You are implementing a SAN solution. When should a SAN architecture be created?
A. anytime
B. before any design or implementation
C. when the SAN is being designed
D. when the SAN is implemented
FCIP is best used for _____. (Choose two.)
A. increasing network bandwidth
B. WAN extensions based on cost effectiveness for distance
C. MAN extensions based on cost effectiveness for distance
D. eliminating unacceptable performance delays
What two advantages does implementing a SAN-wide backup solution offer? (Choose two.)
A. optimal utilization of backup resources
B. easier management
C. improved disk array performance
D. optimal utilization of drive arrays
A customer is testing storage array replication with two storage systems between their data centers. The local array and remote arrays are connected by a 2 Gbps Brocade-based SAN, 35 km apart using a Dense Wave Division Multiplexing (DWDM) devices. The performance of the application at the local site is the priority. How should the customer configure replication?
A. asynchronous mode replication
B. asynchronous mode replication with the extended fabric option
C. synchronous mode replication
D. synchronous mode replication with the extended fabric option
Which SAN implementation provides high availability but in the event of a failure may experience reduced bandwidth?
A. using a single fully meshed, multi-trunked fabric topology
B. using dual fabrics implemented with multiple storage paths
C. using a minimum of two SMAs for SAN management with Command View
D. using dual storage paths to the same switch in transparent failover mode
What virtualization model is used in the Continuous Access Storage Appliance (CASA)?
A. either symmetrical or asymmetrical selected at the initial configuration
B. out-band management of symmetrical virtual objects
C. asymmetrical pooling or also called out-band virtualization
D. symmetrical pooling or also called in-band virtualization
How do you detect a possible security intrusion attempt into the SAN?
A. switch event logging
B. switch port connection monitoring
C. switch zone rejection log
D. switch security audit log
Which SAN implementation provides high availability but in the event of a failure may experience reduced bandwidth?
A. using a single fully meshed, multi-trunked fabric topology
B. using dual storage paths to the same switch in transparent failover mode
C. using dual fabrics implemented with multiple storage paths
D. using a minimum of two SMAs for SAN management with Command View
Why does a SAN infrastructure need an architectural approach?
A. to allow multiple application servers connected to one of the storage sets connected across all the switches
B. to provide an architecture for one-to-many traffic patterns
C. to achieve a lower number of switches in a fabric and reduce the number of redundant ISLs in the topology
D. to manage complexity due to flexibility and multiple degrees of freedom
A SAN architect must design a SAN-based Enterprise Backup Solution (EBS) using a tape library with Ultrium II tape drives. What is the minimum tape drive data read rate with 1:1 compression necessary to keep the drive streaming?
A. > or = 10 MB/s
B. > or = 15 MB/s
C. > or = 30 MB/s
D. > or = 20 MB/s
E. > or = 25 MB/s