Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-438 Exam -

Free HP0-438 Sample Questions:

Q: 1 Which are two of the most important considerations when deciding to expand a fabric? Select TWO.

A. maintain the original fabric topology
B. maintain the original data access needs
C. expand the fabric for maximum bandwidth
D. expand the fabric for maximum connectivity
E. expand the fabric so that it supports future growth

Answer: B, E

Q: 2 Before merging a fabric in a high-available redundant SAN environment with B-Series switches, you change conflicting zoning configurations and domain IDs. What else must you do in case of a mismatch to avoid fabric segmentation?

A. Adjust the name table entries for one switch at a time.
B. Adjust the buffer-to-buffer credits settings in one fabric at a time.
C. Adjust the Core PID parameter bit settings in one fabric at a time.
D. Adjust the TCP/IP subnet address settings for one switch at a time.

Answer: C

Q: 3 What is the consequence of merging a zoned fabric with a non-zoned fabric?

A. The fabrics do not merge. They segment and require manual intervention.
B. Devices that were in the non-zoned fabric are not accessible until they are added to the currently enabled configuration.
C. Devices in the fabric are not accessible until the devices in the non-zoned fabric are zoned and made part of the effective configuration.
D. Any devices that were in the non-zoned fabric are automatically configured into a new zone as part of the effective configuration so they can function.

Answer: B

Q: 4 A SAN administrator has an existing test SAN based on 1 Gbps B-series SAN switches with zoning. To evaluate the compatibility of 1 Gbps and 2 Gbps switches, the administrator powers on a 1 Gbps and a 2 Gbps SAN switch (factory default settings without zoning). An ISL is then installed between the two switches. The administrator notices that the fabric segments. What are two possible causes of the segmentation? Select TWO.

A. The zoning information is incompatible.
B. The core PID parameters are conflicting.
C. The new switch has a conflicting domain ID.
D. The two switches are not at the same firmware version.
E. The speed on the port must first be set for 1 Gbps operation.

Answer: B, C

Q: 5 Which two factors affect the merging of SANs? Select TWO.

A. IP addresses
B. SNMP configuration
C. zone naming standards
D. switch fabric parameters
E. switch naming standards

Answer: C, D

Q: 6 A SAN consists of two cascaded switches with no free ports and one ISL. The SAN administrator intends to add a new switch and cascade it off one of the existing switches. What is the recommended procedure?

A. Shut down the SAN and recable it with the new switch.
B. Use the ISL to connect the two existing switches to the new switch.
C. Shut down one of the existing switches and recable with the new switch.
D. Attach the new switch to the least critical device port and recable the SAN.

Answer: D

Q: 7 What is required to consolidate two fabrics with B-Series switches in a Meta SAN with some common storage? Select TWO.

A. MP Router
B. fabric merge
C. proxy devices
D. proxy switches
E. unique domain IDs

Answer: A, C

Q: 8 Which PID formats use the same PIDs for a port?

A. native and core
B. VC encoded and native
C. core and extended edge
D. native and extended edge

Answer: D

Q: 9 What is a typical consequence when you migrate a cascaded to a meshed fabric?

A. average hop count increases
B. number of user ports decreases
C. ISL latency affects data throughput
D. number of device paths does not change

Answer: B

Q: 10 Why is it important to secure the WWNs in the storage environment?

A. to disable WWN spoofing attacks from FCAs
B. to allow safe promiscuous mode on FC ports
C. to prevent FC ports from entering promiscuous mode
D. to harden the name service in the fabric for security reasons

Answer: A

Q: 11 What is the definition of "User Port" in switch configurations?

A. any port on a switch available for hosts
B. any port on a switch available for storage systems
C. any port on a switch where hosts and storage systems are connected
D. any port of a switch where hosts, storage systems, and ISLs are connected

Answer: C

Q: 12 What is NOT an important security foundation for IT environments?

