Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

SNIA S10-200 Exam - Cheat-Test.com

Free S10-200 Sample Questions:

Q: 1
When implementing security in a storage area network, which two are SNIA SSIF best practices?
(Choose two)
A. Use a single LAN security tool for continuity.
B. Secure the management interface to the SAN.
C. Define zones containing the largest possible number of components, and use the same zone sets for different system loads.
D. Define zones containing the smallest possible number of components, and use different zone sets for different system loads.
Answer: B, D

Q: 2
Which three criteria are primary considerations when determining the need for a SAN deployment?
(Choose three)
A. Storage Consolidation
B. Ensuring High Availability
C. Reducing Server CPU Cycles
D. Enabling cross platform LAN file access.
E. Reducing Network Congestion during Backups.
Answer: A, C, D

Q: 3
You have a SAN with four servers connected to and edge switch in a core edge configuration. Each server has an average requirement of 40MB/s. There is currently a single 2 Gb ISL between each edge switch and the core switch.
Under which circumstance would you need to add a second ISL?
A. To provide a redundant path.
B. To balance the load and avoid congestion in the ISL.
C. As a dedicated control path between switches for FSPF updates.
D. As a dedicated high priority management path for selected servers.
Answer: A

Q: 4
A SAN architect is asked to implement an infrastructure for a production and test environment using Fibre Channel devices. Additionally, the customer would like the Fibre Channel device for production and the device for test to communicate over the IP network to remote hosts, but not to each other. Which protocol should the architecture implement?
A. FCIP
B. iFCP
C. iSCSI
D. SCSI-FCP
Answer: B

Q: 5
XXYYinc.com in the medical services industry is having performance issues with the database that
maintains patient records. Recently the hospital expanded the SAN and added the fibre channel directors in a core topology which included moving the server from the core to the edge. After determining the TCP/IP network is functioning correctly with no over-utilization of network resources, the system administrator is attempting to determine what possible causes there are for the degradation. What is a possible cause of the performance problem?
A. Link over-subscription.
B. Spindle latency on the internal boot disk.
C. Contention between the PC packets and the SCSI-3 encoded TCP/IP packets on the FCIP link.
D. Over-subscription of the ISL's between the edge Fibre Channel switches and the TCP/IP switches.
Answer: A

Q: 6
When planning to deploy a Fibre Channel infrastructure where data rates are expected to exceed
25MB/sec what is the preferred medium for local cabling requirements up to 500 meters?
A. 9/125 single-mode optical cables
B. 50/125 multi-mode optical cables
C. 62-5/125 multi-mode optical cables
D. 62.5/125 multi-mode copper cables
Answer: B

Q: 7
You are troubleshooting a communication problem between a host and a storage array. Both nodes are seen by the switch. The host can talk to the array port but has not assigned a target ID to it. What is the most likely current scenario?
A. There have been no logins.
B. Both nodes have completed Fabric Logins but no Port or Process Logins.
C. Both nodes have completed Fabric and Port Logins but no Process Login
D. Both nodes have completed Fabric, Port, and Process Login, there is some other problem,
Answer: C

Q: 8
XXYYinc.com wants to deploy a disaster recovery site 30 km away from the primary data center using a Fibre Channel link. What is the key factor for maximizing performance of the link?
A. Cable type
B. Link control
C. Adequate buffer credits
D. Fibre Channel class of service
Answer: C

Q: 9
An administrator is creating a snapshot to backup a volume to tape. The snapshot will only be used for the backup. Which process will provide the least impact to the production application?
A. COW snapshot mounted to a Tutor Server.
B. Split Mirror snapshot mounted to a Tutor Server.
C. COW snapshot mounted to the Application Server.
D. Split Mirror Snapshot mounted to the Application Server.
Answer: A

Q: 10
What is a disadvantage of over-subscription?
A. Increased host latency.
B. Increased cost of ISL Links.
C. Servers may be throttled down to link speed.
D. Decreases number of hosts that can use the ISL.
Answer: A

Q: 11
Which two technologies are used to provide Fibre Channel entity authentication? (Choose two)
A. MD5
B. CHAP
C. FCAP
D. SHAP
Answer: B, C

Q: 12
XXYYinc.com is replicating data to a remote data center. A host is needed at the remote data center to provide application failover.
How can the company most efficiently keep the remote server consistent with the local server? (Choose two)
A. Implement stretch clustering.
B. Replicate the boot, and all application disks.
C. Replicate the boot, swap and all application disks.
D. Implement stretch clustering while replicating the local boot disk.
Answer: A, B

Q: 13
When adding a new Fibre Channel switch to a fabric, which step should you take, before connection, to maintain security of the production network?
A. Disable all ports
B. Change default password
C. Disable E_PORT functionality
D. Upgrade firmware using an isolated fabric
Answer: B

Q: 14
XXYYinc.com needs to implement two Fabric SANs with high-performance fault-tolerant disk access
located 1500 km from its data center. Which SAN component should an architect implement?
A. NAS filters
B. Fibre Channel switches
C. Fibre Channel to iSCSI bridges
D. Fibre Channel WAN connectivity
Answer: D

Q: 15
A fibre switch fails. A replacement switch has been delivered. Before plugging the replacement switch into the SAN, which two actions should be taken? (Choose two)
A. Delete fabric records of the old switch.
B. Add the new switch to the current zone configuration.
C. Clear all zoning information on the replacement switch.
D. Change the Domain ID of the replacement switch to the Domain ID of the old switch.
Answer: C, D

Q: 16
Which HBA parameter can be configured using an HBA configuration tool?
A. zoning
B. RA_TOV
C. BC_TOV
D. Register for state change
Answer: D

Q: 17
An intruder has control of a server on the company SAN that uses software zoning. The intruder has installed a modified HBA driver.
Which statement is true?
A. The intruder can access all Storage Ports in the SAN.
B. The intruder can access no Storage Ports in the SAN.
C. The intruder can access all Storage and Server Ports in the SAN.
D. The intruder can access only the ports to which the Host is zoned.
Answer: C

Q: 18
A server is experiencing performance problems. An application is being migrated to a new server.
In a controlled environment, how would you migrate the application with the least amount of downtime.
A. Shutdown the application, copy the data to the new server over the network, start the application on the new server.
B. Shutdown the application, change zoning and LUNk masking information, start the application on the new server.
C. Create a local replica, change zoning and LUN masking information, stop the application, start the application on the new server.
D. Apply the zoning and LUN masking information for the new server, stop the application, start the application on the new server, remove the zoning and LUN masking information on the old server.
Answer: D

Q: 19
What is the limiting factor when determining how many hosts can be attached to the storage port of a storage array?
A. fan-in
B. FSPF
C. fan-out
D. hop count
Answer: A

Q: 20
XXYYinc.com is replicating data using FCIP between two remote SANs. Before adding the FCIP SAN
extension there are two fabrics in each location, four total.
How many total fabrics will there be after extending the SAN?
A. 1
B. 2
C. 3
D. 4
Answer: B

Q: 21
XXYYinc.com is synchronously replicating data between sites that are 100km apart.
Which technology lets them achieve this goal with minimal impact to performance?
A. iSCSI
B. iFCP
C. FCIP
D. FCP over DWDM
Answer: D

Q: 22
XXYYinc.com has determined a primary and secondary threat radius. The primary threat radius is
100km and the secondary threat radius is 500km. The company legally needs an exact copy of their data replicated to a remote site. They also want a replicate outside of the secondary threat radius. What should they do?
A. Synchronously replicate their data to a facility 500 km away.
B. Asynchronously replicate their data to a facility 500 km away.
C. Asynchronously replicate their data to a facility a 100 km away and synchronously replicate their data to a second facility 500 km away.
D. Synchronously replicate their data to a facility a 100 km away and asynchronously replicate their data to a second facility 500 km away.
Answer: D

Q: 23
Which SAN topology offers scalability with the lowest associated cost?
A. Ring
B. Mesh
C. Cascade
D. Core-Edge
Answer: C

Q: 24
When planning for a global storage area network, which three should be taken into consideration?
(Choose three)
A. Network latency
B. Distance latency
C. Equipment latency
D. SCSI transmission latency
E. Repeater amperage latency
Answer: A, D, E

Q: 25
A Database Administrator (DBA) has created a logical volume using disks from three different arrays. The data from each array is synchronously replicated over a fibre channel link to one of three arrays in a remote location. There is a rolling disaster which caused the remote links between the arrays to fail at different times. The DBA is trying to start the volume at the remote site. How must the volume be started?
A. It cannot be started, it is corrupt.
B. Just start the volume, it is auto correcting.
C. The volume must be rolled back in time to the first link failure.
D. The disks from each array can be used separately but not together.
Answer: A

Q: 26
Which fabric capacity management process should be reviewed annually for effectiveness and efficiency?
A. Fabric technology implementation is aligned with business requirements (time, cost and functionality).
B. Validate backup and recovery tests and their impact on fabric infrastructure against recover time objectives.
C. Check that the actual expenditures on fabric services and their departmental attribution match the predicted expenditures.
D. Frequency of fabric failures, including the number of switch, HBA, link, cable and driver failures and the number of users impacted.
Answer: A

Q: 27
XXYYinc.com is installing a Fibre Channel storage area network for a small test and development lab. The lab contains two small Windows servers and a single ten disk storage subsystem. The customer desired to deploy a fully redundant SAN for this environment with minimal cost.
What is necessary to meet the customer's requirement for full redundancy of the SAN?
A. One director class fabric switch.
B. Two departmental fabric switches.
C. Ethernet connectivity to each component in the SAN.
D. At least one HBA in each server being attached to the SAN.
Answer: B

Q: 28
XXYYinc.com's switch command line indicates that the status of port 4 is isolated.
What is the problem?
A. The device connected to port 4 is in the process of initialization.
B. The Domain ID does not match the one on the other end of the link.
C. R_A_TOV setting does not match the one on the other end of the link.
D. There is a long wave GBIC/SPF in the switch at port 4 and the fiber cabling to the connected server is incompatible.
Answer: C

Q: 29
What are two advantages of over-subscription? (Choose two)
A. Saves on ISL links.
B. Decreases host I/O latency.
C. Increases individual host throughput.
D. Increases the number of host that can use the ISL.
Answer: A, D

Q: 30
A four-way cluster is attached to two fabrics. Each member has two HBAs connected to each fabric. Each fabric has to array connections. SCSI Queue Depth for HBAs = 8 and Storage devices = 256 per port. Each cluster member is a primary for one application.
All LUNs appear on all storage ports with workload equally distributed across all. Each host has two
dedicated HBAs for tape that can each see four independent LTO II tape drives. All files are large and involve sequential I/O. Performance reporting shows a large read pending at the host during
multi-threaded backup.
What is the maximum value you should set for SCSI Queue Depth?
A. 16
B. 32
C. 64
D. 128
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved