QUESTION 112 What type of Fabric switch ports are joined to form an ISL? A. F_Port to F_Port B. N_port to F_Port C. E_Port to E_Port D. NL_Port to E_Port /Reference: : QUESTION 113 Which two are characteristic of mid-tier DAS? (Choose two.) A. Requires specialized training to manage B. Storage must be located near the server C. Data is not readily shared over many servers D. Storage is accessible by any host anywhere on the network C /Reference: : QUESTION 114 What occurs when iscsi has been implemented in software? A. FCIP is automatically enabled. B. Host CPU overhead increases. C. Network bandwidth increases to 10Gb/s. D. Performance is equal to Fibre Channel host bus adapters. /Reference:

38 : QUESTION 115 Which two recovery risks exist, given backup of a multi-protocol NAS device taken from a client System through an active share? (Choose two.) A. Loss of SMB files B. Loss of NFS meta data C. Loss of CIFS meta data D. Loss of ACL information D /Reference: : QUESTION 116 What are two disadvantages of using a parallel interface? (Choose two.) A. As the bus length increases, the chance of skew increases B. As the bus speed increases, the chance of skew increases C. As the number of devices attached to the bus increases, bus length decreases D. As the number of devices attached to the bus increases, bus queue depth increases B /Reference: : QUESTION 117 Which Storage solution supports remote mirroring of FC switch attached storage arrays in geographically dispersed data centers? A. ifcp B. FCIP C. isns D. iscsi /Reference: : QUESTION 118 Which type of storage management product would be used to perform LUN creation, mapping, And configuration without advanced integration of heterogeneous storage platforms? A. Device manager B. Logical data manager

39 C. Storage network manager D. Network management system /Reference: : QUESTION 119 Which storage management component typically contains proprietary interfaces and is vendor supplied? A. Device manager B. Logical data manager C. Storage network manager D. Network management system /Reference: : QUESTION 120 Which utility typically enables abstraction of storage within a server? A. LVM B. Switch zoning C. SAN appliance D. SMI-S monitoring tool /Reference: : QUESTION 121 Which two performance criteria are used to determine the selection of a device for a tiered storage level? (Choose two.) A. User profile B. Age of data C. Speed (IOPs) D. Raid and availability D /Reference: :

40 QUESTION 122 Which term refers to the information that can be accessed on a disk drive by all the heads without Having to seek? A. Sector B. Cylinder C. Read cache D. Parity partition /Reference: : QUESTION 123 What component is a configuration management element of an IP storage solution? A. HBA B. VSAN C. ISL D. VLAN /Reference: : QUESTION 124 Which IP Storage protocol requires isns for discovery and management? A. FCIP B. SATA C. ifcp D. iscsi /Reference: : QUESTION 125 Which Fibre Channel class of service offers a "quality of service" with guaranteed bandwidth? A. Class 2 B. Class 3 C. Class 4 D. Class 5

41 /Reference: : QUESTION 126 Which three interface points test the interoperability of SMI-S? (Choose three.) A. CIMOM to provider B. Client to CIM/WBEM C. CIM/WBEM to CIMOM D. CIM/WBEM to provider BC /Reference: : QUESTION 127 What are three advantages of a SAN? (Choose three.) A. Heterogeneous servers can access a shared storage array. B. Heterogeneous servers can be backed up to a shared tape array. C. Storage arrays can appear as self contained, autonomous file servers. D. Clustered servers located in different buildings can access the same storage. BD /Reference: : QUESTION 128 A small Internet startup company needs to implement a backup solution in their environment. Cost is a large concern, and performance is not as critical since their environment mainly sits idle during off hours. If a backup is not completed successfully, the customer has little concern and is able to run new backups at any time. Which solution meets the customer's requirements for providing a low-cost solution and satisfies their current demand? A. LAN-free backup B. Server-free backup C. Over-the-network backup D. SAN without LAN-free backup /Reference: :

