S10-300 Dumps S10-300 Braindumps S10-300 Real Questions S10-300 Practice Test S10-300 Actual Questions Snia S10-300 SNIA Architect - Assessment, Planning and Design https://killexams.com/pass4sure/exam-detail/S10-300 S10-300 QUESTION: 91 An array is behaving erratically. Upon working and troubleshooting with the vendor representative, you are told that the only way to clear the problem is to reboot the unit. The vendor states they have seen this behavior previously and feels it will return the unit to a fully operational status. Which three actions should you perform? (Choose three.) A. Retrieve any logs or dumps that exist on the array prior to reboot. B. Reboot the unit as soon as possible to lessen the risk of corruption. C. Identify the actions to commit if a reboot does not fix the problem before you reboot the array. D. If this is a known issue, request documentation outlining the symptoms, as well as the cause, if known. A, C, D Answer: QUESTION: 92 A company needs to create a tape backup strategy for a file system. On average the file system will be 60% full. Array based virtualization will be used to create the snapshot, which will only be used for the tape backup. Write activity on the production volume will be minimal during the backup process. Which will provide the least impact to the production application? A. COW snapshot mounted to a tutor/mount server B. COW snapshot mounted to the application server C. split mirror snapshot mounted to a tutor/mount server D. split mirror snapshot mounted to the application server A Answer: QUESTION: 93 What are three key advantages of deploying a director-based solution over a mesh of switches? (Choose three.) A. lower cost B. consistent latency C. improved availability D. increased hop count E. ease of management B, C, E Answer: QUESTION: 94 30 http://www.certarea.com 29 S10-300 What information must be gathered during the testing phase BEFORE allowing live customer data on the storage infrastructure? (Choose two.) A. time to failover, both without and with simulated load B. single points of failure in the infrastructure as well as topology mapping C. hardware and software vendor escalation process including phone-home and/or ticket generation D. powerup order; how long from power application to functionality per component, including dependencies. A, D Answer: QUESTION: 95 You notice, from continually monitoring a SAN array, that an array has a number of soft SCSI bus errors. You trace the errors back to a single drive using a vendor's event tool. Which two would correct this? (Choose two.) A. You should pull the drive out immediately and replace it to prevent data corruption on the RAID set. B. Soft SCSI bus errors can be safely ignored as they do not actually denote any service requirements. C. You should research the error to determine the impact and proper response including the vendor in these discussions. D. Review the logs from the array to identify if there is a pattern of large numbers of these SCSI errors. A large number of these SCSI bus errors may denote a predictive failure. C, D Answer: QUESTION: 96 A client has four servers they want to attach to a storage array containing 16 ports. Which topology is the most cost effective for this situation? A. star B. mesh C. point-to-point D. switched Fabric C Answer: QUESTION: 97 The customer currently has 50 servers and 20 direct-attached storage arrays and wants to consolidate their data on a SAN. They want to be able to rapidly add storage and servers with 31 http://www.certarea.com 30 S10-300 minimal impact to data availability. Which topology is most appropriate? A. star B. mesh C. core-edge D. round-robin C Answer: QUESTION: 98 A company is utilizing ITIL to create a high availability environment. Maintainability of the IT infrastructure consists of which three stages? (Choose three.) A. cost of failures B. detection of failures C. anticipation of failures D. restoration of the data and IT service E. effect of failures on Service Level Agreements B, C, D Answer: QUESTION: 99 You are preparing a detailed design, applying ILM principles. Which two processes are performed during the detailed design phase? (Choose two.) A. Develop an idealized environment. B. Prepare work-task breakdown structure. C. Define internal storage parameters used in the implementation. D. Document current and proposed infrastructure, demonstrating change in capabilities. B, C Answer: QUESTION: 100 A four switch Fabric with 8 ports per switch using a full-mesh connectivity approach will have 20 ports available for Fabric attached devices. How many ports will be available using the full mesh approach when increasing the number of switches from four to six? A. 12 B. 18 C. 20 D. 24 B Answer: 32 http://www.certarea.com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