Emc 020-001 (Practice) Storage Foundations Exam By

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jmiller
J
Jmiller
Community Contributor
Quizzes Created: 1 | Total Attempts: 352
| Attempts: 377
SettingsSettings
Please wait...
  • 1/195 Questions

    Which key requirement of the Data Center infrastructure addresses the concern of data on storage systems being accessible 24X7? 

    • Availability
    • Manageability
    • Performance
    • Scalability
Please wait...
Emc 020-001 (Practice) Storage Foundations Exam By - Quiz
About This Quiz

EMC fundamentals - foundation for all other EMC exams.
I'm not the orignal author. I've merely taken what was available on the internet and put it up on this website for flash card use. I may add to it from time to time and grow it. Or users can email me questions to add to it.
USE at your own risk. . . IF YOU EVEN THINK an answer is incorrect - LOOK IT UP. . . In your book. This practice test is about learning the material and not remembering question and answer responses. Understand expecially the math calc problems.


Quiz Preview

  • 2. 

    What are the five core elements of the data center infrastructure? 

    • Applications, Databases, JBOD, Networks, Storage Arrays

    • Applications, Databases, Servers/Operating Systems, DAS, NAS

    • Applications, Databases, Servers/Operating Systems, Networks, Storage Arrays

    • Applications, Databases, Servers/Operating Systems, SAN, JBOD

    Correct Answer
    A. Applications, Databases, Servers/Operating Systems, Networks, Storage Arrays
    Explanation
    The five core elements of the data center infrastructure are applications, databases, servers/operating systems, networks, and storage arrays. These elements are crucial components that work together to support the operation and management of the data center. Applications refer to the software programs and systems used to perform specific tasks or functions. Databases store and manage large amounts of structured data. Servers/operating systems provide the computing power and software environment for running applications. Networks facilitate communication and data transfer between various components. Storage arrays are used to store and manage data in a centralized and scalable manner.

    Rate this question:

  • 3. 

    Which feature can multi-pathing software provide? 

    • Load balancing

    • LUN masking

    • Port zoning

    • Write coalescing

    Correct Answer
    A. Load balancing
    Explanation
    Multi-pathing software can provide load balancing, which is the process of distributing network traffic evenly across multiple paths or links. This helps to optimize the utilization of available resources and ensures that no single path becomes overwhelmed with traffic. By distributing the workload across multiple paths, load balancing improves performance, increases fault tolerance, and enhances overall system reliability.

    Rate this question:

  • 4. 

    Which statement is true about iSCSI names? 

    • Every initiator or target has a unique iSCSI name

    • ISCSI name is derived from the IP address

    • Only the target requires and iSCSI name

    • Only an initiator requires an iSCSI name

    Correct Answer
    A. Every initiator or target has a unique iSCSI name
    Explanation
    Every initiator or target in an iSCSI network is assigned a unique iSCSI name. This unique identifier helps in distinguishing and addressing each initiator or target device in the network. The iSCSI name is not derived from the IP address, and both initiators and targets require an iSCSI name. Therefore, the statement that every initiator or target has a unique iSCSI name is true.

    Rate this question:

  • 5. 

    What is the process of dividing a disk into logical containers? 

    • Logical Block addressing

    • Partitioning

    • Sectoring

    • Zoned-bit recording

    Correct Answer
    A. Partitioning
    Explanation
    Partitioning is the process of dividing a disk into logical containers. This allows the disk to be divided into separate sections, each with its own file system, allowing for better organization and management of data. Partitioning also enables the use of multiple operating systems on a single disk, as each partition can be dedicated to a specific operating system.

    Rate this question:

  • 6. 

    What are three requirements of storage systems? 

    • Availability, Capacity, Scalability

    • Compliance, Capacity, Scalability

    • Maintenance, Security, Utilization

    • Performance, Utilization, Data Integrity

    Correct Answer
    A. Availability, Capacity, Scalability
    Explanation
    Storage systems require availability to ensure that data can be accessed when needed, capacity to store large amounts of data, and scalability to accommodate future growth and increased storage needs. Compliance, maintenance, security, performance, utilization, and data integrity are also important factors in storage systems, but they are not listed as requirements in this question.

    Rate this question:

  • 7. 

    Which sequence of activities describes a read cache hit?  1. Read data is sent to the host 2. Host sends read request to storage system 3. Cache is searched, and data is found 

    • 1, 2, 3

    • 1, 3, 2

    • 2, 3, 1

    • 3, 1, 2

    Correct Answer
    A. 2, 3, 1
  • 8. 

     Which service is used by SCSI intitiators to discover targets? 

    • DNS

    • ISNS

    • NIS

    • WINS

    Correct Answer
    A. ISNS
    Explanation
    iSNS (Internet Storage Name Service) is the service used by SCSI initiators to discover targets. iSNS is a protocol that allows devices in a storage area network (SAN) to discover and communicate with each other. It provides a centralized registry for storing and retrieving information about storage devices, including their names, addresses, and capabilities. SCSI initiators use iSNS to discover the available targets in the SAN and establish connections with them. DNS (Domain Name System) is a service used for translating domain names into IP addresses, NIS (Network Information Service) is a directory service used in UNIX-like operating systems, and WINS (Windows Internet Name Service) is a service used for name resolution in Windows networks.

    Rate this question:

  • 9. 

    What is a physical component of a storage environment

    • App

    • BUS

    • Operating System

    • Protocol

    Correct Answer
    A. BUS
    Explanation
    A physical component of a storage environment is a BUS. A BUS refers to a communication system that allows different components of a computer system to transfer data between each other. In the context of a storage environment, a BUS is responsible for connecting storage devices, such as hard drives or solid-state drives, to the rest of the computer system. It provides a pathway for data to be transferred to and from the storage devices, allowing the operating system and other components to access and manipulate the stored data.

    Rate this question:

  • 10. 

    A disk is divided into three LUNs. One LUN is presented to a host. How does this LUN appear to the host? 

    • As a mirrored pair

    • As a mirrored set

    • As a RAID array

    • As a single disk

    Correct Answer
    A. As a single disk
    Explanation
    When a disk is divided into multiple Logical Unit Numbers (LUNs), each LUN appears as a separate and independent disk to the host. Therefore, when one LUN is presented to the host, it appears as a single disk. The host is not aware of the other LUNs or any underlying configuration such as mirroring or RAID arrays. It simply sees and interacts with the presented LUN as if it were a standalone disk.

    Rate this question:

  • 11. 

    Which technology supports high availability of data?

    • Caching

    • Clustering

    • Flushing

    • Journaling

    Correct Answer
    A. Clustering
    Explanation
    Clustering is a technology that supports high availability of data. It involves grouping multiple servers together to work as a single system, providing redundancy and failover capabilities. In a clustered environment, if one server fails, another server in the cluster takes over the workload, ensuring continuous availability of data. Clustering also allows for load balancing, where the workload is distributed across multiple servers to improve performance and prevent any single point of failure. Therefore, clustering is the correct answer for supporting high availability of data.

    Rate this question:

  • 12. 

    Which statement describes logical volumes? 

    • May be partition of a larger physical disk

    • May be presented to a host as several larger physical disks

    • May consist of interleaved physical disk

    • May consist of several file systems

    Correct Answer
    A. May be partition of a larger physical disk
    Explanation
    Logical volumes can be a partition of a larger physical disk. This means that a logical volume can be created by dividing a single physical disk into multiple partitions, each of which can be independently managed and accessed. This allows for more efficient and flexible utilization of storage space, as different logical volumes can have different sizes and file systems.

    Rate this question:

  • 13. 

    Which component in an EMC Symmetrix Array provides physical connectivity to hosts

    • Back-end adapter

    • Cache

    • Front-end adapter

    • Storage Processor

    Correct Answer
    A. Front-end adapter
    Explanation
    The front-end adapter in an EMC Symmetrix Array is responsible for providing physical connectivity to hosts. It acts as an interface between the storage processor and the host, allowing data to be transferred between them. The front-end adapter handles the communication protocols and ensures that the data is transmitted accurately and efficiently.

    Rate this question:

  • 14. 

    Which host component is the high speed interconnect between the Central Processing Unit and memory? 

    • BIOS

    • BUS

    • NIC

    • PORT

    Correct Answer
    A. BUS
    Explanation
    The high-speed interconnect between the Central Processing Unit (CPU) and memory is known as the BUS. The BUS allows for the transfer of data between the CPU and memory, enabling efficient communication and data processing. It acts as a pathway for the CPU to access and retrieve information from the memory, ensuring smooth and fast operation of the system.

    Rate this question:

  • 15. 

    Which type of front-end port is found on an intelligent storage system used in a SAN?

    • ATA

    • EIDE

    • FC

    • SCSI

    Correct Answer
    A. FC
    Explanation
    FC stands for Fibre Channel, which is a type of front-end port commonly found on intelligent storage systems used in a Storage Area Network (SAN). Fibre Channel is a high-speed network technology that allows for fast and reliable data transfer between servers and storage devices. It provides a scalable and flexible solution for connecting storage systems to servers in a SAN environment. ATA, EIDE, and SCSI are other types of front-end ports, but they are not typically used in SANs.

    Rate this question:

  • 16. 

    What does partitioning do to a physical disk?

    • Concatenates the disk together with other disks

    • Divides a disk into logical containers

    • Mirrors the disk

    • Presents the disk as one logical volume

    Correct Answer
    A. Divides a disk into logical containers
    Explanation
    Partitioning a physical disk involves dividing it into logical containers. This allows the disk to be organized into separate sections, each with its own file system and storage space. Partitioning enables the disk to be used more efficiently by allowing different types of data to be stored in separate areas. It also allows for easier management and organization of files and data on the disk.

    Rate this question:

  • 17. 

    You want to ensure that your storage solution can grow with your business. Which requirement of storage systems applies to this goal? 

    • Availability

    • Manageability

    • Performance

    • Scalability

    Correct Answer
    A. Scalability
    Explanation
    Scalability is the requirement of storage systems that applies to the goal of ensuring that the storage solution can grow with the business. Scalability refers to the ability of a system to handle increasing amounts of work, data, or users without compromising performance or functionality. In the context of storage systems, scalability means that the system can easily accommodate additional storage capacity as the business grows, allowing for seamless expansion without disruption or the need for significant infrastructure changes.

    Rate this question:

  • 18. 

    When is it necessary to hold application I/O to ensure a consistent copy

    • Just after creating a point in time replica

    • Just before creating a point in time replica

    • Only when an app spans multiple hosts

    • Only when an app spans multiple storage arrays

    Correct Answer
    A. Just before creating a point in time replica
    Explanation
    When creating a point in time replica, it is necessary to hold application I/O just before the creation to ensure a consistent copy. This is because any ongoing I/O operations during the creation process can lead to inconsistencies in the replica. By holding the application I/O, any changes made to the data will be completed, and the replica will accurately reflect the state of the application at that specific point in time.

    Rate this question:

  • 19. 

    What does partitioning do?

    • Divides a logical disk into physical volumes

    • Divides a logical disk into physical zones

    • Divides a physical disk in logical volumes

    • Divides a physical disk in logical zones

    Correct Answer
    A. Divides a physical disk in logical volumes
    Explanation
    Partitioning is the process of dividing a physical disk into logical volumes. This allows the disk to be divided into separate sections, each with its own file system and storage capacity. By partitioning a disk, it becomes easier to organize and manage data, as well as improve performance and security. Each logical volume can be treated as a separate entity, with its own file system and access controls, making it easier to allocate and manage storage space.

    Rate this question:

  • 20. 

    What is a benefit of SAN? 

    • Enables centralized provisioning and management of storage resources

    • Leverages existing investment in DAS hardware

    • Provides file level access

    • Simplifies management by enforcing a "one storage volume per host" model

    Correct Answer
    A. Enables centralized provisioning and management of storage resources
    Explanation
    SAN, or Storage Area Network, provides a benefit of enabling centralized provisioning and management of storage resources. This means that administrators can easily allocate and manage storage resources from a central location, making it more efficient and convenient. This centralized approach allows for better organization and control over storage, leading to improved performance and easier troubleshooting. It also simplifies the process of adding or removing storage devices, as well as optimizing storage utilization. Overall, SAN helps streamline storage management, saving time and effort for administrators.

    Rate this question:

  • 21. 

    What is a benefit of reporting on storage arrays? 

    • Configuring RAID

    • Creating authorization rules

    • Planning for capacity

    • Determining file system shares

    Correct Answer
    A. Planning for capacity
    Explanation
    Reporting on storage arrays allows organizations to monitor and analyze their storage capacity usage over time. This information is crucial for planning and forecasting future storage needs, ensuring that the organization has enough storage space to accommodate its data growth. By tracking storage capacity, organizations can identify potential bottlenecks, optimize storage resources, and make informed decisions about when to upgrade or expand their storage infrastructure. This helps prevent unexpected storage shortages or overprovisioning, ultimately improving the overall efficiency and cost-effectiveness of the storage environment.

    Rate this question:

  • 22. 

    What is the role of a bus? 

    • Control point for all host activities and resources

    • Device for storing data

    • High speed interconnect among CPU, memory, and disks

    • Temporary location for commands and data

    Correct Answer
    A. High speed interconnect among CPU, memory, and disks
    Explanation
    A bus is a high-speed interconnect that facilitates communication and data transfer between the CPU, memory, and disks in a computer system. It acts as a pathway or channel through which information can flow between these components, enabling efficient data transfer and synchronization. The bus ensures that data can be quickly and accurately exchanged between the different parts of the system, allowing for smooth and efficient operation.

    Rate this question:

  • 23. 

    What is a benefit of a NAS Solution? 

    • Enables the ability to share data across platforms

    • Improved network Bandwidth

    • Improved network performance

    • Introduces block level I/O to the networked environment

    Correct Answer
    A. Enables the ability to share data across platforms
    Explanation
    A benefit of a NAS solution is that it enables the ability to share data across platforms. This means that data can be accessed and shared by different devices and operating systems, allowing for seamless collaboration and increased productivity. This is particularly useful in environments where there are multiple devices and platforms in use, as it eliminates the need for data transfer or conversion between different systems.

    Rate this question:

  • 24. 

    A Celerra system is servicing NAS clients over two Data Movers that are configured Primary/Primary. The Control Station fails. How does this failure impact data access? 

    • Temporary loss of data access, since both Data Movers must reboot

    • Temporary loss of data access, while the system reconfigures to Primary/Standby

    • There is no impact

    • Total loss of data access

    Correct Answer
    A. There is no impact
    Explanation
    The failure of the Control Station does not impact data access in this scenario because the Data Movers are configured as Primary/Primary. This means that both Data Movers are actively servicing NAS clients and can continue to do so even if the Control Station fails. The Data Movers do not need to reboot or reconfigure to maintain data access. Therefore, there is no impact on data access.

    Rate this question:

  • 25. 

    Which statement describes the iSCSI protocol? 

    • ATA over SCSI

    • IP over SCSI

    • SCSI over ATA

    • SCSI over IP

    Correct Answer
    A. SCSI over IP
    Explanation
    The iSCSI protocol is a storage networking standard that allows SCSI commands to be sent over an IP network. It enables the use of IP networks to connect storage devices, such as disk arrays, to servers. This allows for the consolidation and centralization of storage resources, making it easier to manage and allocate storage in a networked environment. By using the iSCSI protocol, organizations can leverage their existing IP infrastructure to access and utilize storage resources efficiently.

    Rate this question:

  • 26. 

    Which storage method will make data most accessible?

    • JukeBox

    • Magnetic Disk

    • Optical Disk

    • Tape

    Correct Answer
    A. Magnetic Disk
    Explanation
    The magnetic disk is the most accessible storage method among the options given. This is because magnetic disks, such as hard disk drives (HDDs), provide fast and direct access to data. They have a low latency and high data transfer rate, allowing for quick retrieval and processing of information. Additionally, magnetic disks offer random access, meaning that data can be accessed in any order without the need to sequentially read through the entire storage medium. This makes magnetic disks highly efficient and suitable for applications that require frequent and immediate access to data.

    Rate this question:

  • 27. 

    What is a requirement for a client initiated restore?

    • Backup Catalogs must be available

    • Backup device must be a disk

    • Must be initiated through CLI

    • Separate storage node must exist

    Correct Answer
    A. Backup Catalogs must be available
    Explanation
    In order for a client initiated restore to take place, the backup catalogs must be available. This is because the backup catalogs contain the necessary information about the backed up data, such as the location and timestamps. Without access to the backup catalogs, the client would not be able to identify and retrieve the specific data they want to restore.

    Rate this question:

  • 28. 

    Which protocol is used by a host to access block level storage over IP

    • CIFS

    • Ifiniband

    • NFS

    • ISCSI

    Correct Answer
    A. ISCSI
    Explanation
    iSCSI is the correct answer because it is a protocol that allows a host to access block level storage over IP. iSCSI stands for Internet Small Computer System Interface and it enables the transmission of SCSI commands over IP networks. This protocol is commonly used in storage area networks (SANs) to connect servers to storage devices, providing a way for the host to access and manage block-level storage remotely.

