Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

S10-210 Exam Dumps - Storage Networking Management and Administration

Question # 4

A customer has upgraded all switches in their redundant fabrics during a single maintenance window. Shortly after the upgrades are completed on the core switches, all servers lose access to all SAN attached storage.

What would have prevented this scenario?

A.

High availability

B.

Fault tolerance

C.

Change or risk management

D.

Clustered servers

Full Access
Question # 5

You are asked to secure 2.5 PB of data so that in case of a failed drive replacement, data on the drives is not usable.

Which data protection method should be used in this case?

A.

Encrypting data-in-flight

B.

Encrypting data-at-rest

C.

Password protect each file

D.

Use file permissions

Full Access
Question # 6

A company needs to replicate a database from its main office to a disaster recovery site 3,000 km away with a five minute recovery point objective.

Which type of replication should the company use to replicate the data?

A.

Synchronous

B.

Asynchronous

C.

Multi-synchronous

D.

Local replication

Full Access
Question # 7

A line of business (LOB) executive informs you that a new application requires 99.999% (five 9s) of up-time from both planned and unplanned outages before a service level objective (SLO) will be breached.

What is the amount of permissible downtown per week?

A.

20.16 minutes

B.

.605 seconds

C.

5.04 minutes

D.

6.06 seconds

Full Access
Question # 8

You have twelve 500 GB drives and you need to provide two LUNs using RAID 6 protection for a customer.

What will be the size of each LUN?

A.

1.5 TB

B.

1.75 TB

C.

2 TB

D.

2.25 TB

Full Access
Question # 9

You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.

What should be used?

A.

Roles

B.

VSAN

C.

ACL

D.

Zone

Full Access
Question # 10

A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.

Which two protocols should be disabled? (Choose two.)

A.

HTTPS

B.

Telnet

C.

SSH

D.

SNMPv1

Full Access
Question # 11

A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.

Which solution will meet the requirements?

A.

Add sufficient SSDs to an existing nearline storage system.

B.

Add sufficient SSDs to an existing enterprise storage platform.

C.

Add sufficient SAS drives to an existing enterprise storage platform.

D.

Add sufficient SAS drives to an existing nearline storage system.

Full Access
Question # 12

Your organization operates in a regulated environment and contracts with a service provider to manage tape backup media for highly confidential, secure data.

Using SNIA Storage Security Best Practices, which two statements are correct? (Choose two.)

A.

Tape backup media is stored in a secure, temperature controlled vault.

B.

The service provider keeps unencrypted backup media locked during transport.

C.

All removable media is encrypted and backup media locked during transport.

D.

The customer manages the chain of custody.

Full Access
Question # 13

You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.

Which server within the Fibre Channel fabric would be used to do this?

A.

Fabric Login server

B.

Name server

C.

Management server

D.

Fabric Controller

Full Access
Question # 14

You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.

What is the cause?

A.

The database requires replication from a second storage array.

B.

The database requires synchronous storage replication.

C.

Two copies of databases are required at the DR site to be able to replay transaction logs.

D.

An installed agent is required for the database to be quiesce and replicated in crash-consistent state.

Full Access