Friday 29 November 2013

MBEL Emerging Technologies

Emerging Technologies

Get this Solution: Mail to – help@AiDLo.com
Assignment A:

Question 1: What are the benefits of using multiple HBAs on a host?
Question 2: Why do formatted disks have less capacity than unformatted disks?
Question 3: How can a block-level virtualization implementation be used as a data migration tool?
Question 4: The marketing department at a mid-size firm is expanding. New hires are being added to the department and they are given network access to the department's files. IT has given marketing a networked drive on the LAN, but it keeps reaching capacity every third week. Current capacity is 500 gigabytes (and growing), with hundreds of files. Users are complaining about LAN response times and capacity. As the IT manager, what could you recommend to improve the situation?
Question 5: An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environment should support 5,000 IOPS during its peak processing cycle. The disks available for configuration provide 66 GB of usable capacity, and the manufacturer specifies that they can support a maximum of 140 IOPS. The application is response time sensitive and disk utilization beyond 60 percent will not meet the response time requirements of the application. Compute and explain the theoretical basis for the minimum number of disks that should be configured to meet the requirements of the application.

Assignment B:
Question 1: A large company is considering a storage infrastructure-one that is scalable and provides high availability. More importantly, the company also needs performance for its mission-critical applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and why?
Question 2: An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak of 1 IOPS each, with a read/write ratio of 2:1. It is estimated that the application also experiences an overhead of 20 percent for other workloads. Calculate the IOPS requirement for RAID 1, RAID 3, and RAID 5.
Question 3: To access data in a SAN, a host uses a physical address known as a logical block address (LBA). A host using a CAS device does not use (or need) a physical address. Why?

Q4. Case Study
A hospital uses an application that stores patient X-ray data in the form of large binary objects in an Oracle database. The application is hosted on a UNIX server, and the hospital staff accesses the X-ray records through a Gigabit Ethernet backbone. Storage array provides storage to the UNIX server, which has 6 terabytes of usable capacity.
(a) Explain the core elements of the data center. What are the typical challenges the storage management team may face in meeting the service-level demands of the hospital staff?
(b) Describe how the value of this patient data might change over time.



Assignment - C

Q1. Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while?
A. LRU
B. HWM
C. LWM
D. MRU

Q2. What does the area ID of the FC address identify?
A. Group of ports within a switch
B. An individual port within a fabric
C. Location of the name server within the fabric
D. Unique number provided to each switch in the fabric

Q3. An organization performs copy on first access (CoFA) replication to create a local replica of application data. To perform a successful restore, what should be considered?
A. Source devices must be healthy
B. Save location size must be larger than the size of all source devices
C. Save location size must be equa l to the size of all source devices
D. All changes to the source and replica must be discarded before the restore starts

Q4. Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?
A. Converged network adapter
B. TCP Offload Engine NIC
C. FCIP bridging adapter
D. iSCSI host bus adapter

Q5. What is a function of unified management software in cloud computing?
A. Defining cloud service attributes
B. Consolidating infrastructure resources scattered across one or more data centers
C. Metering based on usage of resources by the consumer
D. Providing an interface to consumers to request cloud services

Q6. Which EMC product provides the capability to recover data up to any point-in-time?
A. RecoverPoint
B. NetWorker
C. Avamar
D. Data Domain

Q7. What is needed to perform a non-disruptive migration of virtual machines (VMs) between hypervisors?
A. Hypervisors must have access to the same storage volume
B. Physical machines running hypervisors must have the same configuration
C. Hypervisors must be running within the same physical machine
D. Both hypervisors must have the same IP address

Q8. Which iSCSI name requires an organization to own a registered domain name?
A. IQN
B. EUI
C. WWNN
D. WWPN

Q9. Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved as it was received?
A. Integrity
B. Availability
C. Security
D. Performance

Q10. What describes a landing zone in a disk drive?
A. Area on which the read/write head rests
B. Area where the read/write head lands to access data
C. Area where the data is buffered before writing to platters
D. Area where sector-specific information is stored on the disk

Q11. Clients use which protocol to discover SMI Agents on Storage Area Network?
a. SLP (Service Location Protocol)
b. AGP(Agent Discovery Protocol)
c. SMIP (SMI Protocol)

Q12. __________ is the capability to continue as if nothing has happened, even after a major component failure.
A) redundancy
B) interoperability
C) fault tolerance
D) backup