    Rate this question:

  • 29. 

    What is a disadvantage of JBOD versus disk arrays? 

    • Access is slow

    • Data is unprotected

    • Disks cannot be independently addressed by the server

    • Storage capacity is lower

    Correct Answer
    A. Data is unprotected
    Explanation
    JBOD (Just a Bunch Of Disks) is a storage configuration where multiple disks are combined into a single logical unit. One disadvantage of JBOD compared to disk arrays is that data is unprotected. In a JBOD setup, there is no redundancy or fault tolerance, meaning that if one disk fails, all the data stored on that disk will be lost. In contrast, disk arrays typically use RAID configurations to provide data protection by replicating data across multiple disks.

    Rate this question:

  • 30. 

    Which represents a common implementation of a storage network with limited scalability? 

    • CSMA/CD

    • Fiber Channel Arbitrated Loop

    • Store and Forward

    • Switched Fabric

    Correct Answer
    A. Fiber Channel Arbitrated Loop
    Explanation
    Fiber Channel Arbitrated Loop represents a common implementation of a storage network with limited scalability. In this network architecture, devices are connected in a loop, and data is transmitted in a sequential manner. However, only one device can transmit data at a time, causing potential bottlenecks and limited scalability. This is in contrast to Switched Fabric, where devices are connected to a central switch, allowing for simultaneous data transmission and greater scalability.

    Rate this question:

  • 31. 

    What is the basic unit of storage in a CAS implementation

    • Block

    • File

    • Frame

    • Object

    Correct Answer
    A. Object
    Explanation
    In a CAS (Content Addressable Storage) implementation, the basic unit of storage is an object. CAS is a data storage architecture that stores and retrieves data based on its content rather than its location. In this system, each object is assigned a unique identifier based on its content, and this identifier is used to retrieve the object when needed. Therefore, an object is the fundamental unit of storage in a CAS implementation.

    Rate this question:

  • 32. 

    What is a cache dirty bit flag? 

    • Changed data not yet written to disk

    • Changed data written to disk

    • Data read from disk but not yet accessed by the host

    • Data requested by the host but not yet fetched

    Correct Answer
    A. Changed data not yet written to disk
    Explanation
    A cache dirty bit flag is a marker that indicates whether the data in the cache has been modified since it was last written to disk. In this case, the correct answer is "Changed data not yet written to disk." This means that the data in the cache has been modified, but those changes have not been saved to the disk yet.

    Rate this question:

  • 33. 

    What is a disadvantage of synchronous remote replication compared to other methods of remote replication?

    • Need to disk buffer space

    • Need for time stamping writes

    • Potential for data loss

    • Response time elongation

    Correct Answer
    A. Response time elongation
    Explanation
    Synchronous remote replication is a method of replicating data in real-time to a remote location. However, one disadvantage of this method is that it can cause response time elongation. This means that the time it takes for a system to respond to a request or command may increase, leading to slower performance. This can be a drawback compared to other methods of remote replication that may not have this issue.

    Rate this question:

  • 34. 

    What failure does RAID protect against 

    • Disk Loss

    • Host Bus Adapter failures

    • Host failures

    • Switch Failures

    Correct Answer
    A. Disk Loss
    Explanation
    RAID (Redundant Array of Independent Disks) is a data storage technology that protects against disk loss. It achieves this by distributing data across multiple disks, so that if one disk fails, the data can still be accessed from the remaining disks. RAID provides fault tolerance and data redundancy, ensuring that data is not lost in the event of a disk failure. Therefore, it protects against the failure of individual disks within a storage system.

    Rate this question:

  • 35. 

    Why do array based local replication technologies track changes made to source and target devices after the creation of a replica?

    • Faster initial synchronization

    • Faster re-synchronization

    • To allow multiple replicas

    • To lower RTO

    Correct Answer
    A. Faster re-synchronization
    Explanation
    Array based local replication technologies track changes made to source and target devices after the creation of a replica to enable faster re-synchronization. By tracking these changes, the replication technology can identify and replicate only the modified data, rather than replicating the entire dataset. This significantly reduces the time and resources required for re-synchronization, allowing for quicker recovery and minimizing downtime.