42 QUESTION 129 A clothing manufacturer is replicating its data asynchronously to a remote site. On the remote site, it creates a snapshot of the mirrored volume to use as a disaster tolerant backup Which choice contains the steps to create a consistent copy of the data? A. Simply create the snapshot B. Quiesce the application at the production site, create the snapshot C. Split the link between the production and mirrored volumes, create the snapshots D. Split the production and mirrored volumes, quiesce the application at the production site, create the snapshot /Reference: : QUESTION 130 Which three are advantages of using a SAN in a campus environment? (Choose three.) A. Consolidate storage in a data center B. Increase storage resource utilization C. Decrease network traffic due to backups D. Decrease network traffic due to storage decentralization BC /Reference: : QUESTION 131 Which disk drive type relies on the host processor to perform all storage tasks? A. SCSI B. Parallel ATA C. Fibre Channel D. SAS (Serial Attached SCSI) /Reference: : QUESTION 132 What is the maximum potential bandwidth of a Fibre Channel connection in a 2 Gb SAN? A. 100 MB/s B. 200 MB/s C. 300 MB/s D. 400 MB/s

43 /Reference: : QUESTION 133 Which storage networking environment accesses the file system through a local area network? A. SAN B. NAS C. CAD D. DAS /Reference: : QUESTION 134 Which two sub-components are required in a specialized NAS operating system? (Choose two.) A. File system B. User interface C. Process scheduler D. Communication protocols D /Reference: : QUESTION 135 Which two are advantages of hardware RAID controllers? (Choose two.) A. Volume management is performed by the server. B. Volume management is performed by controller card. C. Dedicated cache memory increases server write performance. D. Parity calculation by the server and cache memory in the RAID controller increases read and Write performance. C /Reference: : QUESTION 136 Which Fibre Channel topology was initially introduced as a replacement for physical SCSI?

S SNIA Storage Networking Management & Administration

S SNIA Storage Networking Management & Administration S10 201 SNIA Storage Networking Management & Administration Version 23.3 Topic 1, Volume A QUESTION NO: 1 Which two (2) are advantages of ISL over subscription? (Choose two.) A. efficient ISL bandwidth

More information

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel

More information

Snia S Storage Networking Management/Administration.

Snia S Storage Networking Management/Administration. Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases

More information

access addresses/addressing advantages agents allocation analysis

access addresses/addressing advantages agents allocation analysis INDEX A access control of multipath port fanout, LUN issues, 122 of SAN devices, 154 virtualization server reliance on, 173 DAS characteristics (table), 19 conversion to SAN fabric storage access, 105

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

HP Supporting the HP ProLiant Storage Server Product Family.

HP Supporting the HP ProLiant Storage Server Product Family. HP HP0-698 Supporting the HP ProLiant Storage Server Product Family https://killexams.com/pass4sure/exam-detail/hp0-698 QUESTION: 1 What does Volume Shadow Copy provide?. A. backup to disks B. LUN duplication

More information

IBM Europe Announcement ZG , dated February 13, 2007

IBM Europe Announcement ZG , dated February 13, 2007 IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and

More information

S S SNIA Storage Networking Foundations

S S SNIA Storage Networking Foundations S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS

More information

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo Vendor: EMC Exam Code: E20-002 Exam Name: Cloud Infrastructure and Services Exam Version: Demo QUESTION NO: 1 In which Cloud deployment model would an organization see operational expenditures grow in

More information

Storage Area Networks SAN. Shane Healy

Storage Area Networks SAN. Shane Healy Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

Exam Name: Midrange Storage Technical Support V2

Exam Name: Midrange Storage Technical Support V2 Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018 EonStor GS Family Best Practices Guide White Paper Version: 1.1 Updated: Apr., 2018 Abstract: This guide provides recommendations of best practices for installation and configuration to meet customer performance

