A SAN environment with zones containing a large number of members is experiencing hosts randomly, losing connectivity to SAN-attached storage resources. You have been asked by the customer to address this situation.
Which action should you implement to resolve this issue?
You want to prevent unauthorized switches from connecting to your company's fabrics.
What should you do?
After the storage administrator merged two multi-vendor FC SANs, an error indicates that two ports have become isolated causing a segmentation to exist in the fabric.
Which two events would cause this? (Choose two.)
You have been asked to implement a remote data replication scheme. The current data center is mostly constructed of FC components and the corporation is highly invested in the technology. The remote data center needs a synchronous replication solution.
What will accomplish this goal?
You are asked to set up a server to boot from a SAN.
Which setting on the HBA needs to be configured?
You have two new FC switches from the same vendor and want to connect them together. You have ensured that the domain IDs are unique, switch names are unique, and the firmware levels are identical. When you connect the ISL cables from one switch to the other, the fabric does not merge.
What should be confirmed?
A number of servers are experiencing slower than expected performance. Analyzing the server, switch, and storage logs do not indicate any issues. You have been asked by the customer to address this issue.
What will improve performance?
You have received an emergency call from the night shift after they attempted to merge three small SANs in the engineering department. Once completed, all devices in SANs A and B communicate with one another but SAN C could not communicate with either of the other SANs because the fabric has become segmented.
Which statement is correct?
You are designing a security solution for a storage array which stores customer credit card information. Data on the storage array must be encrypted and if necessary, you want to be able to revoke access to data on demand.
In addition to encryption, which solution would allow you to do this in a secure and automated fashion?
Click the Exhibit button.
Referring to the exhibit, what are the two largest risks to a highly available solution? (Choose two.)
After provisioning a new LUN to a host, new storage cannot be detected on the host. Which three actions should be performed to troubleshoot this problem? (Choose three.)
What is the maximum distance between two 8 Gb FC ports that can be connected using 50 µOM3 grade multimode fiber cable?
Some business critical database applications have been suffering from slowly increasing performance issues with one enterprise SAN-attached storage system. In particular, the applications are showing higher than normal read response times.
What should the storage administrator monitor to determine the root cause?
Only one of many servers is suffering poor performance with a nearline (Tier 2) storage system. The server administrator has not discovered any obvious root cause. The server has multiple paths to the storage system but only one path is active. Routine monitoring by the storage administrator has determined that a single storage port has received a high number of bad frames.
What should the SAN administrator do?
Click the Exhibit button.
Referring to the exhibit, which three switch indicators will help you to determine the stability of a link? (Choose three.)
You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).
Which two protocol methods would be used? (Choose two.)
Only one of many servers has poor performance within an enterprise SAN. The server administrator has found high disk timeout values without a decrease in throughput. The server has multiple paths to the storage system but only one path is active at this time.
What should the storage administrator monitor to assist with troubleshooting?
A server with a dual-ported HBA loses access to storage during switch SFP replacement. You want to prevent this from happening in the future.
Which action should you perform?
A storage networking device has experienced a failure that has "phone home" and opened a service request for a part that can be a customer replaceable unit (CRU). Your support vendor has dispatched a replacement part using a secure courier service.
According to SNIA Storage Security Best Current Practices, which statement is correct about the repair process?
A company has a storage subsystem that supports a variety of replication options. They have purchased an identical array and placed it at a secondary site 4,200 km away and want to keep the two arrays as closely synchronized as possible.
Which solution should be chosen?
A line of business (LOB) executive informs you that a new application requires 99.999% (five 9s) of up-time from both planned and unplanned outages before a service level objective (SLO) will be breached.
What is the amount of permissible downtown per week?
Your company's Service Level Agreement (SLA) requires that no more then one hour's worth of data be lost in case of a system crash. The data must also be restored within 10 hours.
Which two RTO/RPO combinations meet the SLA? (Choose two.)
You have a file system which allows data and metadata segregation.
How should you accelerate read I/O on the file system while keeping costs low?