Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

S10-210 Exam Dumps - Storage Networking Management and Administration

Go to page:
Question # 9

You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.

What should be used?

A.

Roles

B.

VSAN

C.

ACL

D.

Zone

Full Access
Question # 10

A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.

Which two protocols should be disabled? (Choose two.)

A.

HTTPS

B.

Telnet

C.

SSH

D.

SNMPv1

Full Access
Question # 11

A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.

Which solution will meet the requirements?

A.

Add sufficient SSDs to an existing nearline storage system.

B.

Add sufficient SSDs to an existing enterprise storage platform.

C.

Add sufficient SAS drives to an existing enterprise storage platform.

D.

Add sufficient SAS drives to an existing nearline storage system.

Full Access
Question # 12

Your organization operates in a regulated environment and contracts with a service provider to manage tape backup media for highly confidential, secure data.

Using SNIA Storage Security Best Practices, which two statements are correct? (Choose two.)

A.

Tape backup media is stored in a secure, temperature controlled vault.

B.

The service provider keeps unencrypted backup media locked during transport.

C.

All removable media is encrypted and backup media locked during transport.

D.

The customer manages the chain of custody.

Full Access
Question # 13

You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.

Which server within the Fibre Channel fabric would be used to do this?

A.

Fabric Login server

B.

Name server

C.

Management server

D.

Fabric Controller

Full Access
Question # 14

You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.

What is the cause?

A.

The database requires replication from a second storage array.

B.

The database requires synchronous storage replication.

C.

Two copies of databases are required at the DR site to be able to replay transaction logs.

D.

An installed agent is required for the database to be quiesce and replicated in crash-consistent state.

Full Access
Go to page: