Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Instructions to students:
1. Language allowed to answer is the English language.
2. The answer for the multiple choice questions should be written alphabetically (A, B, C, D, E) in a
table such as the next Multiple Choice FORM.
Any other form is not accepted
Answer Key D D D D D C C C C C
Questions 11 12 13 14 15 16 17 18 19 20
Answer Key B B B B B A A A A A
Questions 21 22 23 24 25 26 27 28 29 30
A A A A A B B B B B
Questions 31 32 33 34 35 36 37 38 39 40
C C C C C D D D D D
Questions 41 42 43 44 45 46 47 48 49 50
A A A A A B B B B B
3. Check that your Exam Paper is complete. The exam paper is 7 pages long in total.
Question One :Answer ALL the following, by selecting the correct answer in each. Place the answer
on the special Multiple Choice FORM Alphabetically. Each Point [0.5 Mark] Total [25 Marks]
3) Which requirement refers to the ability of a storage solution to grow with the business?
A. Availability
B. Manageability
C. Integrity
D. Scalability **
6) An application generates 400 small random IOPS with a read/write ratio of 3:1. What is the
RAID-corrected IOPS on the disk for RAID 5?
A. 400
B. 500
C. 700 **
D. 900
8) Which Cloud deployment model(s) is considered suitable for most start-up organizations?
A.Private Cloud only B. Hybrid Cloud only C. Public Cloud D.Both Private and
Hybrid Cloud
Answer: C
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 2 of 21
9) Which is an example of structured data?
A. Image B. PDF document C. Database ** D. Web page
10) What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB?
A. 64 KB
B. 128 KB
C. 256 KB **
D. 320 KB
14) In traditional storage provisioning, which LUN expansion technique provides improved
performance?
A. Concatenated metaLUN
B. Striped metaLUN **
C. Base LUN
D. Component LUN
15) Which mechanism provides protection to ‘uncommitted data in cache’ against power failure?
A. Mirroring
B. Vaulting **
C. Watermarking
D. Tiering
16) Which data center management activity ensures business continuity by eliminating single
points of failure?
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 3 of 21
18) Which statement about virtual machines is true?
21) Which RAID type uses parity to protect against data loss?
A. RAID 3 B. RAID 0 C. RAID 1 D. Nested
Answer: A
22) Which component of a compute system performs the creation and control of logical
storage?
A. Volume Manager B. Operating System C. DBMS D. Application
Answer: A
23) A compute resource is accessing data from storage over a network at the block level.
Which statement is true about the associated file system?
A. It is managed by the compute resource. B. It is managed by the storage.
C. It is part of the network. D. It is managed by the application.
Answer: A
24) An organization runs a proprietary operating system for its custom applications. System
performance has been declining at an increasing rate. They would like to leverage a Cloud
solution to address their problem.Which Cloud service model would be appropriate for them?
25) Which process provides data access control by restricting host access to specific LUN(s)?
A. LUN masking **
B. Zoning
C. Trespassing
D. VSAN
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 4 of 21
26) Which is a benefit of server clustering?
27) Which Cloud service model allows the user to run any operating system and application?
A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service
D.IT-as-a-Service
Answer: B
28) Which Cloud service model is most appropriate for application development?
A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service
D.IT-as-a-Service
Answer: B
32) Which component of an intelligent storage system isolates host from the mechanical delays
associated with rotating disks?
A. Front-end controller
B. Back-end controller
C. Cache **
D. Storage network
33) Which mode of flushing is activated when the cache reaches 100% of its capacity?
A. Idle
B. High watermark
C. Forced **
D. Low watermark
34) Which cable type provides minimum signal attenuation over long distance?
A. Twisted-pair copper
B. Coaxial copper
C. Single-mode optical **
D. Multimode optical
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 5 of 21
35) Which type of fabric login enables the exchange of upper layer protocol-related parameters
between N_Ports?
A. Fabric login
B. Port login
C. Process login **
D. ULP login
36) Which factors contribute to the overall service time of a mechanical disk?
A. Disk buffer time, full stroke, and rotation latency
B. Internal transfer rate, external transfer rate, and buffer time
C. Full stroke, average seek time, and track-to-track seek time
D. Average seek time, rotational latency, and data transfer rate **
38) Which statement best describes the capability of the FCIP protocol?
Answer: d
39) What best describes Recovery Point Objective (RPO)?
(a) The time within which business operations must resume after an outage
(b) The amount of data that an application must lose after an outage
(c) The time within which systems and applications must be recovered after an outage
(d) The point-in-time to which systems and data must be recovered after an outage
Answer: d
40) Which formula is used to calculate "mean time between failure (MTBF)"?
Answer: d
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 6 of 21
42) What enables communication among a group of nodes regardless of their physical location in a
Fibre Channel fabric?
Answer: a
Answer: Bridged
44) Which NAS implementation consolidates file-based and block-based access on a single storage
platform?
A. Unified **
B.Scale-out
C. Gateway
D. Both gateway and scale-out
45) Which type of iSCSI name requires a registered domain name to generate unique iSCSI
identifier?
A. iqn **
B. eui
C. WWN
D. MAC
46) Which Fibre Channel layer defines flow control and routing?
(a) FC-1
(b) FC-2
(c) FC-3
(d) FC-4
Answer: b
47) Which iSCSI host connectivity option offloads both iSCSI and TCP/IP processing from the
host CPU?
A. Standard NIC with iSCSI initiator software
B. iSCSI HBA **
C. TOE NIC
D. CNA
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 7 of 21
48) Which protocol encapsulates FC frames onto IP packet?
A. FCoE
B. FCIP **
C. iSCSI
D. CIFS
49) Which component of a NAS head translates file-level requests into block-storage requests?
A. Front-end ports
B. Optimized operating system **
C. CIFS and NFS
D. Network Interface Card
Question Two : Answer ALL the following Question Each Point [2 Mark] Total [10 Marks]
1- Define cloud computing and Describe the essential cloud characteristics [2 Marks]
cloud computing : A model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources, (e.g., servers, storage, networks, applications, and
services) that can be rapidly provisioned and released with minimal management effort or service
provider interaction.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 8 of 21
Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A
bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware
resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However,
this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the
hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is
designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities
such as resource management, high availability, security, and so on. In contrast to a bare-metal
hypervisor, a hosted hypervisor is installed as an application on an operating system. In this
approach, the hypervisor does not have direct access to the hardware and all requests must pass
through the operating system running on the physical compute system. Hosted hypervisors are
compatible with all the devices that are supported by the operating system on which it is installed.
Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are
many services and processes running on an operating system that are consuming compute system
resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training
purposes.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 9 of 21
5-Differentiate between different type of Mesh Topology [2 Marks]
• Full mesh
Each switch is connected to every other switch
Maximum of one ISL or hop is required for host-to-storage traffic
Host and storage can be connected to any switch
• Partial mesh
Not all the switches are connected to every other switch
Question Two : Answer only 10 of the following Question Each Point [3 Mark] Total [30 Marks]
1- Differentiate between different types of services models of cloud computing and different
types of deplyment models .
2- Describe the cloud computing reference model including all entities that operate at this
layer and Functions of the physical layer (support your answer with figures).
3- List different Fabric Port Types and explain the different Types of Zoning
4- Explain briefly the main Components of FC SAN
5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA
and SCSI , and etc. .
6- Explain the two different types of Read Operation with Cache and the two different types
of write Operation with Cache
7- Explain briefly the main Components of FC SAN and its implementations
8- Differntionate by graph between Data Center Infrastructure – Before Using FCoE and
after Using FCoE
9- Sometimes , Some people considered that backup and replication are two sides of the same
coin , Explain the validity of previous information.
10- Explain the differnec between difernt type of protocol stack of FC SAN , IP SAN
11- Differntionate between different RAID levels according to minimum number of disks ,
available storage capacity % ,write penality , and protection.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 10 of 21
1-Differentiate between different types of services models of cloud computing and different types of
deplyment models .
A cloud service model specifies the services and the capabilities that are provided to consumers. In
SP 800-145, NIST classifies cloud service offerings into the three primary models listed below:
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
The different service models provide different capabilities and are suitable for different consumers
and business objectives. The factors that a provider should take into consideration while adopting a
particular cloud service model are covered in ‘Building the Cloud Infrastructure’ module.
Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various
publications and by different industry groups. These service models are specific to certain specialized
cloud services and capabilities that (they) provide. Such cloud service models are Backup as a
Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS),
Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on.
However, these models eventually belong to one of the three primary cloud service models.
A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and
accessed. In SP 800-145, NIST specifies the four primary cloud deployment models listed below:
Public cloud
Private cloud
Hybrid cloud
Community cloud
Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and
SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost,
and availability of resources.
2- Describe the cloud computing reference model including all entities that operate at this layer and
Functions of the physical layer (support your answer with figures).
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 11 of 21
3- List different Fabric Port Types and explain the different Types of Zoning
A port in a switched fabric can be one of the following types:
• N_Port is an end-point in the fabric. This port is also known as the node port (or FC adapter port). Typically,
it is a compute system port (on an FC HBA) or a storage system port connected to a switch in a fabric.