    Rate this question:

  • 36. 

    Which tool can be used to view the logical and physical topology of an MDS SAN?

    • Device manager

    • EWS

    • Fabric manager

    • Switch manager

    Correct Answer
    A. Fabric manager
    Explanation
    Fabric manager is the correct answer because it is a tool specifically designed to view the logical and physical topology of a SAN (Storage Area Network) in an MDS (Multilayer Director Switch) environment. It provides a comprehensive overview of the SAN infrastructure, including the connections between switches, the storage devices, and the hosts. With fabric manager, administrators can easily monitor and manage the SAN, troubleshoot issues, and optimize performance. Device manager, EWS, and switch manager are not specifically tailored for viewing the topology of an MDS SAN, making them incorrect choices.

    Rate this question:

  • 37. 

    Many FCAL nodes are attempting to simultaneously send I/O to a storage array. How is control of the loop determined? 

    • Hub by-pass circuit

    • Hub name service

    • Node that owns the token

    • Node with highest priority

    Correct Answer
    A. Node with highest priority
    Explanation
    The control of the loop is determined by the node with the highest priority. In this scenario, when multiple FCAL nodes are attempting to send I/O to a storage array simultaneously, the node with the highest priority will have control over the loop. This means that it will have the authority to send its I/O requests first, while the other nodes will have to wait for their turn based on their priority levels.

    Rate this question:

  • 38. 

    You need to consolidate a storage environment. The applications require high bandwidth and block level I/O. Which storage solution best meets these requirements?

    • CAS

    • DAS

    • NAS

    • SAN

    Correct Answer
    A. SAN
    Explanation
    A Storage Area Network (SAN) is the best solution for consolidating a storage environment that requires high bandwidth and block level I/O. SANs are specifically designed to provide fast and efficient data transfer between servers and storage devices, making them ideal for applications that require high performance and low latency. CAS (Content Addressable Storage) is primarily used for data archiving and retrieval, DAS (Direct Attached Storage) is a simple storage solution directly connected to a single server, and NAS (Network Attached Storage) is optimized for file-level access over a network. None of these options are as suitable as SAN for the given requirements.

    Rate this question:

  • 39. 

    What are the four components of an intelligent storage system? 

    • Back-end, cache, front-end, physical disks

    • Back-end, cache, switch, physical disks

    • Back-end, disk cache, front-end, physical disks

    • Back-end, disk cache, front-end, logical disks

    Correct Answer
    A. Back-end, cache, front-end, physical disks
    Explanation
    An intelligent storage system consists of four components: back-end, cache, front-end, and physical disks. The back-end is responsible for handling the communication between the storage system and the host system. The cache component stores frequently accessed data to improve performance. The front-end is responsible for handling the communication between the storage system and the client system. Lastly, the physical disks are the actual storage devices where the data is stored.

    Rate this question:

  • 40. 

    What is a valid member of a zone in a SAN? 

    • A Domain ID

    • A HBA WWPN

    • The IP address of a host

    • The serial number of a storage array

    Correct Answer
    A. A HBA WWPN
    Explanation
    A valid member of a zone in a Storage Area Network (SAN) is a Host Bus Adapter (HBA) World Wide Port Name (WWPN). In a SAN, a zone is a logical grouping of devices that are allowed to communicate with each other. The HBA WWPN is a unique identifier assigned to each HBA in a SAN, and it is used to establish connections and control access between devices within a zone. Therefore, a valid member of a zone in a SAN would be an HBA WWPN.

    Rate this question:

  • 41. 

    If site A is 1000 miles (1600 km) away from site B, which method is NOT suitable for remotely replicating data from A to B? 

    • Asynchronous

    • Extended distance consistent PIT

    • Log shipping

    • Synchronous

    Correct Answer
    A. Synchronous
    Explanation
    Synchronous replication requires a continuous and consistent connection between the two sites in order to replicate data in real-time. However, since site A and site B are 1000 miles (1600 km) away, it is not feasible to maintain a stable and low-latency connection over such a long distance. Therefore, synchronous replication is not suitable for remotely replicating data from site A to site B in this scenario.

    Rate this question:

  • 42. 

    What is the correct order of operations for array based synchronous replication? A. Write is received by the source array from host/server B. Remote array sends acknowledgement to the source array C. Source array signals write complete to host/server D. Write is transmitted by source array to the remote array 

    • A, B, C, D

    • A, D, B, C

    • C, D, B, A

    • D, C, B, A

    Correct Answer
    A. A, D, B, C
  • 43. 

    You are planning for disaster recovery of your backup and recovery environment. Which backup server component must be included? 

    • Catalog

    • Device configuration

    • Log files

    • Reports

    Correct Answer
    A. Catalog
    Explanation
    In disaster recovery planning for a backup and recovery environment, the catalog is a crucial component that must be included. The catalog contains metadata about the backup data, such as file names, locations, and timestamps. It helps in tracking and managing the backup data, allowing for efficient and accurate recovery in case of a disaster. Without the catalog, it would be challenging to identify and restore the necessary backup data, making the disaster recovery process more time-consuming and prone to errors.

    Rate this question:

  • 44. 

    What are the physical ports that interconnect two FC switches referred to as? 

    • E_Ports

    • F_Ports

    • G_Ports

    • N_Ports

    Correct Answer
    A. E_Ports
    Explanation
    E_Ports are the physical ports that interconnect two FC switches. These ports are used for establishing an inter-switch link (ISL) between the switches. ISLs allow for communication and data transfer between the switches, enabling the creation of larger storage networks. E_Ports are typically used in Fibre Channel (FC) SAN environments and provide high-speed connectivity between switches.

    Rate this question:

  • 45. 

    What is a logical component of a storage environment?

    • BUS

    • DISK

    • FileSystem

    • Memory

    Correct Answer
    A. FileSystem
    Explanation
    A logical component of a storage environment is the FileSystem. A FileSystem is responsible for organizing and managing the storage of data on a disk. It provides a structured way to store, retrieve, and manage files and directories. It determines how data is stored, accessed, and organized on the storage device. The FileSystem ensures that data is stored in a logical and efficient manner, allowing for easy retrieval and manipulation of files and folders.

    Rate this question:

  • 46. 

    What does a Domain ID identify?

    • A management server within a fabric

    • A primary server within a fabric

    • A storage array within a fabric

    • A switch within a fabric

    Correct Answer
    A. A switch within a fabric
    Explanation
    A Domain ID identifies a switch within a fabric. In a fabric network, multiple switches are connected together to form a unified network. Each switch is assigned a unique Domain ID, which helps in identifying and addressing the switch within the fabric. The Domain ID allows for efficient communication and management of the switches within the fabric network.

    Rate this question:

  • 47. 

    Which technology is designed for storage of fixed content data?

    • CAS

    • DAS

    • NAS

    • SAN

    Correct Answer
    A. CAS
    Explanation
    CAS stands for Content Addressable Storage, which is a technology specifically designed for the storage of fixed content data. CAS uses a unique identifier or address to store and retrieve data, making it ideal for storing data that does not change frequently or at all. This technology ensures data integrity and immutability, making it suitable for compliance and regulatory requirements. Unlike other storage technologies like DAS, NAS, and SAN, CAS provides a secure and efficient way to store and manage fixed content data.

    Rate this question:

  • 48. 

    Which Data Center element stores customer and product information when the server is connected to an array? 

    • Application

    • Database

    • Server

    • Storage Array

    Correct Answer
    A. Database
    Explanation
    When a server is connected to an array, the element responsible for storing customer and product information is the database. A database is a structured collection of data that is organized, managed, and accessed in a way that allows for efficient storage, retrieval, and modification. It is specifically designed to handle large volumes of data and provide a reliable and secure storage solution. Therefore, in this scenario, the database would be the most suitable element for storing customer and product information.

    Rate this question:

  • 49. 

    What do you monitor as part of server performance? 

    • File system utilization

    • HBA status

    • Memory utilization

    • Power supply status

    Correct Answer
    A. Memory utilization
    Explanation
    As part of monitoring server performance, memory utilization is an important factor to consider. Memory is a crucial resource for running applications and processes on a server. Monitoring memory utilization helps to ensure that the server has enough memory available to handle the workload efficiently. By tracking memory usage, administrators can identify any potential memory leaks or excessive memory consumption that may lead to performance issues or system crashes. Monitoring memory utilization allows for proactive management and optimization of server resources, ensuring smooth and uninterrupted operation.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 03, 2012
    Quiz Created by
    Jmiller
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.