Common enterprise tape cartridges such as LTO or DLT contain which components?
A. leader pin, write protect switch, supply reel, access door
B. leader pin, read/write head assemble, supply reel, access door
C. leader pin, write protect switch, supply reel, pickup reel
D. leader pin, read/write head assemble, supply reel, pickup reel
Which RAID level is the most commonly used for file servers, application server, web server, databases, and other transaction-oriented applications?
A. RAID 1
B. RAID 3
C. RAID 4
D. RAID 5
A unix server has recently been unable to mount its file systems after the HBA driver has been replaced and driver has been upgraded. What is the cause of the problem?
A. The switch zoning was based on port assignments
B. the Switch using worldwide naming has not been updated
C. the disk array firmware was not updated
D. The file system table was not updated to reflect the changes in device IDs.
What is the definition of asinchronous replication?
A. Does not require acknowledged copy of data on primary and secondary storage before the write is acknowledged to the host.
B. requires acknowledged write of data on primary storage only and data is forwarded to secondary site as network capabilities permit
C. Requires acknowledged write of data on primary and secondary storage before the write is acknowledged to the host.
D. Does not require acknowledged write of data on primary storage before data is forwarded to secondary site as network capabilities permit
Which storage networking environment uses file access through a standard Ethernet network?
A. SAN
B. NAS
C. CAS
D. DAS
What the steps to restore a complete backup that is using incremental method and has run three times already?
A. latest full must be restored
B. latest incremental and all subsequent must be restored
C. latest full and subsequent incremental backups must be restored
D. latest full and latest incremental backup must be restored
Which method protects data bu maintaining separate copies of the data on two or more disks?
A. backup to disk
B. mirroring
C. parity RAID
D. NDMP
Which approach is commonly used for disaster recovery applications?
A. snapshots
B. RAID 5
C. replication
D. mirroring
Which two describe a NAS "head" or gateway? ( Choose two)
A. integrated disk storage
B. connection to an IP network
C. replication facilities to tier 2 storage
D. "file serving" to clients and servers
E. snapshot feature set for efficient backup and recovery.
What are two advantages of virtualization? (Choose two.)
A. improves data integrity
B. allows file sharing between dissimilar applications
C. increases the storage capacity of available disks
D. increases the number of storage devices an operator can manage
E. provides higher asset utilization