Pass the SNIA SCSE S10-210 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Click the Exhibit button.

Question # 21

The customer application requires a 50/50 R/W ratio with 100 MBps throughput requirements for each direction of the link. The application servers will simultaneously sustain these data rates across all LUNs in parallel.

Referring to the exhibit, where will the oversubscribed link(s) occur?

Options:

A.

Links between hosts and Switch A


B.

Inter-switch link between Switch A and Switch B


C.

Inter-switch link between Switch B and Switch C


D.

Links between Switch C and storage


Expert Solution
Questions # 22:

A company wants to implement a database which requires a storage subsystem with no more than 2 ms write latency and 1 ms read latency.

Which type of drive would you use?

Options:

A.

SATA


B.

FC


C.

SSD


D.

ATA


Expert Solution
Questions # 23:

A server has lost half of its paths to its LUN on a storage system. The help desk determines that one of the two HBAs was just replaced. The SAN administrator has modified the zoning with the new WWPN of the replacement HBA port, but the missing paths have still not recovered.

Which action would you perform next?

Options:

A.

Rescan disks on the server.


B.

Reconfigure persistent binding on the server.


C.

Reboot the server.


D.

Modify the host definitions for LUN masking on the storage system.


Expert Solution
Questions # 24:

A security audit reveals deficiencies in your company's FC zoning practices. Your manager asks you to make a recommendation to implement the most secure FC zoning possible. Your company is using switches from a single vendor.

What do you recommend?

Options:

A.

All zones should use frame-based hardware enforcement using pWWN identification exclusively for all configurations.


B.

All zones should use software-based enforcement using pWWN identification exclusively for all configurations.


C.

All zones should use frame-based hardware enforcement using destination port identification exclusively for all configurations.


D.

All zones should use software-based enforcement using destination port identification exclusively for all configurations.


Expert Solution
Questions # 25:

Which storage related offering serves as intermediaries to multiple cloud storage providers?

Options:

A.

Cloud storage provider


B.

Cloud storage broker


C.

Cloud storage gateway


D.

Cloud storage shifting


Expert Solution
Questions # 26:

You have been hired to consult with storage administrators that are working with zoning and naming convention consistency issues. There are numerous types of zoning methods available using standards that also include aliasing. You want to use a method that guarantees unique global port identification.

What accomplishes this goal?

Options:

A.

WWPN


B.

domain_id:port_#


C.

Alias


D.

Zone set


Expert Solution
Questions # 27:

Your company performs a full backup of a database server every Saturday night and incremental nightly backups for each day of the week thereafter. It takes 14 hours to perform a restore from a full backup and averages two hours for each incremental restore. The database server fails on Wednesday at 10:10 AM and needs to be fully restored.

What it is the RTO?

Options:

A.

16 hours


B.

18 hours


C.

20 hours


D.

22 hours


Expert Solution
Questions # 28:

You have received an emergency call from the night shift after they attempted to merge three small SANs in the engineering department. Once completed, all devices in SANs A and B communicate with one another but SAN C could not communicate with either of the other SANs because the fabric has become segmented.

Which statement is correct?

Options:

A.

The port is isolated until a fabric rebuild occurs,


B.

The port is isolated until a fabric re-configuration occurs.


C.

The system administrator must manually correct the issue that caused segmentation (port isolation) and then start the Build Fabric (BF) process.


D.

The system administrator must manually correct the issue that caused port isolation (segmentation) and then start the Reconfiguration Fabric (RCF) process.


Expert Solution
Questions # 29:

You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.

Which data protection method should be used in this case?

Options:

A.

Encrypting data-in-flight


B.

Encrypting data-at-rest


C.

Password protect each file


D.

Use file permissions


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions