A. Switch
B. Raid arrays
C. Tape drives
D. Hub
Explanation: Switches, RAID arrays and tape drives are the main storage devices in SMI-S, while a Hub is simple networking device that cannot be used as storage.
A. 10001101
B. 1001110
C. 10110001
D. 10001101
Explanation: High – 1, Low – 0.
A. San management
B. Data protection
C. Disk operation
D. All of the mentioned
Explanation: SAN management, data protection and disk operation are the main components of the Storage Management Initiative Specification. SMI-S was developed by the Storage Networking Industry Association.
A. Snmp
B. Ldap
C. Pop3
D. Mib
Explanation: Simple Network Management Protocol is used for storage management. Lightweight Directory Access Protocol is used to access or locate information about directories and other resources on a network. Post Office Protocol 3 is used for e-mailing on the internet. Management Information Base is a part of SNMP and contains hierarchically organized information.
A. Proprietary management interfaces
B. Multiple applications to manage storage in the data center
C. No single view
D. Single view
Explanation: A single view is not possible with diverse vendors present. Proprietary management interfaces, multiple applications management and no single view are the main difficulties incurred by a SAN administrator in such a situation.
A. By using zoning
B. By putting a physical lock on the storage device
C. By keeping devices shutdown when not in use
D. By keeping devices when used
Explanation: Zoning is a method in SAN that can be used by a storage administrator to specify who can see what in the SAN. Zoning might complicate the scaling process if the size of the SAN increases.
A. Security
B. Backups
C. Reporting
D. Connection
Explanation: Connection is the responsibility of the connection manager. Storage management includes management of all necessities such as security, backups and reporting facilities.
A. Identifying storage systems are approaching full capacity
B. Monitoring trends for each resource
C. Tracking total capacity, total used, total available
D. Preventing unauthorized access to the storage
Explanation: Prevention of unauthorized access to storage is the task of Security management. Identifying when the storage is approaching full capacity, monitoring trends, reporting and tracking capacity are the tasks of Storage Capacity management.
A. Standardization drives software interoperability and interchange ability
B. Breaks the old-style dependence on proprietary methods, trade secrets, and single providers
C. Builds a strong foundation on which others can quickly build and innovate
D. All of the mentioned
Explanation: Open standards like SMI-S inculcate a general ideal through which the normal designers are able to easily implement the standard into their software and its scalability. Since it is open-source, nothing is hidden from its users and they can implement it as they like or require to. As a whole lot of time is spent to build it as strong and scalable, it provides an efficient foundation to the designers to build and innovate on.
A. To promote interoperability among the management solution providers
B. To act as an interface between the various budding technologies and provide solution to manage various environments
C. To track the operation of the different management solution providers
D. To manage the facility by itself if one of the management solution providers fail
Explanation: The Distributed Management Task Force is used just to simplify the overall management of the network. It cannot manage a network facility by itself in case one of the management solution providers fails. It provides an interface for promoting interoperability among management solution providers.