12

Click here to load reader

ISM Practice Test

Embed Size (px)

Citation preview

Page 1: ISM Practice Test

Which layer defines the structure, and organization of FC data?

FC-1

FC-2

FC-4

FC-0

What is a purpose of zoning?

To provide a logical connection between array ports and host HBAs

To isolate switch ports into separate logical SANs

To provide a logical connection between LUNs on two storage arrays

To provide a logical connection from LUNs on a storage array to different HBAs

Which EMC ControlCenter component gathers the information about Managed Objects?

Agent

Repository

Store

Server

Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target?

Log shipping

Asynchronous

Logical Volume Manager

Synchronous

What is a characteristic of an integrated NAS system?

Pooled and centralized storage

Allows host to connect directly to the storage array

Offers multiple connectivity options with the back-end

Allows access to under-utilized SAN storage

Page 2: ISM Practice Test

What is true about virtual machines?

Created on the concatenated server

Created on server with only internal storage

Created on the same physical server

Created on the same logical server

Which statement applies to integrated NAS systems?

NAS components and storage arrays are both managed by array management software

NAS components are managed by NAS software and storage arrays are managed by array software

NAS components and storage arrays are managed by NAS software

Integrated NAS systems require an external storage array connection

In a 5 disk RAID 5 implementation, what is the storage capacity overhead?

80%

20%

100%

25%

Which SAN management activity includes volume provisioning?

Formatting

Storage allocation

Concatenation

Partitioning

Page 3: ISM Practice Test

How can you recover from a loss of confidentiality?

Confidentiality cannot be recovered

Combine detective and preventive controls to prevent the loss

Implement backup and restore processes

Deterrent controls are sufficient to prevent the loss

Which cache flushing technique has the highest impact on the host I/O processing?

Forced flushing

Low watermark flushing

High watermark flushing

Idle flushing

What is a basic feature of a CAS implementation?

Object name resolution using DNS

Distributed object management

Object transport via Fibre Channel

Globally unique identifier for every data object

In an EMC CLARiiON remote replication solution, what is the relationship between the sizes of the primary and secondary MirrorView/A LUNs?

The primary must be smaller than or equal to the secondary

The primary must be smaller than the secondary

The primary must be larger than or equal to the secondary

The primary must be the same size as the secondary

What is the correct sequence of operations for data object retrieval in CAS? 1. Retrieval request is sent to the CAS via CAS API over IP 2. Application finds Content Address of object to be retrieved 3. CAS authenticates the request and delivers the object 4. Object is needed by an application

3-1-2-4

4-2-1-3

1-4-3-2

1-3-2-4

Page 4: ISM Practice Test

What is a purpose of iSNS?

To translate iQN-format names into EUI-format names

To assist with discovery of iSCSI targets

To implement TCP offload for better bandwidth

To translate EUI-format names into iQN-format names

You are backing up two file systems from two servers over the LAN: • Backup client A with 10 files, 100 MB each and • Backup client B with 1000 files, 1 MB each. What will happen under identical backup infrastructures?

B will generate more catalog entries

A will generate more catalog entries

A and B will take the same time to complete

A will take more time to complete

What does a push operation in SAN based remote replication indicates?

Data is pushed from one control array to another control control array

Data is pushed from control array to remote array

Data is pushed from one remote array to another control remote array

Data is pushed from remote array to control array

By spoofing the identity of a remote storage site, which two security objectives can be violated?

Availability and integrity

Confidentiality and integrity

Confidentiality and availability

Confidentiality and authenticity

Which component of an intelligent storage system provides host connectivity?

Cache

Back-end

Front-end

Physical disks

Page 5: ISM Practice Test

In a backup and recovery environment, what is a benefit of sending multiple streams versus a single stream of backup data to tape?

Improved recovery time objective

Improved media utilization

Reduced recovery time

Improved write performance

How is “auditing” defined in the context of storage security?

Writing an audit record for each transaction involving storage

Reading and analyzing logs to show that a security policy is being enforced

Verifying integrity of all data blocks

Recording login activities on all servers accessing storage

How does EMC Invista appear to the host and storage?

Virtual initiator and Virtual target

Target and Initiator

Initiator and Target

Virtual target and Virtual initiator

Which cache algorithm will optimize a storage array’s I/O response time if sequential access is detected?

Read Ahead

Write-back

Flushing

Write-through

Which four activities are included in the process of developing an ILM strategy?

Analyzing, Implementing, Testing, Managing

Planning, Analyzing, Implementing, Testing

Classifying, Implementing, Managing, Organizing

Designing, Planning, Classifying, Managing

Page 6: ISM Practice Test

If the communication link between a mirror's primary image and its secondary image fails during an EMC CLARiiON MirrorView/A remote replication, what is the state of the secondary image?

Synchronizing

Inconsistent

Independent

Fractured

Who can be member of a zone?

NIC Cards

Nodes within SAN

ISL Trunks

ToE cards

Which statement describes Content Address (CA)?

An identifier that uniquely addresses the content of a file but not its location

An identifier that uniquely addresses the content, quality, condition, and other characteristics of data

An identifier that uniquely addresses the name and location of a file

An address that enables communication between CAS objects

What is a disadvantage of a Fibre Channel hub when compared to a Fibre Channel switch?

Larger footprint

Limited interoperability

Limited performance

Higher cost

What is the role of virtualization technology?

Physical view of logical resources while preserving the usage interfaces

Physical view of logical resources with appropriate modifications of the usage interfaces

Logical view of physical resources while preserving the usage interfaces

Logical view of physical resources with appropriate modifications of the usage interfaces

Page 7: ISM Practice Test

Which component of the EMC ControlCenter displays information about managed objects?

Console

Repository

Server

Store

What is true about a file in the file system?

Can span multiple file system blocks

It is a smallest container of physical disk space

It must be mounted before use

Is always a contiguous area on physical disk

Which key requirement for data center elements can be achieved through automation of common tasks?

Availability

Scalability

Manageability

Data integrity

What is Meta-LUN?

LUN that stores mirroring information

LUN that stores meta-data

Formed by aggregating other LUNs

Formed by partitioning other LUNs

What happens when the EMC TimeFinder/Mirror split operation is performed?

All data from the BCV is copied to the standard volume

All data from the standard volume is copied to the BCV

Data is copied incrementally from the standard volume to the BCV

The BCV is made independently accessible

Page 8: ISM Practice Test

On what basis is information moved from one storage tier to another in a tiered storage approach?

Size of the tier

Cost of the tier

Value of information

Size of information

Which kind of replication requires ongoing involvement from the host to manage the replication?

Asynchronous

Disk buffered

Log shipping

Synchronous

What does the Rainfinity appliance use to provide data virtualization?

Control path cluster

VSAN

Infiniband

Global namespace manager

To ensure a consistent copy, when should application I/O be held?

Just before writing to storage array cache

Just prior to creating a point in time replica

Just after creating a point in time replica

Just after writing to storage array cache

Which metrics should be used to determine bandwidth requirements for asynchronous remote replication?

Peak Writes

Average Reads

Average Writes

Peak Reads

Page 9: ISM Practice Test

What is a benefit of a NAS solution?

Offers improved network bandwidth

Enables access to data with unique object IDs

Provides improved application block level I/O performance

Enables data sharing across host platforms

In a SAN-based backup environment, how does metadata travel?

Over SAN

Over LAN

Over both SAN and LAN

Over the same path as the data

What is an advantage of synchronous remote replication compared to asynchronous replication?

Less expensive

Lower data loss in the event of a disaster

Lower network bandwidth requirement

Usable over long distances

What is an accurate statement about a disk drive function?

Rotation speed of a spindle is varied to keep the head flying height constant

Rotation speed of a spindle depends on the disk zone being accessed

A spindle rotates at a constant speed

Individual platters on a spindle may rotate at different speeds

To ensure a consistent copy, when should application I/O be held?

Just prior to creating a point in time replica

Just before writing to storage array cache

Just after writing to storage array cache

Just after creating a point in time replica

Page 10: ISM Practice Test

Which remote replication technology uses data buffers inside the storage array to store and forward data from the source to the target?

Logical Volume Manager

Asynchronous

Synchronous

Log shipping

What does a push operation in SAN based remote replication indicates?

Data is pushed from remote array to control array

Data is pushed from one control array to another control control array

Data is pushed from one remote array to another control remote array

Data is pushed from control array to remote array

In the context of security vulnerability management, what is the effect of increasing the work factor?

Decreases the number of steps in an attack vector

Increases the likelihood that the exploit will be discovered

Increases the time necessary to perform the exploit

Decreases the attack surface of the component in question

When is data copied from the source to the target using Copy on First Access replica technology?

All writes are issued to a location on the source

All reads are issued to a location on the source

A read is issued for the first time to a location on the source

A write is issued for the first time to a location on the source

An organization performs a full backup on 1st of every month. It takes a cumulative backup every Sunday and incremental backup everyday. On last Monday of the month, at 8:00 A.M. the file system gets corrupted. How many backups will be needed to recover the file system?

31

29

5

2

Page 11: ISM Practice Test

What is a purpose of zoning?

To provide a logical connection between LUNs on two storage arrays

To isolate switch ports into separate logical SANs

To provide a logical connection from LUNs on a storage array to different HBAs

To provide a logical connection between array ports and host HBAs

Which SAN connectivity option offers the greatest degree of scalability?

Core-Edge

Full Mesh

Switched Fabric

Arbitrated Loop

What happens when the EMC TimeFinder/Mirror split operation is performed?

The BCV is made independently accessible

All data from the BCV is copied to the standard volume

Data is copied incrementally from the standard volume to the BCV

All data from the standard volume is copied to the BCV

A company has a Recovery Point Objective (RPO) of four hours. What does this RPO mean in the event of a disaster?

Production must be resumed within four hours

A restartable copy of data must be obtained within four hours

Restore from backup must occur within four hours

No more than four hours of production data can be lost

Which cache flushing technique has the highest impact on the host I/O processing?

Idle flushing

Low watermark flushing

High watermark flushing

Forced flushing

Page 12: ISM Practice Test

For which remote replication technology is host involvement an absolute requirement?

Asynchronous

Synchronous

Disk buffered consistent point in time copies

Logical volume manager mirroring

What provides a layer of abstraction between the operating systems and the underlying hardware?

Virtual memory

Virtual storage

Virtual servers

Virtual networks