Emerging Technologies

Published on November 2016 | Categories: Documents | Downloads: 73 | Comments: 0 | Views: 608
of 5
Download PDF   Embed   Report

Emerging Technologies solved assignment

Comments

Content

Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com
Emerging Technologies V1
Assignment A
Q1.) What are the benefits of using multiple HBAs on a host?
Q2.) Why do formatted disks have less capacity than unformatted disks?
Q3.) How can a block-level virtualization implementation be used as a data migra
tion tool?
Explain how data migration will be accomplished and discuss the advantages of us
ing this
method for storage. Compare this method to traditional migration methods.
Q4.) The marketing department at a mid-size firm is expanding. New hires are bei
ng added to the
department and they are given network access to the department s files. IT has giv
en marketing a
networked drive on the LAN, but it keeps reaching capacity every third week. Cur
rent capacity is
500 gigabytes (and growing), with hundreds of files. Users are complaining about
LAN response
times and capacity. As the IT manager, what could you recommend to improve the s
ituation?
Q5.) An application specifies a requirement of 200 GB to host a database and oth
er files. It also
specifies that the storage environment should support 5,000 IOPS during its peak
processing
cycle. The disks available for configuration provide 66 GB of usable capacity, a
nd the
manufacturer specifies that they can support a maximum of 140 IOPS. The applicat
ion is
response time sensitive and disk utilization beyond 60 percent will not meet the
response time
requirements of the application. Compute and explain the theoretical basis for t
he minimum
number of disks that should be configured to meet the requirements of the applic
ation.
Assignment B
Q1) A large company is considering a storage infrastructure one that is scalable a
nd provides
high availability. More importantly, the company also needs performance for its
mission-critical
applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and
why?
Q2). An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typ
ical users at a
peak of 1 IOPS each, with a read/write ratio of 2:1. It is estimated that the ap
plication also
experiences an overhead of 20 percent for other workloads. Calculate the IOPS re
quirement for
RAID 1, RAID 3, and RAID 5
Q3). To access data in a SAN, a host uses a physical address known as a logical
block address
(LBA). A host using a CAS device does not use (or need) a physical address. Why?
Q4. Case Study
A hospital uses an application that stores patient X-ray data in the form of lar
ge binary objects in
an Oracle database. The application is hosted on a UNIX server, and the hospital

staff accesses
the X-ray records through a Gigabit Ethernet backbone. Storage array provides st
orage to the
UNIX server, which has 6 terabytes of usable capacity.
(a) Explain the core elements of the data center. What are the typical challenge
s the
storage management team may face in meeting the service-level demands of the hos
pital
staff?
(b) Describe how the value of this patient data might change over time.
Assignment C
1. Which cache management algorithm is based on the assumption that data will no
t be requested
by the host when it has not been accessed for a while?
A. LRU
B. HWM
C. LWM
D. MRU
2. What does the area ID of the FC address identify?
A. Group of ports within a switch
B. An individual port within a fabric
C. Location of the name server within the fabric
D. Unique number provided to each switch in the fabric
3. An organization performs copy on first access (CoFA) replication to create a
local replica of
application data. To perform a successful restore, what should be considered?
A. Source devices must be healthy
B. Save location size must be larger than the size of all source devices
C. Save location size must be equa l to the size of all source devices
D. All changes to the source and replica must be discarded before the restore st
arts
4. Which host component eliminates the need to deploy separate adapters for FC a
nd Ethernet
communications?
A. Converged network adapter
B. TCP Offload Engine NIC
C. FCIP bridging adapter
D. iSCSI host bus adapter
5. What is a function of unified management software in cloud computing?
A. Defining cloud service attributes
B. Consolidating infrastructure resources scattered across one or more data cent
ers
C. Metering based on usage of resources by the consumer
D. Providing an interface to consumers to request cloud services
6. Which EMC product provides the capability to recover data up to any point-intime?
A. RecoverPoint
B. NetWorker
C. Avamar
D. Data Domain
7. What is needed to perform a non-disruptive migration of virtual machines (VMs
) between
hypervisors?
A. Hypervisors must have access to the same storage volume
B. Physical machines running hypervisors must have the same configuration
C. Hypervisors must be running within the same physical machine
D. Both hypervisors must have the same IP address
8. Which iSCSI name requires an organization to own a registered domain name?

