What is an advantage of a core/edge topology?
A. Multiple backup processes can now run on one ISL.
B. There is increased management for SAN capacity planning.
C. It has performance characteristics suitable fortiering.
D. Fewer edge switches are used in this design thereby reducing the overall cost.
What does SAN performance management monitor and analyze?
A. SNMP traffic
B. SAN traffic patterns
C. RSCN traffic patterns
D. SAN name server traffic
Which two statements about a SAN switch configuration restore are true? (Choose two.)
A. The switch must first be disabled before any parameters can be changed.
B. The IP address parameters cannot be restored to a switch.
C. Fabric switch parameters can be restored to a previous configuration when the switch is offline.
D. The IP address parameters can be restored to a switch.
E. Fabric switch parameters can be restored to a previous configuration when the switch is online.
What are three characteristics of B-Series (Brocade) Fabric Manager? (Choose three.)
A. is a separate software package
B. single switch management
C. multiple switch management
D. provides out-of-band management
E. provides in-band management
F. is embedded in the Brocade switch firmware
A SAN administrator has an existing test SAN, based on 1 Gbps B-series (Brocade) fabric switches. To evaluate the compatibility of 1 Gbps and 2 Gbps switches, the administrator powers on a 1 Gbps and a 2 Gbps fabric switch (factory default settings). An ISL is then installed between the two fabric switches. The administrator notices that the fabric segments. What are two possible causes of this segmentation? (Choose two.)
A. The new switch has a conflicting Domain ID.
B. The zoning information is incompatible.
C. The speed on the port must first be set for 1Gbps operation.
D. The Core PID parameters are conflicting.
A business continuity strategy for the protection of data can be built on techniques and procedures to _____. (Choose two.)
A. avoid data loss
B. recover data that has been lost
C. shrink the backup and recovery window
D. provide Hierarchical Storage Management (HSM)
You have a topology with two 16-port switches in a cascaded SAN using four ISLs from each switch. What is the port efficiency of the topology?
A. 25%
B. 40%
C. 75%
D. 100%
What virtualization model is used in the Continuous Access Storage Appliance (CASA)?
A. symmetrical pooling or also called in-band virtualization
B. either symmetrical or asymmetrical selected at the initial configuration
C. asymmetrical pooling or also called out-band virtualization
D. out-band management of symmetrical virtual objects
Knowing very little about a customer and their environment, you are asked to propose a large SAN solution. What three recommendations should you make? (Choose three.)
A. manage all LUN masking at the switch-level
B. use only core or director switches
C. create a SAN design which is a subset of a larger design
D. use core plus edge switch topology
E. use multiple independent fabrics
F. never mix 1Gbps switches with 2 Gbps switches
On what is the design of the "Tree" SAN topology based?
A. a fabric design that has one or moreFibre Channel switches acting as fabric backbones which dedicate all FC ports as ISLs
B. a fabric design that has one or moreFibre Channel switches acting as the ISL trunk manager
C. a fabric design that has one or moreFibre Channel switches acting as the Topology Configuration server
D. a fabric design that has switches that act as policy controllers for storage failover