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

Architecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24

Architecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24 Architecture SAN architecture is presented in these chapters: SAN design overview on page 16 SAN fabric topologies on page 24 Fibre Channel routing on page 46 Fibre Channel over Ethernet on page 65 Architecture

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

IBM TotalStorage SAN Switch M12

IBM TotalStorage SAN Switch M12 High availability director supports highly scalable fabrics for large enterprise SANs IBM TotalStorage SAN Switch M12 High port density packaging saves space Highlights Enterprise-level scalability and

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

EMC Business Continuity for Microsoft Applications

EMC Business Continuity for Microsoft Applications EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All

More information

DATA PROTECTION IN A ROBO ENVIRONMENT

DATA PROTECTION IN A ROBO ENVIRONMENT Reference Architecture DATA PROTECTION IN A ROBO ENVIRONMENT EMC VNX Series EMC VNXe Series EMC Solutions Group April 2012 Copyright 2012 EMC Corporation. All Rights Reserved. EMC believes the information

More information

Configuring and Managing Virtual Storage

Configuring and Managing Virtual Storage Configuring and Managing Virtual Storage Module 6 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

IBM EXAM QUESTIONS & ANSWERS

IBM EXAM QUESTIONS & ANSWERS IBM 000-452 EXAM QUESTIONS & ANSWERS Number: 000-452 Passing Score: 800 Time Limit: 120 min File Version: 68.8 http://www.gratisexam.com/ IBM 000-452 EXAM QUESTIONS & ANSWERS Exam Name: IBM Storwize V7000

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions

Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions Benha University Final Exam (May 2017) Class: 4 th Year Students (CS) Subject: Elective Course (2) Faculty of Computers & Informatics Date: 28/05/2017 Time: 3 hours Examinar : Dr. Diaa Salama Instructions

More information

IBM TotalStorage SAN Switch F32

IBM TotalStorage SAN Switch F32 Intelligent fabric switch with enterprise performance for midrange and large storage networks IBM TotalStorage SAN Switch F32 High port density packaging helps save rack space Highlights Can be used as

More information

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter:

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter: Chapter 1 Windows Server 2008 Storage Services Microsoft Exam Objectives covered in this chapter: ÛÛConfigure storage. May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API,

More information

Fibre Channel Gateway Overview

Fibre Channel Gateway Overview CHAPTER 5 This chapter describes the Fibre Channel gateways and includes the following sections: About the Fibre Channel Gateway, page 5-1 Terms and Concepts, page 5-2 Cisco SFS 3500 Fibre Channel Gateway

More information

IBM TotalStorage SAN Switch F08

IBM TotalStorage SAN Switch F08 Entry workgroup fabric connectivity, scalable with core/edge fabrics to large enterprise SANs IBM TotalStorage SAN Switch F08 Entry fabric switch with high performance and advanced fabric services Highlights

More information

HP P6000 Enterprise Virtual Array

HP P6000 Enterprise Virtual Array HP P6000 Enterprise Virtual Array The HP P6000 Enterprise Virtual Array (P6000 EVA) is an enterprise class virtual storage array family for midsized organizations at an affordable price. With built in

More information

COSC6376 Cloud Computing Lecture 17: Storage Systems

COSC6376 Cloud Computing Lecture 17: Storage Systems COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for

More information

DELL EMC UNITY: BEST PRACTICES GUIDE

DELL EMC UNITY: BEST PRACTICES GUIDE DELL EMC UNITY: BEST PRACTICES GUIDE Best Practices for Performance and Availability Unity OE 4.5 ABSTRACT This white paper provides recommended best practice guidelines for installing and configuring

More information

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP: Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

FlexArray Virtualization

FlexArray Virtualization Updated for 8.3.2 FlexArray Virtualization Installation Requirements and Reference Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

As storage networking technology

As storage networking technology Chapter 10 Storage As storage networking technology matures, larger and complex implementations are becoming more common. The heterogeneous nature of storage infrastructures has further added to the complexity

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

IBM IBM Storage Networking Solutions Version 1.

