A customer has upgraded all switches in their redundant fabrics during a single maintenance window. Shortly after the upgrades are completed on the core switches, all servers lose access to all SAN attached storage.
What would have prevented this scenario?
You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.
Which data protection method should be used in this case?
A company needs to replicate a database from its main office to a disaster recovery site 3,000 km away with a five minute recovery point objective.
Which type of replication should the company use to replicate the data?
A line of business (LOB) executive informs you that a new application requires 99.999% (five 9s) of up-time from both planned and unplanned outages before a service level objective (SLO) will be breached.
What is the amount of permissible downtown per week?
You have twelve 500 GB drives and you need to provide two LUNs using RAID 6 protection for a customer.
What will be the size of each LUN?
You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.
What should be used?
A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)
A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.
Which solution will meet the requirements?
Your organization operates in a regulated environment and contracts with a service provider to manage tape backup media for highly confidential, secure data.
Using SNIA Storage Security Best Practices, which two statements are correct? (Choose two.)
You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.
Which server within the Fibre Channel fabric would be used to do this?
You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.
What is the cause?