Easter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

S10-210 Sample Questions Answers

Questions 4

A SAN environment with zones containing a large number of members is experiencing hosts randomly, losing connectivity to SAN-attached storage resources. You have been asked by the customer to address this situation.

Which action should you implement to resolve this issue?

Options:

A.

Edit the host definitions used for LUN masking on the storage systems.

B.

Implement persistent binding on the storage LUNs.

C.

Reconfigure each fabric's zone set for single-initiator zones.

D.

Remove all zones between the primary and DR data centers.

Buy Now
Questions 5

You want to prevent unauthorized switches from connecting to your company's fabrics.

What should you do?

Options:

A.

Configure ACLs.

B.

Implement CHAP.

C.

Deploy FC-SP policy.

D.

Implement binding lists.

Buy Now
Questions 6

After the storage administrator merged two multi-vendor FC SANs, an error indicates that two ports have become isolated causing a segmentation to exist in the fabric.

Which two events would cause this? (Choose two.)

Options:

A.

Overlapping zones

B.

Different port names

C.

Unsupported routing protocols

D.

Different link speeds

Buy Now
Questions 7

Click the Exhibit button.

Which protocol is represented in the exhibit?

Options:

A.

iSCSI

B.

IPv6 Ethernet

C.

IPv4 Ethernet

D.

FCoE

Buy Now
Questions 8

You have been asked to implement a remote data replication scheme. The current data center is mostly constructed of FC components and the corporation is highly invested in the technology. The remote data center needs a synchronous replication solution.

What will accomplish this goal?

Options:

A.

iSCSI

B.

NAS

C.

FCIP

D.

FCoE

Buy Now
Questions 9

You are asked to set up a server to boot from a SAN.

Which setting on the HBA needs to be configured?

Options:

A.

Change the queue depth value.

B.

Set Enable BIOS.

C.

Enable Persistent Bindings.

D.

Set Enable Target Rescan.

Buy Now
Questions 10

You have two new FC switches from the same vendor and want to connect them together. You have ensured that the domain IDs are unique, switch names are unique, and the firmware levels are identical. When you connect the ISL cables from one switch to the other, the fabric does not merge.

What should be confirmed?

Options:

A.

Ensure the ISL ports are E_Ports.

B.

Ensure the ISL ports are B_Ports.

C.

Ensure the ISL ports are F_Ports.

D.

Ensure the ISL ports are N_Ports.

Buy Now
Questions 11

A number of servers are experiencing slower than expected performance. Analyzing the server, switch, and storage logs do not indicate any issues. You have been asked by the customer to address this issue.

What will improve performance?

Options:

A.

Increase the current queue depth setting from 1.

B.

Change the frame size from 2148 bytes,

C.

Decrease the buffer-to-buffer credits setting.

D.

Enable write caching functionality for the device driver.

Buy Now
Questions 12

You have received an emergency call from the night shift after they attempted to merge three small SANs in the engineering department. Once completed, all devices in SANs A and B communicate with one another but SAN C could not communicate with either of the other SANs because the fabric has become segmented.

Which statement is correct?

Options:

A.

The port is isolated until a fabric rebuild occurs,

B.

The port is isolated until a fabric re-configuration occurs.

C.

The system administrator must manually correct the issue that caused segmentation (port isolation) and then start the Build Fabric (BF) process.

D.

The system administrator must manually correct the issue that caused port isolation (segmentation) and then start the Reconfiguration Fabric (RCF) process.

Buy Now
Questions 13

You are designing a security solution for a storage array which stores customer credit card information. Data on the storage array must be encrypted and if necessary, you want to be able to revoke access to data on demand.

In addition to encryption, which solution would allow you to do this in a secure and automated fashion?

Options:

A.

Use a manual record deletion solution.

B.

Physically destroy hard drives holding the data

C.

Store data indefinitely.

D.

Use the key management solution.

Buy Now
Questions 14

Click the Exhibit button.

Referring to the exhibit, what are the two largest risks to a highly available solution? (Choose two.)

Options:

A.

Only two adapters per controller

B.

Only two adapters on the server

C.

Only one server

D.

Only one switch

Buy Now
Questions 15

After provisioning a new LUN to a host, new storage cannot be detected on the host. Which three actions should be performed to troubleshoot this problem? (Choose three.)

Options:

A.

Scan memory on a host.

B.

Scan for new storage on the host,

C.

Verify that LUN mapping is correct.

D.

Verify that zoning on the FC switch is correct.

E.

Verify that the size of memory pages and block size is the same.

Buy Now
Questions 16

What is the maximum distance between two 8 Gb FC ports that can be connected using 50 µOM3 grade multimode fiber cable?

Options:

A.

500 meters

B.

300 meters

C.

250 meters

D.

150 meters

Buy Now
Questions 17

Which type of a backup changes the archive bit?

Options:

A.

Full

B.

Differential

C.

Incremental

D.

Block-level

Buy Now
Questions 18

Some business critical database applications have been suffering from slowly increasing performance issues with one enterprise SAN-attached storage system. In particular, the applications are showing higher than normal read response times.