IBM IBM Storage Networking Solutions Version 1. IBM 000-740 IBM Storage Networking Solutions Version 1 http://killexams.com/exam-detail/000-740 - disk storage subsystem with four (4) total ports - two (2) LTO3 tape drives to be attached Assuming best

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Vendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo

Vendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo Vendor: Hitachi Exam Code: HH0-130 Exam Name: Hitachi Data Systems Storage Fondations Version: Demo QUESTION: 1 A drive within a HUS system reaches its read error threshold. What will happen to the data

More information

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all Addendum / Corrigendum Dated 29/09/2017 Tender Ref No. - 236/387/DCCS/2010/IREDA/1 Dated: 22/09/2017 Name of Project - Supply Installation and Support Services of Data centers S. No. Document Reference

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

DELL EMC UNITY: HIGH AVAILABILITY

DELL EMC UNITY: HIGH AVAILABILITY DELL EMC UNITY: HIGH AVAILABILITY A Detailed Review ABSTRACT This white paper discusses the high availability features on Dell EMC Unity purposebuilt solution. October, 2017 1 WHITE PAPER The information

More information

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors

Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors White Paper Large SAN Design Best Practices Using Cisco MDS 9700 and MDS 9500 Multilayer Directors What You Will Learn As SANs continue to grow in size, many factors need to be considered to help scale

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

Vblock Architecture. Andrew Smallridge DC Technology Solutions Architect

Vblock Architecture. Andrew Smallridge DC Technology Solutions Architect Vblock Architecture Andrew Smallridge DC Technology Solutions Architect asmallri@cisco.com Vblock Design Governance It s an architecture! Requirements: Pretested Fully Integrated Ready to Go Ready to Grow

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Storage Update and Storage Best Practices for Microsoft Server Applications Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Agenda Introduction Storage Technologies Storage Devices

More information

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking

More information

Designing SAN Using Cisco MDS 9000 Series Fabric Switches

Designing SAN Using Cisco MDS 9000 Series Fabric Switches White Paper Designing SAN Using Cisco MDS 9000 Series Fabric Switches September 2016 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 15 Contents What You

More information

Vendor: IBM. Exam Code: Exam Name: IBM Midrange Storage Technical Support V3. Version: Demo

Vendor: IBM. Exam Code: Exam Name: IBM Midrange Storage Technical Support V3. Version: Demo Vendor: IBM Exam Code: 000-451 Exam Name: IBM Midrange Storage Technical Support V3 Version: Demo QUESTION NO: 1 On the Storwize V7000, which IBM utility analyzes the expected compression savings for an

More information

Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x

Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x Using EonStor DS Series iscsi-host storage systems with VMware vsphere 5.x Application notes Abstract These application notes explain configuration details for using Infortrend EonStor DS Series iscsi-host

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Storage Optimization with Oracle Database 11g

Storage Optimization with Oracle Database 11g Storage Optimization with Oracle Database 11g Terabytes of Data Reduce Storage Costs by Factor of 10x Data Growth Continues to Outpace Budget Growth Rate of Database Growth 1000 800 600 400 200 1998 2000

More information

EMC Celerra CNS with CLARiiON Storage

EMC Celerra CNS with CLARiiON Storage DATA SHEET EMC Celerra CNS with CLARiiON Storage Reach new heights of availability and scalability with EMC Celerra Clustered Network Server (CNS) and CLARiiON storage Consolidating and sharing information

More information

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

IBM To Resell Cisco Systems MDS 9000 Multilayer Switch and Director Family of Intelligent Storage Networking Products

IBM To Resell Cisco Systems MDS 9000 Multilayer Switch and Director Family of Intelligent Storage Networking Products Hardware Announcement February 17, 2003 IBM To Resell Cisco Systems MDS 9000 Multilayer Switch and Director Family of Intelligent Storage Networking Products Overview IBM announces the availability of

More information

vsphere Installation and Setup Update 2 Modified on 10 JULY 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vsphere Installation and Setup Update 2 Modified on 10 JULY 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 vsphere Installation and Setup Update 2 Modified on 10 JULY 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware website at:

More information

iscsi Target Usage Guide December 15, 2017

iscsi Target Usage Guide December 15, 2017 December 15, 2017 1 Table of Contents 1. Native VMware Availability Options for vsan 1.1.Native VMware Availability Options for vsan 1.2.Application Clustering Solutions 1.3.Third party solutions 2. Security

More information

As enterprise organizations face the major

As enterprise organizations face the major Deploying Flexible Brocade 5000 and 4900 SAN Switches By Nivetha Balakrishnan Aditya G. Brocade storage area network (SAN) switches are designed to meet the needs of rapidly growing enterprise IT environments.

More information

Building and Scaling BROCADE SAN Fabrics: Design and Best Practices Guide

Building and Scaling BROCADE SAN Fabrics: Design and Best Practices Guide Building and Scaling BROCADE SAN Fabrics: Design and Best Practices Guide 53-0001575-01 BROCADE Technical Note Page: 1 of 31 BROCADE SAN Integration and Application Department Last Updated March 29, 2001

More information

Assessing performance in HP LeftHand SANs

Assessing performance in HP LeftHand SANs Assessing performance in HP LeftHand SANs HP LeftHand Starter, Virtualization, and Multi-Site SANs deliver reliable, scalable, and predictable performance White paper Introduction... 2 The advantages of

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Data center requirements

Data center requirements Prerequisites, page 1 Data center workflow, page 2 Determine data center requirements, page 2 Gather data for initial data center planning, page 2 Determine the data center deployment model, page 3 Determine

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

Disaster Recovery-to-the- Cloud Best Practices

Disaster Recovery-to-the- Cloud Best Practices Disaster Recovery-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE

More information

SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U

SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER S.No. Features Qualifying Minimum Requirements No. of Storage 1 Units 2 Make Offered 3 Model Offered 4 Rack mount 5 Processor 6 Memory

More information

Traditional SAN environments allow block

Traditional SAN environments allow block Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance

More information

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup

More information

Symbols INDEX > 12-14

Symbols INDEX > 12-14 INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting

More information

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] s@lm@n EMC Exam E05-001 Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] EMC E05-001 : Practice Test Question No : 1 Which type of storage device does the X represent

More information

EMC Symmetrix DMX Series The High End Platform. Tom Gorodecki EMC

EMC Symmetrix DMX Series The High End Platform. Tom Gorodecki EMC 1 EMC Symmetrix Series The High End Platform Tom Gorodecki EMC 2 EMC Symmetrix -3 Series World s Most Trusted Storage Platform Symmetrix -3: World s Largest High-end Storage Array -3 950: New High-end

More information

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost

More information

Pass-Through Technology

Pass-Through Technology CHAPTER 3 This chapter provides best design practices for deploying blade servers using pass-through technology within the Cisco Data Center Networking Architecture, describes blade server architecture,

More information

Installation and Cluster Deployment Guide for VMware

Installation and Cluster Deployment Guide for VMware ONTAP Select 9 Installation and Cluster Deployment Guide for VMware Using ONTAP Select Deploy 2.8 June 2018 215-13347_B0 doccomments@netapp.com Updated for ONTAP Select 9.4 Table of Contents 3 Contents

More information

Dell EMC SAN Storage with Video Management Systems

Dell EMC SAN Storage with Video Management Systems Dell EMC SAN Storage with Video Management Systems Surveillance October 2018 H14824.3 Configuration Best Practices Guide Abstract The purpose of this guide is to provide configuration instructions for

More information

UCS-ABC. Cisco Unified Computing System Accelerated Boot Camp. Length: 5 Days. Format: Lecture/Lab. Course Version: 5.0. Product Version: 2.