Q13. Striping with parity is also known as RAID __________.
A) 0
B) 1
C) 4
D) 6

Q14. A storage device that is connected directly to a network is an example of __________.
A) network attached storage
B) storage area network
C) direct attached storage
D) RAID

Q15. Identify a network file protocol in the below mentioned set.
a. FC
b. CIFS
c. SCSI
d. NAS

Q16. More than one of the same component is an example of a __________ system.
A) scalable
B) redundant
C) RAID
D) back-up

Q17. Which one of the below is measured by MTBF?
a. Tolerance
b. Life time
c. Reliability
d. Quality

Q18. The purpose of backup is:
a. To restore a computer to an operational state following a disaster
b. To restore small numbers of files after they have been accidentally deleted
c. Is to free space in the primary storage
d. None of the above
Answer: Both A & B

Q19. Backup of the source data can be created
a. On the same device
b. On another device
c. At some other location
d. All the above

Q20. Which of the following backup technique is most space efficient?
a. Full backup
b. Incremental backup
c. Differential backup
Q21. Which of the following statements are true?
a. Data can be recovered fastest in online backup
b. Tape library is an example of nearline storage
c. Data recovery can take hours for offline backup
d. All the above

Q22. Which of the following qualifies as best DR (Disaster Recovery) site?
a. DR site in the same campus
b. DR site in the same city
c. DR site in the same country
d. DR site in a different country

Q23. In SAN storage model, the operating system view storage resources as —— devices
a. FC
b. SCSI
c. SAN
d. None of the above

Q24. To decide on a backup strategy for your organization, which of the following should you consider?
a. RPO (Recovery Point Objective)
b. RTO (Recovery Time Objective)
c. Both RPO & RTO
d. None of the above

Q25. Which of the following can be used for reducing recovery time?
a. Automatic failover
b. By taking backup on a faster device
c. Taking multiple backups – one in same location, another at different location
d. All the above

Q26. Which storage technology requires downtime to add new hard disk capacity
a. DAS
b. SAN
c. NAS
d. None of the above

Q27. Which of the following is Backup software?
a. Amanda
b. Bacula
c. IBM Tivoli Storage Manager
d. All the above

Q28. Data protection is required to recover from
a. Disk/System failures
b. Software corruption through virus
c. Human errors
d. All the above

Q29. The challenges for data protection are
a. Taking care of the old data
b. Backing up the dynamic data
c. All the above

Q30. Name the mechanism which provides the highest level of data protection
a. RAID 0
b. RAID 1
c. RAID 6

Q31. Disk controller driver in DAS architecture is replaced in SAN either with ——
a. FC Protocol
b. iSCSI
c. TCP/IP stack
d. Any one of the above

Q32. The drawback of data mirroring is
a. Backing up the data
b. Performance degradation
c. Difficulty involved in configuring the mirrored volume

Q33. With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration?
- Volume manager provides protection against multiple disk failures
a. True
b. False

Q34. Which are all the statements valid statements w.r.t volume manager
a. Achieve protection against single/multiple disk failures
b. Sustain system/node failure
c. Get better performance compared to using individual disk
d. All the above

Q35. Point out the false statement. Volume can
a. Span across different partitions/disks
b. Span across different disk arrays
c. Be created on tape device
d. Be a shared volume

Q36. Identify the correct statements w.r.t. Journal File System (JFS)
a. JFS keeps pointers to all the stale data
b. While recovering data on a system, JFS helps in quicker recovery
c. All the above

Q37. Which topology is best suited for medium sized enterprise.
a. NAS
b. SAN
c. DAS

Q38. What is the most basic level of storage
a. SAN
b. DAS
c. NAS
d. ISCSI

Q39. Which three statements describe differences between Storage Area Network (SAN) and Network Attached Storage (NAS) solutions? Choose three.
a. SAN is generally more expensive but provides higher performance
b. NAS uses TCP/IP for communication between hosts and the NAS server
c. NAS requires additional hardware on a host: a host bus adapter for connectivity
d. SAN uses proprietary protocols for communication between hosts and the SAN fabric

Q40. Demerits of DAS are. Choose two.
a. Interconnect limited to 10km
b. Excessive network traffic
c. Distance limitations

d. Inability to share data with other servers

No comments:

Post a Comment