<< Prev Question Next Question >>

Question 15/65

What are three iSCSI configuration optimization techniques? (Choose three.)

Recent Comments (The most recent comments are at the top.)

rishab - Jun 06, 2018

You configure the switches according to the vendor’s recommendations for iSCSI. These recommendations might include both configuration directives as well as code updates.

You must ensure the following:

You have two separate networks for high availability. Make sure that you isolate your iSCSI traffic to separate network segments.
You have enabled send and receive hardware flow control end to end.
You have disabled priority flow control.
If appropriate, you have enabled jumbo frames.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (65q)
Question 1: Which two statements about jumbo Ethernet frames are correct...
1 commentQuestion 2: At which level would you apply LUN masking?...
Question 3: A customer hires you to create an incremental backup scheme....
Question 4: What are two reasons for using a full backup? (Choose two.)...
Question 5: Your company needs to buy more disks for new servers and are...
Question 6: Which software technique reduces the effects of a hardware c...
Question 7: Which statement describes an N_Port login?...
Question 8: What is the function of the Fibre Channel name server?...
1 commentQuestion 9: Which two technologies are part of the Data Center Bridging ...
Question 10: Which statement is correct regarding LUNs?...
Question 11: What is the purpose of a host bus adapter (НВА)?...
Question 12: You want to replace multiple copies of data, at variable lev...
Question 13: Which two connection sequences are supported for direct-atta...
1 commentQuestion 14: According to SNIA, what are two valid storage tiering types?...
1 commentQuestion 15: What are three iSCSI configuration optimization techniques? ...
1 commentQuestion 16: Which type of device would you typically use for file access...
Question 17: What is the name of the process by which a SAN dynamically e...
Question 18: Software Defined Storage (SDS) uses which type of technology...
Question 19: What are two requirements of a server cluster with regards t...
Question 20: A physical server is having a native or bare-metal hyperviso...
Question 21: What is the default port that iSCSI traffic uses?...
Question 22: You are designing a synchronous remote mirror solution. Whic...
1 commentQuestion 23: What is a SNIA standard that defines an interface used by ap...
Question 24: According to SNIA, what is a data structure signed with a di...
Question 25: Which entity is responsible for making cloud services availa...
Question 26: Which device would be an NDMP server?...
Question 27: Which hardware component transports FC and IP traffic?...
Question 28: What do RAID 5 sets use to rebuild data?...
Question 29: Your customer has a Fibre Channel SAN environment and has pr...
2 commentQuestion 30: What is the process called that Solid State Drives (SSDs) us...
Question 31: Which two technologies use NAND flash memory (non-volatile) ...
Question 32: Which feature would be used for SAN traffic isolation?...
Question 33: What should a valid iSCSI qualified name include?...
Question 34: You explain to a customer that storage data compression can ...
Question 35: What is another name for a storage volume?...
Question 36: You are consulting for a major financial institution and are...
Question 37: You want to improve disk space usage efficiency while mainta...
Question 38: What are the requirements for a boot from SAN? (Choose two.)...
1 commentQuestion 39: You have a RAID 5 set with five disks at 400 GB each. Approx...
Question 40: A customer is considering mixing disk technologies in the sa...
Question 41: When presenting a single volume to multiple hosts, which typ...
Question 42: Which level of data access does a SAN device provide compare...
Question 43: Which storage technology uses optics for connectivity?...
Question 44: Which backup technique is the slowest in terms of backup tim...
Question 45: What is an implementation of a secure, multi-tenant cloud en...
Question 46: A company is concerned with high space usage on its storage ...
Question 47: What is a set of data processing components that are automat...
Question 48: According to SNIA, what is the term that describes a mechani...
Question 49: Which device would communicate to a DAS?...
Question 50: Which technology uses lossless Ethernet?...
1 commentQuestion 51: What are two NAS file access protocols? (Choose two.)...
Question 52: What are two characteristics of Challenge-Handshake Authenti...
Question 53: Which two statements are true about archiving? (Choose two.)...
1 commentQuestion 54: Which interface is used for 40GbE?...
Question 55: You want to use a light-weight communication API for cloud a...
Question 56: Which two statements regarding hybrid drives are correct? (C...
Question 57: What would be placed in a Fibre Channel zone?...
Question 58: What describes the process of moving data between different ...
Question 59: What is Software Defined Storage?...
Question 60: Which two security methods will protect iSCSI traffic from u...
Question 61: At which point in the communication chain is multi-pathing i...
Question 62: Which type of cloud allows management of backups to local, p...
Question 63: What are two scenarios where using disk replication is a val...
1 commentQuestion 64: You want to manage systems and devices on a network with tra...
Question 65: Which type of server initiates an NDMP backup?...