Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ISM V5

QuestionAnswer
sub-LUN tiering Improved Performance
Backup operations Backup server
FC-1 layer transmission words Primitive signals Link Initialization
Write split operation Production volume
Block-based storage Fixed blocks of 512 bytes each
Migrate Software as a Service
4 coding segments 4
Continuity solution Maintains availability
Content-based Machine learning
fully functional SAN ISCSI
rotation latency Speed of the Spindle
VSANs By providing isolation over a shared infrastructure
Addition of infrastructure Scalability
Why should the replica be consistent with its source? Usability
Virtual tape library Legacy backup software can be used without additional modules or changes
Monitoring availability Identify component failures that may lead to service unavailability
data in cache Vaulting
Defense in depth Provides additional time for organizations to detect and respond to an attack
“Sequence” Contiguous
dynamic disk sparing Assuming the identity
OSI Transport
Lossless Ethernet network Data center bridging
Middleware Platform as a service
intelligent storage system controllers SAS
MapReduce HDFS
Mobile Device Management Authenticate the device that requests access
SLAs Operation management
Storing back up data Source-based
training and testing Supervised Learning
random data access Virtual tape library
Malware on end-user’s computer Keystroke logging
NDMP client Instructs the NAS head
link aggregation Provides a heighten throughput than a single interswitch link can provide
unified storage systems Common storage pool
5G technology Higher connectivity density
Automation of sensors and devices Internet of Things
Software-defined storage platform ViPR Controller
Automate the operations management Mitigates operation management risks
Port 2 71.6%
Resource-oriented architecture REST
(SMB) Common Internet File System (CIFS)
Raid 1 Two write I/Os
VM storage migration solution Management of capacity
On demand Image-based backup
File and object PowerScale
Migrating to a modern data center Reduce Management complexity
200 GB 400 GB
Availability of Port 5 91.6% or 95.8%
Incident in a storage infrastructure Functionality of the system
Cloning a VM Saves time when creating multiple copies of a VM
Minor difference between two documents Variable-length segment
Do-It-Yourself Products and services
File-level virilization Non-disruptive
Parity-based Reduces the Capacity required to protect the data
inherent source-based deduplication Avamar
Point of creation Edge computing
What accurately describes an object-based storage device (OSD)? Objects exist at the same level in the address space
PIT snapshots of the VM Image-based
Hardening process Disable Unnecessary application features or services
Increasing the number of FC switches Reduces switch ports available for Node connectivity
Windows clients CIFS
Sends metadata and tracking information Backup agent
One active ISL Full mesh
Which IDPS technique uses a database that contains known attack patterns Signature-based
Repurpose existing infrastructure components Brownfield
REST API interface S3
“Variability” Diversity Or Importance
Connectrix DS-6600B
What is an accurate statement about Storage Class Memory (SCM)? SCM can be addressed at the bit or word level
Journal space How far back
amount of space configured for the journal Amount of data
Multi-site remote replication solution Near-zero RPO
IP-based network infrastructure Extend the network over long distances
Long backup window Source-based with variable-length deduplication
What triggers an appropriate workflow upon receiving a service provisioning or management request? Orchestrated operations
Policy engine Moves the appropriate data into archive storage automatically
parameters define information availability in a modern data center environment Reliability Accessibility Timeliness
VMware VRealize Orchestrator
What is the MTBF of Port 5 38 hours
Secure the connection between the data center and cloud while performing data backup and replication Identity and Access management
What statement describes machine learning? Applies an algorithm
Connects SSD drives to the storage array controller NVMe/TCP
Which security mechanism ensures secure access to internal assets while enabling Internet-based access to selected resources? Demilitarized zone
Scale-out NAS Stripes data
Business continuity solutions Eliminate the time required
governance Determines strategy
What is a function of a continuous data protection (CDP) appliance? Splits each write
Cyber recovery Isolate copies of critical data to ensure that an uncompromising copy always exists
Passive attack Access is obtained Or Privacy is compromised
System-based replication Snapshots are immediately accessible
Storage controller Ability to pool and abstract
Infrastructure discovery Creates an inventory
“Recovery-in-place” Disk-based backup target
Continuous replication Reduce the RPO
OpenID Eliminates the need to deploy a Separate authentication system
Traffic monitoring 1. Two active 2. But not both
Manage their data Leveraging existing data
Abstracts and provides a common view Global namespace
Single organization having multiple consumers Private Cloud
Protect the data Encryption Or Encryption
Intelligent storage systems Effectively store and manage information Across data centers
Security management task LUN masking to restrict hosts
LUN masking to restrict hosts Security management
FCoE environment Jumbo frames for optimal performance
ISCSI connectivity ISCSI initiator
(ISL) Core-edge
Moving data between storage systems Data migration
Granularity Incremental
Consume compute, network, and storage resources through self-service portal Platform as a Service
Which management monitoring parameter involves examining the amount of infrastructure resources used? Configuration
Advantage of performing incremental backups Storage capacity needed for backups is Significantly reduced
Pre integrated systems DCaaS solution
(VM) clone Separate network identity
Purpose-build File sharing across Windows and Linux
Maintains the catalog Backup server
Metadata service Object IDs
Which action takes place during the login phase in an FCoE SAN? VN_Ports obtain FC addresses
Enables consumers to use cloud services on Heterogeneous thin or think client platforms Broad network access
Multi-tenancy and abstracts the loacation Resource pooling
Ticket-based Kerberos
Hypervisor-based Write splitter is embedded in the hypervisor
(DRaaS) Avoid maintaining a complete set
Up-to-date SW-RSCN
Rolled back VM snapshot
Image-based backup of virtual machines (VMs) Backup processing is offloaded from the hypervisor
FCoE switch Ethernet Bridge
VNX array-based local replication software that creates a full volume mirror of the source SnapView Clone
What does an area ID represent Group of switch ports
Three-way NDMP backup Backup device can be shared among multiple NAS heads
recovery point objective Frequency of the backup
Statistically different from normal events Anomaly-based
Flow control mechanism Ports agree on the number of buffers available during port login
VSAN trunking Allows network traffic from multiple VSANs to traverse a single interswitch link
Discover Suspicious event trends Dell InTrust
Which components facilitate communication between gateways Compute system with iSCSI ports and the storage system with only FC ports
Continuous data protection (CDP) remote replication solution Appliances are present at both the source and remote sites
Malware protection Protect applications and the OS against Trojan horse programs
What is used to track where objects and metadata are stored in an OSD system? Object storage database
email archiving Increase the mailbox space
A company has virtualized their data center and wants to deploy a recovery-in-place backup approach. Eliminates the need to transfer the image from the backup device to the primary storage before it is restarted
Limited budget Deploy the less critical applications on a public cloud
Fixed content Content addressed storage
Converged Network Adapter (CNA) Physical adaptor that provides the functionality of both a standard NIC and an FC HBA in a single device
Information-centric storage architecture Storage capacity can be increased dynamically without impacting information availability.
N_Port virtualization (NPV) Reduces the number of domain IDs in a fabric
Hardware RAID implementation Uses a specialized hardware controller installed on a storage array
Availability management task Designing a new replication solution
(CHAP) control Secret code Or Secret code
Orchestration layer Provides workflows
Dynamically provisioning and releasing resources Rapid elasticity
VMAX3 SRDF
Software-defined architecture Centralized monitoring and administration
(SAN) in a data center Enables data replication between storage systems across different locations
Shared pool Supports a single RAID protection level
OAuth Allows a client to access protected resources from a resource server on behalf of a resource owner
MTTR of Port 4 2 hours
What enables a NAS device to provide improved performance compared to a general purpose file server? Specialized for file serving
which functionality provides a framework for the allocation of bandwidth to different network traffic classes Enhanced transmission selection
risk assessment Determine the likelihood of a risk
Which NAS implementation requires separate management of the NAS head and the storage? Gateway
What is a benefit when a node is added to a scale-out NAS cluster? Increased cluster performance
Software RAID implementation Uses CPU cycles
4200 11200
Application virtualization Avoids conflicts between different versions of the same application
Goal of a business continuity solution Ensure information availability
N_Port ID virtualization (NPIV) A single physical N_Port to obtain multiple FC addresses
Streaming technique Downloaded in portions
Copy of data Ensure disaster recovery
(VM) storage migration Balances storage utilization by redistributing VMs
Scans primary storage to find the files that meet the archiving policy Archive agent
Process login Exchange ULP-related parameters between two N_Ports
Global addressing Uniform Resource Identifier
scale-out storage architecture Maximize its capacity
Login assigns an FC address to a node in an FC SAN environment FLOGI
Virtual desktop infrastructure Dedicated desktop
Consistent replica Dependent write I/O
8400 16800
What is considered a CI Username
remote desktop Multiple users
A hybrid cloud Portability
under attack Authorized users
FC-4 layer Interfaces and maps
Measured service characteristic Control and optimization
FC-AL Reserves on address
(SDS) controller Third-party
“X”, “Y”, and “Z” IP Network FC SAN NAS Gateway
Pre-defined storage services Service catalog
Created by: Xander61
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards