You have a RAID 5 set with five disks at 400 GB each. Approximately how much usable space would this configuration yield?
A. 1 terabyte
B. 2 terabytes
C. 1.2 terabytes
D. 16 terabytes
Which two statements regarding hybrid drives are correct? (Choose two.)
A. Flash memory stores frequently accessed content.
B. Flash memory is located on the motherboard of the server
C. Flash memory is located on the HDD circuit board.
D. Flash memory is not used with a hybrid drive.
A company is concerned with high space usage on ils storage devices, especially during certain periods of
time when the same or similar information is being sent or received.
Which solution will address this concern?
A. data compression
B. encryption
C. thin provisioning
D. deduplication
You explain to a customer that storage data compression can be used on most data types. However, there are exceptions. Which file type is an exception?
A. *.bat
B. *.jpg
C. *.txt
D. *.ora
What would be placed in a Fibre Channel zone?
A. MAC address
B. IQN of an initiator
C. |p address
D. World Wide Port Name (WWPN)
Your customer has a Fibre Channel SAN environment and has properly zoned servers for storage with front end controller ports. When an administrator goes to initialize a provisioned volume, it is not seen on the server. What would cause this problem1?
A. an unplugged cable
B. a multi-path I/O failure
C. a corrupted volume
D. improper LUN masking
Which two technologies use NAND flash memory (non-volatile) technology to store data? (Choose two.)
A. quad-level cell (QLC)
B. single-level cell (SLC)
C. interim-level cell (ILC)
D. mufti -level cell (MLC)
Which statement is correct regarding LUNs?
A. a representation of segmented storage space to be provided to their servers
B. a scenario where log file servers reach maximum disk capacity
C. a method for encapsulating Fibre Channel frames
D. a method for optimizing LAN traffic
What are three iSCSI configuration optimization techniques? (Choose three.)
A. Combine iSCSI data traffic with management IP traffic for maximum efficiency.
B. Enable jumbo frames
C. Isolate iSCSI traffic from other IP frames.
D. Place a firewall between initiators and targets for security
E. Enable flow control on switches.