EMC CIS Module 2 Flashcards

part 2

2
Q

Which is a benefit of RAID?a. Ensures data integrity in a RAID set.b. Prevents disk failure in a RAID set.c. Improves storage system performance.d. Simplifies distribution of parity across mirrored disks.

A

c. Improves storage system performance.Module 2 Quiz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which statement is true about FC SAN?a. Provides higher scalability as compared to DAS.b. Has limited ability to share resources.c. Enables object level access to data.d. Supports a maximum of 256 nodes.

A

a. Provides higher scalability as compared to DAS.Module 2 Quiz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which key requirement of a data center refers to the ability of IT to support new business initiatives dynamically?a. Manageabilityb. Availabilityc. Capacityd. Flexibility

A

d. FlexibilityModule 2 Quiz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which are the key parameters that determine the performance and availability of a RAID set?a. Number of drives in a RAID set and RAID levelb. Number of drives in a RAID set and the capacity of each drivec. Number of RAID controllers and type of RAID implementationd. Number of drives in a RAID set and type of RAID implementation

A

a. Number of drives in a RAID set and RAID levelModule 2 Quiz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which key requirement of a data center is violated when an authorized storage administrator is not able to remotely login to a server in the data center?a. Scalabilityb. Flexibilityc. Securityd. Availability

A

d. AvailabilityModule 2 Quiz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A facility containing physical IT resources including compute, network, and storage.

A

Classic Data Center2.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five core elements of a CDC

A

1) Application2) Database Management System (DBMS)3) Compute4) Storage5) Network2.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Characteristics of channel technology

A

1) Compute system and peripheral devices are connected through channel.2) Low protocol overhead due to tight coupling.3) Supports transmission only over short distances.4) Protocol examples: PCI, IDE/ATA, SCSI, etc.2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Technology Characteristics

A

1) Compute system and peripheral devices are connected over a network.2) High protocol overhead due to network connection.3) Support transmission over long distances.4) Protocol examples: iSCSI (SCSI over IP), FCoE, and FC2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

More flexible than channel technologies

A

Network technologies2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASIC board that performs I/O interface functions between the host and the storage, relieving the CPU from additional I/O processing workload.

A

Host Bus Adapter (HBA)2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A multifunction adapter which consolidates the functionality of a NIC card AND a Fibre Channel HBA onto a single adapter.

A

Converged Network Adapter (CNA)2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Popular protocol to connect to disk drives.Supports 16-bit parallel transmission.Serial version is called Serial ATA (SATA).Both versions offer good performance at a relatively low cost.

A

IDE/ATA2.22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preferred storage connectivity option for high-end environments.Improved performance, scalability, and high cost when compared to ATA.

A

Small Computer System Interface (SCSI)2.23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Serial version of SCSI

A

Serial Attached SCSI (SAS)2.23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In file level access, where does the file system reside?

A

With the storage2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In block level access, where does the file system reside?

A

On the Compute2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 Key Infrastructure Components

A

1) OS (or file system)2) Connectivity (network)3) Storage2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Protocols used for accessing data from an external storage device (or subsystems).

A

Fibre ChanneliSCSI2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Two ways data can be accessed over a network

A

1) File Level2) Block Level2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In block-level access, where is the file system created?

A

On a compute system.2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In file level access where is the file system created?

A

On a network or at the storage2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: File-level access has higher overhead than block-level access.

A

True2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

LBA

A

Logical Block Addressing2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CHS

A

Cylinder, Head, and Sector2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Simplifies addressing by using a linear address to access physical blocks of data.

A

Logical Block Addressing (LBA)2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Physical drive addressing that refers to specific locations on a drive.

A

Cylinder, Head, and Sector (CHS)2.24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Internal or external storage device, which connects directly to a compute system.

A

Direct Attached Storage (DAS)2.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Two classifications of DAS

A

1) Internal2) External(w.r.t. the compute system)2.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Benefits of DAS

A

1) Simple to deploy and ideal for local data provisioning2) Low capital expense and less complexity.2.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DAS Challenges

A

1) Limited scalability2) Limited ability to share resources (islands of over and under utilized storage resources)2.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Six Storage Networking Technologies

A

1) Fibre Channel SAN (FC SAN)2) Network Attached Storage (NAS)3) Internet Protocol SAN (IP SAN)4) Fibre Channel over Ethernet (FCoE)5) Object Based Storage6) Unified Storage2.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Concept-based storage network technologies

A

Object Based StorageUnified Storage2.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Protocol-based storage networking technologies

A

Fibre Channel SAN (FC SAN)Network Attached Storage (NAS)Internet Protocol SAN (IP SAN)Fibre Channel over Ethernet (FCoE)2.26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Dedicated high speed network of compute systems and shared storage devices which uses the SCSI over FC protocol.Provides block level data access.