UCS-ABC. Cisco Unified Computing System Accelerated Boot Camp. Length: 5 Days. Format: Lecture/Lab. Course Version: 5.0. Product Version: 2. UCS-ABC Why Firefly Length: 5 Days Format: Lecture/Lab Course Version: 5.0 Product Version: 2.1 This special course focuses on UCS Administration and Troubleshooting UCS Manager 2.0 and provides additional

More information

VMware vsphere Storage Appliance Installation and Configuration

VMware vsphere Storage Appliance Installation and Configuration VMware vsphere Storage Appliance Installation and Configuration vsphere Storage Appliance 1.0 vsphere 5.0 This document supports the version of each product listed and supports all subsequent versions

More information

Course CXS-203 Citrix XenServer 6.0 Administration

Course CXS-203 Citrix XenServer 6.0 Administration Course CXS-203 Citrix XenServer 6.0 Administration Overview In the Citrix XenServer 6.0 classroom training course, students are provided the foundation necessary to effectively install, configure, administer,

More information

IBM Storage Networking Solutions Version 2. Download Full Version :

IBM Storage Networking Solutions Version 2. Download Full Version : IBM 000-745 Storage Networking Solutions Version 2 Download Full Version : http://killexams.com/pass4sure/exam-detail/000-745 QUESTON: 119 What is the maximum size for a LUN that can be connected from

More information

vsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 WHITE PAPER Explosive data growth is a challenging reality for IT and data center managers. IDC reports that digital content

More information

Microsoft Office SharePoint Server 2007

Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Server 2007 Enabled by EMC Celerra Unified Storage and Microsoft Hyper-V Reference Architecture Copyright 2010 EMC Corporation. All rights reserved. Published May, 2010 EMC

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) By Hardik Jani 4/16/2009 1 Subtopics Need of Storage Area Networks What is SAN SAN Protocols Storage and Data Sharing SAN Backup SAN and Data Availability SAN Management 4/16/2009

More information

iscsi Unified Network Storage

iscsi Unified Network Storage iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,

More information

CompTIA Storage+ Powered by SNIA

CompTIA Storage+ Powered by SNIA CompTIA Storage+ Powered by SNIA http://snia.org/education/courses/training_tc Course Length: 1 day 9AM 5PM Course Fee: $395 USD Register: https://www.regonline.com/register/checkin.aspx?eventid=635346

More information

IBM IBM Open Systems Storage Solutions Version 4. Download Full Version :

IBM IBM Open Systems Storage Solutions Version 4. Download Full Version : IBM 000-742 IBM Open Systems Storage Solutions Version 4 Download Full Version : https://killexams.com/pass4sure/exam-detail/000-742 Answer: B QUESTION: 156 Given the configuration shown, which of the

More information

EMC CLARiiON CX3 Series FCP

EMC CLARiiON CX3 Series FCP EMC Solutions for Microsoft SQL Server 2005 on Windows 2008 EMC CLARiiON CX3 Series FCP EMC Global Solutions 42 South Street Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com www.emc.com Copyright 2008

More information

CXS-203-1I Citrix XenServer 6.0 Administration

CXS-203-1I Citrix XenServer 6.0 Administration 1800 ULEARN (853 276) www.ddls.com.au CXS-203-1I Citrix XenServer 6.0 Administration Length 5 days Price $5115.00 (inc GST) Overview In the Citrix XenServer 6.0 classroom training course, students are

More information

IBM and BROCADE Building the Data Center of the Future with IBM Systems Storage, DCF and IBM System Storage SAN768B Fabric Backbone

IBM and BROCADE Building the Data Center of the Future with IBM Systems Storage, DCF and IBM System Storage SAN768B Fabric Backbone IBM and BROCADE Building the Data Center of the Future with IBM Systems Storage, DCF and IBM System Storage SAN768B Fabric Backbone Uma Thana Balasingam Regional OEM Sales manager IBM & Brocade A History

More information

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information