What should the storage administrator monitor to determine the root cause?

Options:

A.

Storage utilization

B.

Available free space

C.

Write response time

D.

Cache hit rate

Buy Now
Questions 19

Only one of many servers is suffering poor performance with a nearline (Tier 2) storage system. The server administrator has not discovered any obvious root cause. The server has multiple paths to the storage system but only one path is active. Routine monitoring by the storage administrator has determined that a single storage port has received a high number of bad frames.

What should the SAN administrator do?

Options:

A.

Determine the source of duplicate frames.

B.

Verify that the host ports are correctly zoned.

C.

Find the source of frames with CRC errors.

D.

Collect new performance data and compare to the baseline.

Buy Now
Questions 20

Click the Exhibit button.

Referring to the exhibit, which three switch indicators will help you to determine the stability of a link? (Choose three.)

Options:

A.

er_crc

B.

er_toolong

C.

er_enc_in

D.

er_bad_eof

E.

er_trunk

Buy Now
Questions 21

Click the Exhibit button.

What is the protocol stack shown in the exhibit?

Options:

A.

FCoE

B.

SCSI

C.

InfiniBand

D.

Fibre Channel

Buy Now
Questions 22

You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).

Which two protocol methods would be used? (Choose two.)

Options:

A.

Directory Name Service protocol (DNS)

B.

Simple Network Management Protocol (SNMP)

C.

Internet Storage Name Server protocol (iSNS)

D.

Service Location Protocol (SLP)

Buy Now
Questions 23

Only one of many servers has poor performance within an enterprise SAN. The server administrator has found high disk timeout values without a decrease in throughput. The server has multiple paths to the storage system but only one path is active at this time.

What should the storage administrator monitor to assist with troubleshooting?

Options:

A.

Number of errors on the active storage port

B.

IOPS on the active storage port

C.

MBps on the active storage port

D.

Buffer-to-buffer utilization by the active storage port

Buy Now
Questions 24

A server with a dual-ported HBA loses access to storage during switch SFP replacement. You want to prevent this from happening in the future.

Which action should you perform?

Options:

A.

Use zoning

B.

Enable trunking.

C.

Use LUN masking

D.

Configure multipathing

Buy Now
Questions 25

A storage networking device has experienced a failure that has "phone home" and opened a service request for a part that can be a customer replaceable unit (CRU). Your support vendor has dispatched a replacement part using a secure courier service.

According to SNIA Storage Security Best Current Practices, which statement is correct about the repair process?

Options:

A.

The support vendor's parts courier should have access to the secure data center to facilitate an unattended part swap-out bringing the fastest resolution to the failure.

B.

The data center operations staff should accept the part and place it in a secure staging area awaiting a qualified administrator to perform the installation.

C.

Any data center operator on-site should perform the part installation bringing the fastest resolution to the failure.

D.

The support vendors parts courier should coordinate with a field service staff person from your support vender; both should have access to the secure data center to facilitate an unattended part swap-out.

Buy Now
Questions 26

A company has a storage subsystem that supports a variety of replication options. They have purchased an identical array and placed it at a secondary site 4,200 km away and want to keep the two arrays as closely synchronized as possible.

Which solution should be chosen?

Options:

A.

Asynchronous replication is the only replication option for distances of this length.

B.

Synchronous replication is the only replication option for distances over 4,000 km.

C.

Snapshots allow for data to be quickly captured, copied, and mounted from one storage array to another and is the ideal solution for all distances.

D.

Synchronous replication will keep the arrays in the closest sync and is ideal for short distances such as 4,200 km.

Buy Now
Questions 27

A line of business (LOB) executive informs you that a new application requires 99.999% (five 9s) of up-time from both planned and unplanned outages before a service level objective (SLO) will be breached.

What is the amount of permissible downtown per week?

Options:

A.

20.16 minutes

B.

.605 seconds

C.

5.04 minutes

D.

6.06 seconds

Buy Now
Questions 28

Your company's Service Level Agreement (SLA) requires that no more then one hour's worth of data be lost in case of a system crash. The data must also be restored within 10 hours.

Which two RTO/RPO combinations meet the SLA? (Choose two.)

Options:

A.

RTO 1 hour, RPO 10 hours

B.

RTO 10 hours, RPO 1 hour

C.

RTO 9 hours, RPO 1 hour

D.

RTO 1 hour, RPO 9 hours

Buy Now
Questions 29

You have a file system which allows data and metadata segregation.

How should you accelerate read I/O on the file system while keeping costs low?

Options:

A.

Assign the fastest storage to the data portion of the file system.

B.

Assign the fastest storage to the metadata portion of the file system.

C.

Assign fast storage to the data and the metadata portions of the file system.

D.

Keep the file system very small.

Buy Now
Exam Code: S10-210
Exam Name: Storage Networking Management and Administration
Last Update: May 15, 2024
Questions: 97
$64  $159.99
$48  $119.99
$40  $99.99
buy now S10-210