HP HP Certification III HP2-T16 Questions & Answers
Question 21:
What are advantages of DAS solutions?
A. maximum scalability
B. ease of deployment
C. low intial cost
D. snapshot capability
Correct Answer: BC
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 1 - Page 282:\par Comparing storage solutions\par DAS offers the easiest way to deploy incremental amounts of storage as needed without extensive planning. As RAID inside the server has become less expensive, DAS has grown in popularity. A high percentage of deployed storage is now DAS.\par Advantages of DAS include:\par Ease of deployment\par Scalability\par Relatively inexpensive to acquire, maintain, and expand\par High performance and reliability\par Fast server-to-storage data transfer\par }
Question 22:
Your customer wants to use Microsoft Windows Clustering for high availability. Which storage technology is best suited for this?
A. Windows dynamic disks
B. Fiber Channel SAN
C. SATA II Point to Point
D. Duplexed Array Controllers
Correct Answer: B
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 14:\par Fibre Channel benefits\par Fibre Channel technology provides the fundamental building blocks of storage area networks (SANs), Enterprise Network Storage Architecture (ENSA), and many high-availability and clustering implementations.\par }
Question 23:
What factors are important to sustain the I/O rates of the application within an array? (Select two)
A. capacity of the disks within the array
B. speed of the disks within the array
C. number of disks within the array
D. location of the disks within an enclosure
Correct Answer: BC
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 1 - Page 249:\par Number of disks in an array\par The RAID level and the number of drives affect the available I/O bandwidth for a given disk configuration. You must have enough drives (regardless of the drive capacity) to sustain the I/O rates of the application. \par }
Question 24:
How many independent parity schemes are utilized for a RAID 6 array?
A. 1
B. 2
C. 4
D. 6
Correct Answer: B
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 1 - Page 262:\par RAID 6 performance\par RAID 6 employs two independent parity schemes. Two sets of parities must be modified for each logical write operation, which requires six physical transfers---three reads and three writes.\par }
Question 25:
Your RAID 5 array on a Smart Array sustains a drive failure. A host spare replaces the failed drive and rebuilds successfully. After replacing the failed drive with a new drive, what happens next?
A. The spare drive replicates its data to the new drive and both work as a mirror until you evict the spare drive.
B. The new drive stays offline until you assign it to the array, at which point it automatically takes the place of the spare drive.
C. The new drive re-assumes its place in the RAID set and after data rebuild is complete, the drive that was the spare once again becomes a hot spare drive.
D. The new drive becomes a spare drive and you must go to the ACU to remove the old spare drive and then re-add the new drive to the array.
Correct Answer: C
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 1 - Page 269:\par Online spare drives \par As soon as the failed drive is replaced, data is automatically rebuilt on the new drive. After data has been completely rebuilt on the new drive, the online spare returns to its role as an online spare drive. This avoids roaming online spare drives.\par }
Question 26:
Which technology should you implement for disk redundancy?
A. SATA
B. NTFS
C. RAID
D. SCSI
Correct Answer: C
Question 27:
What is the virtual machine instance commonly called?
A. guest
B. host
C. partition
D. hypervisor
Correct Answer: A
Question 28:
Which major challenges of I/O virtualization do Virtual Machine Managers need to address? (Select two)
A. WWN virtualization
B. DMA virtualization
C. IRQ virtualization
D. port virtualization
E. MAC virtualization
Correct Answer: AE
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 1 - Page 186:\par Server-edge I/O virtualization\par In server-edge I/O virtualization an abstraction layer is created between a pool of blade servers and the external LAN and SAN networks to which they are connected.\par This technoloy enabled infrastructure can then present the network with a constant set of media access control (MAC) addresses and World Wide Names (WWNs) for each server bay in an enclosure.\par }
Question 29:
Which Network Operating System (NOS) filesystem allows you to set security on invididual files?
A. FAT32
B. FAT
C. NTFS
D. CDFS
Correct Answer: C
Question 30:
Which Network Operating System (NOS) security practices are commonly used when planning server management? (Select three)
A. disable FTP and SSH
B. install hardware and software firewalls
C. disable unused TCP/IP service ports
D. use easy to remember password
E. enforce regular password changes
Correct Answer: BCE
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 200:\par Working with the server management plan and the service plan \par Change passwords regularly.\par 1.Establish a regular schedule for password changes.\par 2.Do not use the same password for individual and administrative accounts.\par 3.Follow standard password construction recommendations for length and complexity.\par Disable unused or unneeded service ports.\par 4.Security risks exist at well-known network service ports if they remain open.\par 5.Telnet is a major security risk for administrative access due ease of password theft. Use secure shell (SSH) if remote access is necessary.\par 6.Disable file transfer protocol (FTP) if it is not needed. If it is needed, never use root or administrator passwords when transferring files since these are transferred as plain text.\par Install hardware and software firewalls for Internet protection.\par 7.These allow the administrator to control which server ports are open to Internet traffic.\par 8.Firewalls can also detect intrusion attempts.\par Install virus protection.\par 9.Most viruses are written for the Windows operating system, making that platform especially vulnerable. \par 10.New viruses and worms are also showing up for systems running the Linux operating system as well. \par }
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only HP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HP2-T16 exam preparations and HP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.