A

FC SAN2.27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Four Benefits of FC SAN

A

1) Enables storage consolidation and sharing.2) Enables centralized management.3) Provides scalability and high performance.4) Reduces storage and administration cost.2.27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

FC SAN Scaling Limit

A

15 million devices2.27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SCSI data encapsulated and transported within Fibre Channel frames

A

Fibre Channel Protocol (FCP)2.27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Base protocol of FC SAN

A

SCSI (modified)2.27

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Six Components of an FC SAN

A

1) Node Ports2) Cables3) Connectors4) Interconnecting Devices5) Storage arrays6) SAN Management Software2.28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

FC-AL

A

Fibre Channel Arbitrated Loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

One or more interconnected FC switches through which multiple SAN nodes can communicate.

A

Fibre Channel Fabric2.29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In a switched fabric, the link between any two switches

A

Inter Switch Link (ISL)2.29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An end point in an FC fabric

A

N_port2.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Typically, a compute system port (HBA) or a storage array port that is connected to a switch in a switched fabric.

A

N_port (node port)2.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

An FC port that forms the connection between two FC switches

A

E_porta.k.a. expansion port2.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A port on an FC switch that connects to an N_port

A

F_porta.k.a., fabric port 2.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A generic port that can operate as an E_port or and F_port and determines its functionality automatically during intialization.

A

G_port2.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Used to communicate between nodes within a FC SAN.Similar in functionality to an IP address on NICs.24-bit address, dynamically assigned.

A

Fibre Channel Address2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Three Components of a Fibre Channel Address

A

Domain ID (switch)Area ID (port group)Port ID (port)2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Two types of addresses used for communication in an FC SAN environment

A

1) Channel Address2) World Wide Name2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Unique 64 bit identifier.Static to the port, similar to a NIC’s MAC address.Used to physically identify ports or nodes within an FC SAN.

A

World Wide Name2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Unique identification number provided to each switch in an FC SAN.

A

Domain ID2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Used to identify a group of switch ports used to connect nodes.

A

Area ID2.31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A Fibre Channel switch function that enables nodes within the fabric to be logically segmented into groups that can communicate with each other.

A

Zoning2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In an FC environment, used to control server access to storage.

A

Zoning in conjunction with LUN masking2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Zoning takes place at what level?

A

Fabric level2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

LUN Masking is done at what level?

A

Array Level2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

3 type of zoning

A

1) Port zoning2) WWN zoning3) Mixed zoning2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Zoning that uses the FC addresses of the physical ports to define zones.Access to data is determined by the physical switch port to which a node is connected.Also called hard zoning.

A

Port zoning2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Also known as soft zoning.Allows the FC SAN to be re-cabled without reconfiguring the zone information.Uses World Wide Names to define zones.

A

WWN Zoning2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Zoning that enables a specific port to be tied to the WWN of a node.Combines qualities of both WWN zoning and port zoning.

A

Mixed zoning2.32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A technology that provides transfer of block level data over an IP network

A

IP-SAN2.34

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Two primary protocols that leverage IP as the transport mechanism for block level data transmission

A

1) iSCSI (SCSI over IP)2) FCIP2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Compute-based encapsulation of SCSI I/O over IP using an Ethernet NIC, TCP/IP Offload Engine, or iSCSI HBA in the compute system.

A

iSCSI2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Three network adapters used in an iSCSI environment

A

1) Ethernet NIC card2) TCP/IP Offload Engine (TOE) card3) iSCSI HBA2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Uses a pair of bridges (FCIP gateways) communicating over TCP/IP

A

Fibre Channel over IP2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Widely adopted for connecting compute systems to storage because it is relatively inexpensive and easy to implement, especially in environments where an FC SAN does not exist.

A

iSCSI2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Used extensively in Disaster Recovery (DR) implementations, where data is duplicated to an alternate site.

