In a san implementation, the servers that connect to shared storage devices are called __________.

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Networks

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Terms in this set (29)

You are in the process of configuring an iSCSI storage area network (SAN) for your network
You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. What tool should you use?

iSCSI initiator

Arrange the Fibre Channel SAN implementation tasks in the order they should be performed.

1. Install two FC HBAs in each server that will access the shared storage on the SAN.
2. Deploy 2 FC switches
3. Using fiber optic cables, connect each server to each FC switch
4. Deploy shared storage devices. Typically, These are external RAID device containing multiple hard disk drives and 2 FC HBAs
5. Using fiber optic cables, connect each storage device to each FC switch

Which of the following does not accurate describe an iSCSI SAN?

Requires special hardware and knowledge to implement.

You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used.

NAS with clustering

Which of the following are typical of a NAS device?

One or more NICs.
A minimal network OS.

In a SAN implementation, the servers that connect to shared storage devices are called _______.

initiators

Which VoIP device helps establish the connection between two VoIP phones?

VoIP server

What are other names for a VoIP server? (Select two)

VoIP PBX

IP-PBX

What is one benefit of placing VoIP gateways inn geographically separated branch offices that have an existing WAN connection?

Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred.

When would you consider changin the codec used in your VoIP system? (Select two)

When sound quality is poor

When VoIP data consumes too large a portion of your network bandwidth.

How can QoS be configured so that large data transfers will not block VoIP calls by using too much network bandwidth?

QoS can be configured on the network devices to give priotity to VoIP traffic.

Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform.

Unified communication

Which of the following protocols is an open source protocol used by most manufactures of VoIP systems?

Session initiation protocol (SIP)

Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call?

SIP

Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects.

Jitter

You are on a phone call using VoIP. You notice that it takes several second for the person on the other end to respond to questions you ask.

Which type of problem is occurring?

Latency

What is a soft phone?

A software application that runs on a computer or other device that access a VoIP sever to make real-time phone calls.

Which features are typically used with VoIP? (Select two)

PoE
VLAN

Which of the following features is used with digital IP phones to supply power through a switch port?

PoE

In virtualization, what is the role of the hypervisor?

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

What type of virtualization completely simulates a real physical host?

Full virtualization

What component is most likely to allow physical and virtual machines to communicate with each other?

Virtual Switch

Which of the following are advantages of virtualization? (Select two)

Easy system migration to different hardware

Centralized administration

You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

Virtual servers

Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network?

SaaS

Which of the following best describes the platform as a service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

Which of the following are true regarding cloud computing? (Select three)

Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser.

The term "cloud" is used as a synonym for the internet.

Cloud computing is software, data access, computation, and storage services provided to clients through the internet.

Match the description

Public cloud- Provides cloud services to just about anyone
Private cloud- Provides cloud services to a single organization
Community cloud- Allows cloud services to be shared by several organizations
High cloud- Integrates one cloud service with other cloud services

You were recently hired by s small start-up company. the company is in a small office and has several remote employees.

Yo have been asked to find a business service that would accommodate the current size of the company, but would also be able to scale as the company grows. The service needs to provide adequate storage as will as additional computing power.

Which cloud service model should you use?

IassS

Recommended textbook solutions

In a san implementation, the servers that connect to shared storage devices are called __________.

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

In a san implementation, the servers that connect to shared storage devices are called __________.

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

In a san implementation, the servers that connect to shared storage devices are called __________.

C++ Programming: Program Design Including Data Structures

7th EditionD. S. Malik

867 solutions

In a san implementation, the servers that connect to shared storage devices are called __________.

Java How to Program (early objects)

10th EditionHarvey M. Deitel, Paul J. Deitel

356 solutions

Sets with similar terms

Chapter 9

35 terms

Twhitman85PLUS

SYS401 Quiz 4

50 terms

david_severns

Sets found in the same folder

9.4.6 practice questions

9 terms

cclinci15

10.4.9 practice questions

11 terms

cclinci15

7.3.6

10 terms

alec_vosika

10.1.5 practice questions

5 terms

cclinci15

Other sets by this creator

CH. 11

59 terms

Esvheiryalvarez

CH. 10

59 terms

Esvheiryalvarez

CH.11 LABS

2 terms

Esvheiryalvarez

CH. 10 LABS

5 terms

Esvheiryalvarez

Verified questions

COMPUTER SCIENCE

Which of the following is not a valid rule of Boolean algebra? a) (True or x) == True b) (False and x) == False c) not(a and b) == not(a) and not(b) d) (True or False) == True

Verified answer

COMPUTER SCIENCE

Look at the following code. union Values { int ivalue; double dvalue; } ; Values v; Assuming that an int uses four bytes and a double uses eight bytes, how much memory does the variable v use?

Verified answer

COMPUTER SCIENCE

This widget is a container that can hold other widgets. a. Grouper b. Composer c. Fence d. Frame

Verified answer

COMPUTER SCIENCE

Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of these users to be able to access one file. a. How would you specify this protection scheme in UNIX? b. Can you suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX?

Verified answer

Other Quizlet sets

Chapter 20 DSM

29 terms

zeynaral

Endoscopic and MIS

14 terms

CTrnavsky

Speech to the Virginia Convention by Patrick Henry

33 terms

troberts53

DRT Sophomore Year 2015

25 terms

Normands17

Related questions

QUESTION

True/False: A switch uses the port number that a frame comes in on to add entries to its switch table

2 answers

QUESTION

She has no reason to expect a file from this person. The most effective security strategy for ---- to follow would be:

2 answers

QUESTION

Suppose someone gained unauthorized access to a company's network with the intent of stealing sensitive information. That person would best be described as a

4 answers

QUESTION

What is a device that measures the acceleration of an item and is used to track truck speeds or taxi cab speeds?

4 answers

How do I connect to a SAN storage server?

Connect every device of the pool with the switch using a fiber cable. Connect every server with a fiber switch using fiber cable. Attach a Host Bus Adapter card (HBA) on each server and pool to communicate. This is the easy set up of SAN.

Which network based storage technology is being used?

Which network-based storage technology is being used? NAS with Clustering. In a SAN implementation, the servers that connect to shared storage devices are called___________________.

What does Iscsi stand for?

ISCSI, which stands for Internet Small Computer System Interface, works on top of the Transport Control Protocol (TCP) and allows the SCSI command to be sent end-to-end over local-area networks (LANs), wide-area networks (WANs) or the internet.

What kinds of services and roles would call for an iscsi SAN?

These include:.
Internet service providers..
Storage service providers..
Organizations that need remote data replication and disaster recovery. For example, a high-tech company in San Jose is susceptible to earthquake disaster. ... .
Small office/home office businesses with limited IT resources, infrastructure and budget..