Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

SNIA S10-210 Dumps

Page: 1 / 4
Total 97 questions

Storage Networking Management and Administration Questions and Answers

Question 1

A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.

Which two protocols should be disabled? (Choose two.)

Options:

A.

HTTPS

B.

Telnet

C.

SSH

D.

SNMPv1

Question 2

A SAN environment with zones containing a large number of members is experiencing hosts randomly, losing connectivity to SAN-attached storage resources. You have been asked by the customer to address this situation.

Which action should you implement to resolve this issue?

Options:

A.

Edit the host definitions used for LUN masking on the storage systems.

B.

Implement persistent binding on the storage LUNs.

C.

Reconfigure each fabric's zone set for single-initiator zones.

D.

Remove all zones between the primary and DR data centers.

Question 3

A colleague asks you if the added cost of using encrypting tape drives and sending the tapes off-site is warranted, since your IT organization already has large security investments such as firewalls and database table encryption.

What is your response?

Options:

A.

The correct firewall rule set would make encrypted tape drives obsolete, but there has not always been strong confidence in the firewall administrators.

B.

Encrypted database tables only protect data against inappropriate access by super users such as database or server administrators abusing root privileges.

C.

Encrypt tape drives as part of a defense in depth strategy to ensure that one security mechanism being compromised does not expose all information to a malicious user.

D.

The existing firewalls and database table encryption do not replace encrypted tape drives, but implementing an intrusion protection system (IPS) will make tape encryption obsolete.

Question 4

You have a new storage array with the following drive types:

1. SAS (6 Gbps)

2. SSD

3. SATA (6 Gbps)

4. FC(4Gbps)

You need to decide which drive type to use based on speed, cost, and drive availability for your Tier 1 storage.

Which type of drive would you choose?

Options:

A.

SSD

B.

SAS

C.

SATA

D.

FC

Question 5

You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.

Which server within the Fibre Channel fabric would be used to do this?

Options:

A.

Fabric Login server

B.

Name server

C.

Management server

D.

Fabric Controller

Question 6

Click the Exhibit button.

Referring to the exhibit, which RAID level is shown?

Options:

A.

RAID 4

B.

RAID 5

C.

RAID 0

D.

RAID 6

Question 7

Your company uses a cryptographic key system to encrypt tapes. After several years of use and thousands of tapes shipped to off-site locations, an IT audit reveals that encryption keys have been inadvertently stored as ciphertext on file shares to which everyone in the company has read permissions.

Which response reflects industry best practice?

Options:

A.

All data encrypted with the keys exposed as ciphertext should be considered safe.

B.

All data encrypted with the keys exposed as ciphertext and not yet sent off-site as an encrypted tape should be re-keyed (decrypted and re-encrypted using a new key).

C.

All data encrypted with the keys exposed as ciphertext should be re-keyed (decrypted and re-encrypted using a new key).

D.

All data encrypted with the keys exposed as ciphertext should be considered safe as ciphertext is very difficult to use.

Question 8

Click the Exhibit button.

Which RAID level is shown in the exhibit?

Options:

A.

RAID 4

B.

RAID 5

C.

RAID 0

D.

RAID 6

Question 9

Click the Exhibit button.

Which protocol is represented by the frame shown in the exhibit?

Options:

A.

FCoE

B.

iSCSI

C.

Ethernet

D.

Fibre Channel

Question 10

You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).

Which two protocol methods would be used? (Choose two.)

Options:

A.

Directory Name Service protocol (DNS)

B.

Simple Network Management Protocol (SNMP)

C.

Internet Storage Name Server protocol (iSNS)

D.

Service Location Protocol (SLP)

Question 11

A storage subsystems Web browser management interface reports that the subsystem has become degraded and remotely opens a service request with the vendor. Your vendors level three storage support engineer wants to remotely access your storage subsystem for troubleshooting.

What is a SNIA Storage Security Best Current Practices solution?

Options:

A.

Open firewall ports to allow the vendor's support engineer to access the Web browser management interface.

B.

Provide the vendor's support engineer with a temporary user ID that has sudo access to become a super user on the storage subsystem; this ensures an audit trail for all remote support activities.

C.

Provide the vendor's support engineer with a shared remote control session where you can monitor what the support engineer is doing while troubleshooting the subsystem without needing to share credentials.

D.

Provide a temporary user ID to allow the vendor's support engineer to access the Web browser management interface remotely over HTTP/TLS.

Question 12

A company wants to implement a database which requires a storage subsystem with no more than 2 ms write latency and 1 ms read latency.

Which type of drive would you use?

Options:

A.

SATA

B.

FC

C.

SSD

D.

ATA

Question 13

You have a file system which allows data and metadata segregation.

How should you accelerate read I/O on the file system while keeping costs low?

Options:

A.

Assign the fastest storage to the data portion of the file system.

B.

Assign the fastest storage to the metadata portion of the file system.

C.

Assign fast storage to the data and the metadata portions of the file system.

D.

Keep the file system very small.

Question 14

What is a common protocol used in cloud communications?

Options:

A.

WebDAV

B.

SCP

C.

HTTP

D.

CDMI

Page: 1 / 4
Total 97 questions