A

FCIP2.35

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Two iSCSI topologies

A

1) Native2) Bridged2.36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

iSCSI topology with:1) No FC components, and2) iSCSI initiators connect directly to the storage array.

A

Native iSCSI Topology2.36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

iSCSI topology with the following attributes:1) Translates iSCSIP/IP to FC,2) iSCSI initiator configured with bridge as target,3) Bridge acts as a virtual FC initiator, and4) Less common iSCSI topology

A

Bridged iSCSI Topology2.36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Device that issues commands to a target device to perform a task.

A

Initiator2.36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

IP-based storage networking technology.Combines advantages of Fibre Channel and IP.Creates virtual FC link that connects devices in a different fabric.Distance extension solution.Tunneling protocol.

A

Fibre Channel over IP (FCIP)2.37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Used for data sharing over geographically dispersed SAN.

A

FCIP2.37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Transports FC block data over an existing IP infrastructure

A

FCIP2.37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Encapsulates Fibre Channel frames for transport over Enhanced Ethernet networks.Enables consolidation of SAN traffic and Ethernet traffic onto a common 10GigE infrastructure.Consolidates compute to compute and compute to storage communication over a single channel.

A

Fibre Channel over Ethernet (FCoE)2.38

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Combines LAN and SAN traffic over a single 10GigE connection.

A

FCoE2.38

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Contains Ethernet bridge and Fibre Channel Forwarder.

A

FCoE Switch2.40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Part of FCoE switch which encapsulates FC frames into FCoE frames and de-capsulates FCoE frames to FC frames.

A

Fibre Channel Forwarder (FCF)2.40

82
Q

Components of FCoE

A

1) Converged Network Adapter (CNA)2) FCoE Switch (Ethernet bridge + FCF)3) Converged Enhanced Ethernet (CEE) (a.k.a. Data Center Ethernet)2.40

83
Q

Storage device connected to a network that provides FILE LEVEL data access to heterogeneous clients.

A

Network Attached Storage (NAS)2.42

84
Q

Dedicated high performance file server with a storage system.

A

Network Attached Storage (NAS)2.42

85
Q

Remote file services protocols used by NAS

A

CIFSNFS2.42

86
Q

NAS Head Components

A

CPUMemory2.44

87
Q

6 NAS Components

A

1) NAS Head (CPU & Memory)2) NICs (one or more)3) Optimized OS for managing NAS functionality4) NFS & CIFS protocols for file sharing5) Standard protocols to connect & manage physical disk resources (ATA, SCSI, FC)6) Storage Array2.44

88
Q

Common protocols used in object based communication

A

SOAPREST2.47

89
Q

Used for communication between peers in a distributed environment.Uses XML framework.

A

Simple Object Access Protocol (SOAP)2.47

90
Q

Used to retrieve information from a web site by reading web pages.

A

Representational State Transfer (REST)2.47

91
Q

Way of exchanging messages between peers on a distributed network.

A

Simple Object Access Protocol (SOAP)2.47

92
Q

Communication standard used by Object Based Storage

A

HTTP2.47

93
Q

7 Benefits of Object Based Storage

A

1) Automates & simplifies storage management.2) Ensures data integrity (!!!).3) Ensures compliance and auditability.4) Enables easy data migration.5) Enables self healing.6) Facilitates intelligent replication.7) Allows flexible scalability.2.49

94
Q

Scenarios appropriate for Object Based storage

A

Multimedia content rich Web applicationsArchivesCloud2.49

95
Q

Benefits of Unified Storage

A

Provides consolidated multi-protocol storage.Simplifies administration.Reduces cost of storage assets, along with power, cooling, and space.Provides a highly scalable architecture.2.51

96
Q

File Level Storage Protocols

A

NFS, CIFS2.51

97
Q

Block Level Storage Protocols

A

iSCSI, FC, and FCoE2.51

98
Q

Object Level Protocols

A

REST, SOAP2.51

99
Q

Goal of a business continuity solution

A

Ensure the information availability required to conduct vital business operations.2.53

100
Q

RPO2.55

A

Recovery Point Objective

101
Q

RTO

A

Recovery Time Objective2.55

102
Q

Solutions & Technologies Which Enable Business Continuity

A

Eliminating Single Points of FailureMulti-pathing softwareBackupReplication (local and remote)2.56

103
Q

Backup Purposes

A

Disaster RecoveryOperational BackupArchival2.57

104
Q

How backups can be categorized, based on granularity

A

1) Full2) Cumulative3) Incremental2.58

105
Q

Enables a full backup copy to be created offline without disrupting the I/O operation on the production volume.