A. security audits at regular time intervals
B. a secure area for the systems in the security domain
C. remote access for management and monitoring
D. defined security policies for a defined security domain

Answer: C

Q: 13 What is an advantage of WWN spoofing?

A. You can remotely change FCA settings on SAN hosts.
B. You can configure zones in-band from any attached FCA.
C. You do not need to reconfigure the WWN based SAN security after an FCA failure.
D. The FCA automatically reconfigures the WWN based SAN security after an FCA failure.

Answer: C

Q: 14 What should the security manager do if there are data paths between security domains?

A. Disable any data path between the domains.
B. Approve any potential paths between domains.
C. Nothing. Between the domains, all data is safe.
D. Implement data encryption on paths between domains.

Answer: B

Q: 15 Which zoning type must be used in a heterogeneous fabric with M- and B- Series switches?

A. VSAN zoning
B. name server zoning
C. fabric address zoning
D. domain-port-area zoning

Answer: B

Q: 16 Which statement about B-series (Brocade) and M-series (McDATA) fabric switches is correct?

A. B-series and M-series fabric switches require a license to increase the buffer-to-buffer credits.
B. M-series fabric switches require a license to increase the buffer-to-buffer credits while B-series do not.
C. B-series fabric switches require a license to increase the buffer-to-buffer credits while M-series do not.
D. B-series and M-series fabric switches do NOT require a license to increase the buffer-to-buffer credits.

Answer: C

Q: 17 What are three Secure Fabric OS benefits? Select THREE.

A. increases SAN performance
B. creates a 'trusted SAN infrastructure'
C. provides easier zone and license management
D. supports management of B- and M-Series switches
E. secures the SAN infrastructure against unauthorized management and device level access
F. provides a secure means for distributing fabric wide security and zoning information (trusted switch)

Answer: B, E, F

Q: 18 Which type of zoning enforcement method is used in a heterogeneous SAN consisting of B- and M- Series switches?

A. access authorization
B. discovery authentication
C. port login authentication
D. admin service authentication

Answer: B

Q: 19 What is NOT a secure authentication method for SAN access points?

A. server access to the fabric
B. switch access to an existing fabric
C. user access to the monitoring interface
D. administrator access to the management interface

Answer: C

Q: 20 What provides the highest security level for a SAN and storage management environment?

A. Implement a password change period for all the active management accounts.
B. Implement a dedicated management network for the management applications.
C. Implement different subnetworks for the management services and applications.
D. Implement automatic update procedures for all the Windows 2003 management Servers and the management software.

Answer: B

Q: 21 A SAN architect needs to implement SAN management. What are two best practices? Select TWO.

A. Add dedicated SAN management servers.
B. Define strong password policies for management accounts.
C. Integrate the SAN management in the public LAN for easier access.
D. Install the SAN management software on secure application servers.
E. For fast audit capabilities grant each user monitoring rights on management applications.

Answer: A, B

Q: 22 Which three features describe a secure storage environment? Select THREE.

A. data integrity
B. data regulation
C. data availability
D. data replication
E. data confidentiality

Answer: A, C, E

Q: 23 What are three security enforcement/authorization techniques for zoning? Select THREE.

A. overlay authentication
B. access authentication
C. key card authentication
D. discovery authentication
E. fabric login authentication

Answer: B, D, E

Q: 24 What is recommended to expand the storage capacity in a SAN? Select THREE.

A. migrate the topology
B. add additional disk devices
C. add larger capacity disk devices
D. replace smaller storage systems
E. deploy additional storage systems

Answer: B, C, E

Q: 25 Which method will ensure the best SAN architecture solution?

A. Build a business case by quantifying the operational cost savings and the ROI.
B. Build a customer scenario by calculating the performance and capacity requirements.
C. Build a test environment to simulate the expected data patterns and prove the capabilities of the design.
D. Build a computer simulation by using the HP SIMQualifier tool which gives you all the relevant business information.

Answer: A

© 2014, All Rights Reserved