A. IQN
B. EUI
C. WWNN
D. WWPN
9. Which data center requirement refers to applying mechanisms that ensure data
is stored and
retrieved as it was received?
A. Integrity
B. Availability
C. Security
D. Performance
10. What describes a landing zone in a disk drive?
A. Area on which the read/write head rests
B. Area where the read/write head lands to access data
C. Area where the data is buffered before writing to platters
D. Area where sector-specific information is stored on the disk
11.Clients use which protocol to discover SMI Agents on Storage Area Network?
a. SLP (Service Location Protocol)
b. AGP(Agent Discovery Protocol)
c. SMIP (SMI Protocol)
12. __________ is the capability to continue as if nothing has happened, even af
ter a major
component failure.
A) redundancy
B) interoperability
C) fault tolerance
D) backup
13. Striping with parity is also known as RAID __________.
A) 0
B) 1
C) 4
D) 6
14. A storage device that is connected directly to a network is an example of __
________.
A) network attached storage
B) storage area network
C) direct attached storage
D) RAID
15 Identify a network file protocol in the below mentioned set.
a. FC
b. CIFS
c. SCSI
d. NAS
16. More than one of the same component is an example of a __________ system.
A) scalable
B) redundant
C) RAID
D) back-up
17. Which one of the below is measured by MTBF?
a. Tolerance
b. Life time
c. Reliability
d. Quality
18. The purpose of backup is:
a. To restore a computer to an operational state following a disaster
b. To restore small numbers of files after they have been accidentally deleted
c. Is to free space in the primary storage
d. None of the above

19. Backup of the source data can be created
a. On the same device
b. On another device
c. At some other location
d. All the above
20. Which of the following backup technique is most space efficient?
a. Full backup
b. Incremental backup
c. Differential backup
21. Which of the following statements are true?
a. Data can be recovered fastest in online backup
b. Tape library is an example of nearline storage
c. Data recovery can take hours for offline backup
d. All the above
22. Which of the following qualifies as best DR (Disaster Recovery) site?
a. DR site in the same campus
b. DR site in the same city
c. DR site in the same country
d. DR site in a different country
23. In SAN storage model, the operating system view storage resources as
devices
a. FC
b. SCSI
c. SAN
d. None of the above
24. To decide on a backup strategy for your organization, which of the following
should you
consider?
a. RPO (Recovery Point Objective)
b. RTO (Recovery Time Objective)
c. Both RPO & RTO
d. None of the above
25. Which of the following can be used for reducing recovery time?
a. Automatic failover
b. By taking backup on a faster device
c. Taking multiple backups one in same location, another at different location
d. All the above
26. Which storage technology requires downtime to add new hard disk capacity
a. DAS
b. SAN
c. NAS
d. None of the above
27. Which of the following is Backup software?
a. Amanda
b. Bacula
c. IBM Tivoli Storage Manager
d. All the above
28. Data protection is required to recover from
a. Disk/System failures
b. Software corruption through virus
c. Human errors
d. All the above
29. The challenges for data protection are
a. Taking care of the old data
b. Backing up the dynamic data
c. All the above
30. Name the mechanism which provides the highest level of data protection
a. RAID 0
b. RAID 1
c. RAID 6
31. Disk controller driver in DAS architecture is replaced in SAN either with

a. FC Protocol
b. iSCSI
c. TCP/IP stack
d. Any one of the above
32. The drawback of data mirroring is
a. Backing up the data
b. Performance degradation
c. Difficulty involved in configuring the mirrored volume
33. With reference to Volume Manager, is the following statement TRUE or FALSE u
nder
specific configuration?
- Volume manager provides protection against multiple disk failures
a. True
b. False
34. Which are all the statements valid statements w.r.t volume manager
a. Achieve protection against single/multiple disk failures
b. Sustain system/node failure
c. Get better performance compared to using individual disk
d. All the above
35. Point out the false statement. Volume can
a. Span across different partitions/disks
b. Span across different disk arrays
c. Be created on tape device
d. Be a shared volume
36. Identify the correct statements w.r.t. Journal File System (JFS)
a. JFS keeps pointers to all the stale data
b. While recovering data on a system, JFS helps in quicker recovery
c. All the above
37 Which topology is best suited for medium sized enterprise.
a. NAS
b. SAN
c. DAS
38. What is the most basic level of storage
a. SAN
b. DAS
c. NAS
d. ISCSI
39. Which three statements describe differences between Storage Area Network (SA
N) and
Network Attached Storage (NAS) solutions? Choose three.
a. SAN is generally more expensive but provides higher performance
b. NAS uses TCP/IP for communication between hosts and the NAS server
c. NAS requires additional hardware on a host: a host bus adapter for connectivi
ty
d. SAN uses proprietary protocols for communication between hosts and the SAN fa
bric
40. Demerits of DAS are. Choose two.
a. Interconnect limited to 10km
b. Excessive network traffic
c. Distance limitations
d. Inability to share data with other servers
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close