A

Synthetic (or constructed) full backup2.58

106
Q

Four Backup Components

A

1) Backup Client2) Backup Server3) Storage Node4) Backup Device2.59

107
Q

Sends backup data to backup server or storage node

A

Backup Client2.59

108
Q

Manages backup operations and maintains backup catalog

A

Backup Server2.59

109
Q

Responsible for writing data to backup device.

A

Storage Node2.59

110
Q

Stores backup data

A

Backup device2.59

111
Q

Contains information about the backup process and backup metadata.

A

Backup Catalog2.59

112
Q

True or False: Typically, the storage node is integrated with the backup server and both are hosted on the same physical platform.

A

True2.59

113
Q

Backup Operation Steps

A

1) Backup server initiates a scheduled backup.2) Backup server instructs storage node to backup media and instructs clients to send backup data to the storage node.3) Storage node sends backup data to backup device and media information to the backup server.4) Backup server updates catalog and records the status.2.60

114
Q

Restore Operation Steps

A

1) Backup client initiates the restore.2) Backup server scans backup catalog to identify data to be restored and the client that will receive the data.3) Backup server instructs storage node to load backup media.4) Storage node restores the backup data to the client and sends metadata to the backup server.2.60

115
Q

VTL

A

Virtual Tape Library2.61

116
Q

Three Backup Technology Options

A

1) Backup to Tape2) Backup to Disk3) Backup to Virtual Tape (VTL)2.61

117
Q

Technology that conserves storage capacity and/or network traffic by eliminating duplicate data.

A

Deduplication2.62

118
Q

Levels of Deduplication Implementation

A

File LevelBlock / Chunk Level2.62

119
Q

True or False: Deduplication can be source-based (client) or target based (storage device).

A

True2.62

120
Q

3 Benefits of Deduplication

A

1) Far less infrastructure is required to hold the backup images, due to the elimination of redundant data.2) Reduces the amount of redundant content in the daily backup, enabling longer retention periods.3) Reduces backup window and enables faster restore, enabling creation of daily full backup images.2.62

121
Q

3 Methods for Implementing Deduplication

A

1) Single Instance Storage (SIS)2) Sub-file Deduplication3) Compression2.65

122
Q

Process of creating an EXACT COPY of data

A

Replication2.67

123
Q

Drivers for replication

A

Alternate source for backupFast recoveryDecision supportTesting platformRestart from replica2.67

124
Q

Two Classifications of Replication

A

Local ReplicationRemote Replication

125
Q

Primary purpose of replication

A

To enable users to have the designated data at the right place, in a state appropriate to the recovery needs.2.67

126
Q

Drives choice of replica type

A

RPO2.68

127
Q

Two Types of Replicas

A

1) Point-in-Time (PIT) Replica (has non-zero RPO)2) Continuous Replica (has near-zero RPO)2.68

128
Q

Three Characteristics of a Good Replica

A

1) Recoverability2) Restartability3) Consistency2.68

129
Q

How can RPO by minimized in a PIT replication scenario?

A

By making periodic PIT replicas

130
Q

Objective of any continuous replication process

A

Reduce the RPO to zero.2.69

131
Q

Process of replicating data within the same array or the same data center.

A

Local Replication2.70

132
Q

Two Classifications of Local Replication

A

1) Compute based replication2) Storage array based replication2.70

133
Q

Two type of compute based replication

A

1) LVM-based mirroring2) File system snapshot2.71

134
Q

Types of Storage Array based replication techniques

A

1) Full volume mirroring2) Pointer based full volume replication3) Pointer based virtual replication2.70

135
Q

Form of compute based replication where each logical partition in a logical volume is mapped to two physical partitions on two different physical volumes.Write to a logical partition is written to the two physical partitions.

A

Logical Volume Manager based mirroring2.71

136
Q

Pointer-based local replication which uses Copy on the First Write (CoFW) principle.Uses bit map and block map.Requires a fraction of the space used by the production file system (FS).