• E_Port is a switch port that forms a connection between two FC switches. This port is also known as an
expansion port. The E_Port on an FC switch connects to the E_Port of another FC switch in the fabric
through ISLs.
• F_Port is a port on a switch that connects an N_Port. It is also known as a fabric port.
• G_Port is a generic port on some vendors’ switches. It can operate as an E_Port or an F_Port and determines
its functionality automatically during initialization.
• Zoning can be categorized into three types: WWN zoning, port zoning, and mixed zoning.
• WWN zoning uses WWNs to define zones. The zone members are the unique WWPN addresses of the ports
in HBA and its targets (storage systems). A major advantage of WWN zoning is its flexibility. WWN zoning
allows nodes to be moved to another switch port in the fabric and to maintain connectivity to their zone
partners without having to modify the zone configuration. This is possible because the WWN is static to the
node port.
• Port zoning uses the switch port identifier to define zones. In port zoning, access to data is determined by the
physical switch port to which a node is connected. The zone members are the port identifier (switch domain
ID and port number) to which an HBA and its targets are connected. If a node is moved to another switch
port in the fabric, then zoning must be modified to allow the node, in its new port, to participate in its
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 12 of 21
original zone. However, if an HBA or a storage system port fails, an administrator just has to replace the
failed device without changing the zoning configuration.
• Mixed zoning combines the qualities of both WWN zoning and port zoning. Using mixed zoning enables a
specific node port to be tied to the WWN of a node.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 13 of 21
Available in wide variety of related technologies and standards
Support up to 16 devices on a single bus
Ultra-640 version provides data transfer speed up to 640 MB/s
• Serial Attached SCSI (SAS)
Point-to-point serial protocol replacing parallel SCSI
Supports data transfer rate up to 6 Gb/s (SAS 2.0)
Fibre Channel and IP
• Fibre Channel (FC)
Widely used protocol for high speed communication to the storage device
Provides a serial data transmission that operates over copper wire and/or optical fiber
Latest version of the FC interface ‘16FC’ allows transmission of data up to 16 Gb/s
• Internet Protocol (IP)
Traditionally used to transfer host-to-host traffic
Provide opportunity to leverage existing IP based network for storage communication
Examples: iSCSI and FCIP protocols
6- Explain the two different types of Read Operation with Cache and the two different types of write
Operation with Cache
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 14 of 21
7-Explain briefly the main Components of FC SAN and its implementations
Components of FC SAN
• Node (server and storage) ports
• Cables
• Connectors
• Interconnecting devices such as FC switches and hubs
• SAN management software
Components of a NAS device:
-Network Interface
-NFS
-CIFS
-Dedicated optimized OS
-Storage interface
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 15 of 21
NAS Implementation – 1- Unified NAS
• Pools multiple nodes together in a cluster that works as a single NAS device
Pool is managed centrally
• Scales performance and/or capacity with addition of nodes to the pool non-disruptively
• Creates a single file system that runs on all nodes in the cluster
Clients, connected to any node, can access entire file system
File system grows dynamically as nodes are added
• Stripes data across all nodes in a pool along with mirror or parity protection
8-Differntionate by graph between Data Center Infrastructure – Before Using FCoE and after Using
FCoE
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 16 of 21
9- Sometimes , Some people considered that backup and replication are two sides of the same coin ,
Explain the validity of previous information.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 17 of 21
Backup vs. Replication
Definition
Backup involves making a copy or copies of data.
Replication is the act of copying and then moving data between a company’s sites. It is typically
measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO).
Requirements
Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store
archived tapes.
Replication requires investment in another, identical, infrastructure, effectively doubling your IT
costs.
Purpose
Backup focuses on compliance and granular recovery, such as recovering a single user’s emails from
5 years ago.
Replication and recovery focus on business continuity — quick and easy resumption of operations
after a disaster or corruption. Minimizing the recovery time objective (RTO) is key.
Uses
Backup is typically used for everything in the enterprise, from critical production servers to
desktops.
Replication is often used for mission-critical applications that must always be up and running.
How it Works
Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point
in time.
Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data
Protection (CDP) to enable users to access historic images.
Bottom Line
Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure
continuity of operations.
Focused on ensuring that business applications and processes are always available, even after a
disaster. More expensive to set up and maintain.
This table begs the question asked by Chris Mellor in a post on The Register
10 Explain the differnec between difernt type of protocol stack of FC SAN , IP SAN
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 18 of 21
12- Differntionate between different RAID levels according to minimum number of disks ,
available storage capacity % ,write penality , and protection.
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 19 of 21
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 20 of 21
Good Luck Dr. Diaa Salama
Committee of Examiners and correctors: 1st Member/ ……………………..………………….……….. 2nd Member/ ………………………………………………….. Page 21 of 21