A

File System Snapshot2.71

137
Q

Briefly describe a Copy on First Write (CoFW) mechanism

A

If a write I/O is issued to the production FS for the first time after the creation of a snapshot, the I/O is held, and the original data of the production FS corresponding to that location is moved to the snap FS (replica).Then, the new data is allowed to write on the production FS.The bitmap and blockmap are updated accordingly.Any subsequent write to the same location will not initiate the CoFW activity.2.71

138
Q

Used to keep track of blocks that are changes on the production FS after creation of the snapshot.

A

Bitmap2.71

139
Q

Used to indicate the exact address from which the data is to be read when the data is accessed from the Snap FS.

A

Blockmap2.71

140
Q

Target is a full physical copy of the source device.Target is attached to the source and data from the source is copied to the target.Target is unavailable while it is attached.Target device is as at least as large as the source device.

A

Full Volume Mirroring2.72

141
Q

Provides a full copy of the source data on the target.Target device is made accessible for business operations as soon as the replication session has started.Point-in-Time (PIT) is determined by the time of session activation.Target device is at least as large as the source device.

A

Pointer-Based Full Volume Replication2.73

142
Q

Two modes of pointer based full volume replication

A

1) Copy on First Access (deferred)2) Full Copy Mode2.73

143
Q

Targets do not hold actual data, but hold pointers to where the data is located.Target requires only a small fraction of the size of the source volumes.Target devices are accessible at the start of session activation.Uses CoFW technology.

A

Pointer Based Virtual Replication2.74

144
Q

Process of creating and maintaining copies of data from a production site to remote site(s).

A

Remote Replication2.75

145
Q

Addresses risks associated with regionally driven outages.Network infrastructure is required between source and target.

A

Remote Replication2.75

146
Q

Two modes of remote replication

A

1) Synchronous2) Asynchronous2.75

147
Q

Replica is identical to source at all times - near zero RPO

A

Synchronous Replication2.75

148
Q

Replica is behind the source by a finite time - finite RPO.

A

Asynchronous Replication2.75

149
Q

A write must be committed to the source and remote replica before it is acknowledged to the compute system.Application response time will be extended.Maximum network bandwidth must be provided at all times to minimize impact on response time.Rarely deployed beyond 200 km.

A

synchronous replication2.76

150
Q

Write is committed to the source and immediately acknowledged to the compute system.Data is buffered at the source and transmitted to the remote replica later.Application response time is unaffected.Needs only average network bandwidth.Deployed over long distances.Non-zero RPO

A

asynchronous replication2.76

151
Q

Replication is done by using the CPU resources of the compute system, using software that is running on the compute.

A

Compute-based remote replication2.77

152
Q

Two Compute Based Remote Replication Methods

A

1) LVM-based2) Database Log Shipping2.77

153
Q

All writes to the source Volume Group are replicated to the target Volume Group by the LVM.Can be in synchronous or asynchronous mode

A

LVM-based remote replication2.77

154
Q

Transactions to the source database are captured in logs, which are periodically transmitted by the source compute system to the remote compute system.Remote compute system applies these logs to the remote database.

A

Database Log Shipping Remote Replication2.77

155
Q

Replication is performed by the array operating environment

A

Storage Array based Remote Replication2.78

156
Q

Three Modes of Operation for Storage Array Based Remote Replication

A

1) Synchronous Replication2) Asynchronous Replication3) Disk Buffered Replication2.78

157
Q

Combination of local and remote replications.RPO usually on the order of hours.Low bandwidth requirements.Extended distance solution.

A

Disk Buffered Storage Array Based Remote Replication2.78

158
Q

Eliminates disadvantages of two site replication.Replicates data to two remote sites.

A

Three Site Replication2.79

159
Q

Allows replication between heterogeneous vendor storage arrays over SAN/WAN

A

SAN Based Replication2.79

160
Q

Changes to data are continuously captured or tracked.

A

Continuous Data Protection (CDP)2.79

161
Q

CDP

A

Continuous Data Protection2.80

162
Q

Captures all writes and maintains consistent point in time images.

A

Continuous Data Protection (CDP)2.79

163
Q

CDP Elements

A

CDP ApplianceStorage VolumesWrite Splitters2.80

164
Q

All data changes are stored in a location separate from the primary storage.Recovery point objectives are arbitrary and need not be defined in advance of the actual recovery.

A

Continuous Data Protection (CDP)2.80

165
Q

Runs the CDP software and manages all the aspects of local and remote replication.

A

CDP Appliance2.80

166
Q

Storage Volumes

A

Repository volume, journal volume, and replication volume.2.80

167
Q

Intercepts write from initiator and splits each write into two copies

A

Write Splitter2.80

168
Q

Store all data changes on the primary storage

A

Journal volumes2.80

169
Q

Dedicated volume on the SAN-attached storage at each site which stores configuration information about the CDP appliance.

A

Repository Volume2.80

170
Q

6 Key Management Activities in a CDC

A

1) Monitoring and Alerting2) Reporting3) Availability Management4) Capacity Management5) Performance Management6) Security Management2.82

171
Q

Four Key Parameters to be monitored

A

1) Accessibility2) Capacity3) Performance4) Security2.83

172
Q

Key components of a CDC that should be monitored

A

Compute systems, network, and storage2.83

173
Q

Integral part of monitoring

A

Alerting2.85

174
Q

Three Levels of Alerts Based on Severity

A

Information AlertWarning AlertFatal Alert2.85

175
Q

Types of Reports

A

Capacity Planning ReportChargeback ReportPerformance2.86

176
Q

Ensures adequate availability of resources based on their service level requirements.Manages resources allocation.

A

Capacity Management2.88

177
Q

Key Capacity Management Activities

A

Trend and Capacity AnalysisStorage Provisioning2.88

178
Q

Prevents data corruption on the storage array by restricting compute access to a defined set of logical devices.

A

LUN Masking2.90

179
Q

Used to restrict unauthorized HBAs in a SAN environment

A

Configuration of Zoning2.90

180
Q

Proactive strategy that enables an IT organization to effectively align the business value of information with the most appropriate and cost-effective infrastructure, from the time information is created, through its final disposition.

A

Information Lifecycle Management (ILM)2.92

181
Q

Intelligent storage system built on Virtual Matrix architecture

A

EMC Symmetrix VMAX2.95

182
Q

Operating environment for Symmetrix VMAX

A

Enginuity2.95

183
Q

Provides simplified storage management and provisioning, and options such as additional replication, migration and volume configuration.

A

Enginuity2.95

184
Q

Key components of a SAN environment

A

Fibre Channel switches and directors2.96

185
Q

EMC Connectrix Family

A

1) Enterprise directors (MDS-9513, DCX)2) Departmental switches3) Multi-protocol routers (MP-7800B)2.96

186
Q

Key ability of multi-protocol switches in a SAN environment

A

They can bridge FC-SAN and IP SAN, a feature that enables these devices to provide connectivity between iSCSI initators and FC storage targets.They also can extend a FC SAN over long distances through IP networks.2.96

187
Q

Disk-based backup and recovery solution that provides inherent source-based data deduplication

A

EMC Avamar2.97

188
Q

How does Avamar differ from traditional backup and recovery solutions?

A

Avamar identifies and stores only the unique sub-file data objects.2.97

189
Q

Target-based data deduplication solution with Data Invulnerability Architecture

A

EMC Data Domain2.97

190
Q

Provides centralized, automated backup and recovery operations across an enterprise.Provides both source-based and target-based deduplication capabilities by integrating with Avamar and Data Domain, respectively.

A

EMC Networker2.97

191
Q

Works with EMC Avamar and EMC Data Domain

A

EMC Networker2.97

192
Q

SRDF

A

Symmetrix Remote Data Facility2.98

193
Q

Offers a family of technology solutions to implement storage array based remote replication technologies.

A

EMC Symmetrix Remote Data Facility (SRDF)2.98

194
Q

VNX-basaed software that enables storage array based remote replication

A

EMC MirrorView2.98

195
Q

Symmetrix software that performs SAN-based remote replication between Symmetrix and qualified storage arrays.Has full or incremental copy capabilities.

A

EMC Open Replicator2.98

196
Q

Family of products used for full volume and pointer-based local replication in Symmetrix storage arrray

A

EMC Timefinder2.98

197
Q

VNX based local replication software that creates point-in-time views or point-in-time copies of logical volumes.

A

EMC Snapview2.98

198
Q

Product which offers CDP and CRR functionality

A

EMC Recover Point2.98

199
Q

Seven Key Requirements of a Data Center

A
  1. Manageability2. Availability3. Performance4. Flexibility5. Scalability6. Security7. Data Integrity2.4
200
Q

How can manageability be achieved?

A

Through automation and reduction of manual intervention in common tasks.2.4