Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

S10-210 Storage Networking Management and Administration Questions and Answers

Questions 4

You have been hired to consult with storage administrators that are working with zoning and naming convention consistency issues. There are numerous types of zoning methods available using standards that also include aliasing. You want to use a method that guarantees unique global port identification.

What accomplishes this goal?

Options:

A.

WWPN

B.

domain_id:port_#

C.

Alias

D.

Zone set

Buy Now
Questions 5

Click the Exhibit button.

S10-210 Question 5

Referring to the configuration shown in the exhibit, when will the servers oversubscribe the connections between the storage array and the switch?

Options:

A.

When the 6th server is added to the configuration

B.

When the 7th server is added to the configuration

C.

When the 8th server is added to the configuration

D.

When the 9th server is added to the configuration

Buy Now
Questions 6

Which two cloud deployment models address data privacy issues? (Choose two.)

Options:

A.

Community

B.

Public

C.

Private

D.

Hybrid

E.

Campus

Buy Now
Questions 7

A solution architect needs to know how your switches enforce zoning. The enforcement method and identification type being used in your current FC switches must provide the highest level of security.

Which zoning enforcement should you use?

Options:

A.

Session-based without hardware support

B.

Frame-based and hardware support

C.

Software-based with hardware support

D.

Frame-based and software enforced

Buy Now
Questions 8

A colleague asks you if the added cost of using encrypting tape drives and sending the tapes off-site is warranted, since your IT organization already has large security investments such as firewalls and database table encryption.

What is your response?

Options:

A.

The correct firewall rule set would make encrypted tape drives obsolete, but there has not always been strong confidence in the firewall administrators.

B.

Encrypted database tables only protect data against inappropriate access by super users such as database or server administrators abusing root privileges.

C.

Encrypt tape drives as part of a defense in depth strategy to ensure that one security mechanism being compromised does not expose all information to a malicious user.

D.

The existing firewalls and database table encryption do not replace encrypted tape drives, but implementing an intrusion protection system (IPS) will make tape encryption obsolete.

Buy Now
Questions 9

Click the Exhibit button.

S10-210 Question 9

The customer configuration shown in the exhibit is not meeting the throughput needs of a newly installed application. The application's I/O profile consists of 100% 4 kilobyte reads and all servers require a sustained bandwidth of 150 MBps.

Which location within the configuration presents a performance bottleneck?

Options:

A.

Links between hosts and Switch A

B.

Inter-switch link between Switch A and Switch B

C.

Inter-switch link between Switch B and Switch C

D.

Links between Switch C and storage subsystem

Buy Now
Questions 10

A company wants to implement a database which requires a storage subsystem with no more than 2 ms write latency and 1 ms read latency.

Which type of drive would you use?

Options:

A.

SATA

B.

FC

C.

SSD

D.

ATA

Buy Now
Questions 11

You want to prevent unauthorized switches from connecting to your company's fabrics.

What should you do?

Options:

A.

Configure ACLs.

B.

Implement CHAP.

C.

Deploy FC-SP policy.

D.

Implement binding lists.

Buy Now
Questions 12

After the storage administrator merged two multi-vendor FC SANs, an error indicates that two ports have become isolated causing a segmentation to exist in the fabric.

Which two events would cause this? (Choose two.)

Options:

A.

Overlapping zones

B.

Different port names

C.

Unsupported routing protocols

D.

Different link speeds

Buy Now
Questions 13

Click the Exhibit button.

S10-210 Question 13

Referring to the exhibit, which three switch indicators will help you to determine the stability of a link? (Choose three.)

Options:

A.

er_crc

B.

er_toolong

C.

er_enc_in

D.

er_bad_eof

E.

er_trunk

Buy Now
Questions 14

You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).

Which two protocol methods would be used? (Choose two.)

Options:

A.

Directory Name Service protocol (DNS)

B.

Simple Network Management Protocol (SNMP)

C.

Internet Storage Name Server protocol (iSNS)

D.

Service Location Protocol (SLP)

Buy Now
Questions 15

Click the Exhibit button.

S10-210 Question 15

Referring to the exhibit, which backup type is represented?

Options:

A.

Server-free backup

B.

Cloud backup

C.

LAN-free backup

D.

LAN backup

Buy Now
Questions 16

The CIO would like to segregate management device IP network traffic from server IP network traffic within the data center to limit potential security threats.

What would be used to accomplish this?

Options:

A.

IPsec

B.

Firewall

C.

VLANs

D.

PKI

Buy Now
Questions 17

The system administrator has received complaints about the decreased performance of two LUNs. When you investigate the port being used to connect to the LUNs, you discover that the port has achieved its maximum throughput. You also discover that there are other ports available on the storage array that are not oversubscribed.

Which specific driver is needed to balance workloads between the host and storage?

Options:

A.

SCSI driver

B.

TCP/IP driver

C.

Failover driver

D.

Multi-path driver

Buy Now
Questions 18

Five out of 4S servers using one particular enterprise storage system are experiencing performance degradation during normal working hours. All 48 servers have similar workload characteristics. There are multiple disk groups that make up your enterprise storage.

What should be monitored to determine the root cause?

Options:

A.

IOPS per RAID array

B.

Cache read hit ratio

C.

Traffic levels on the SAN switches

D.

Clone sessions

Buy Now
Questions 19

You have been hired as a consultant to help resolve boot-from-SAN server reboots. The company has hosts, storage devices, and tape drives in the same zones. A large number of RSCNs are generated during the backup window.

What is the cause of the problem?

Options:

A.

Tape drives are more sensitive to RSCNs than hosts or disk storage devices.

B.

Storage devices and tape drives are configured within the same zone.

C.

Storage devices are more sensitive to RSCNs than hosts or tape storage devices.

D.

Most SAN switches do not support having both disk and tape frames flowing over the same switch ports at the same time.

Buy Now
Questions 20

You need to merge two existing FC fabrics. After connecting the ISL to join the fabrics, numerous switches segment.

What should be done to prevent the segmentation?

Options:

A.

Physically separate the switches to opposite sides of the data center.

B.

Move business critical applications to clusters.

C.

Increase the frequency of snapshots for critical data.

D.

Assign domain IDs which are unique across both fabrics.

Buy Now
Questions 21

What is a common protocol used in cloud communications?

Options:

A.

WebDAV

B.

SCP

C.

HTTP

D.

CDMI

Buy Now
Questions 22

You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.

What should be used?

Options:

A.

Roles

B.

VSAN

C.

ACL

D.

Zone

Buy Now
Questions 23

You have been asked to create a LUN on a storage array that is comprised of 7,200 rpm SATA drives. Each drive is rated at 100 IOPS. The LUN should provide a minimum of 1100 IOPS and withstand multiple drive failures using the least number of drives.

How many drives and which RAID level should you use to create this LUN?

Options:

A.

11 drives and RAID 0

B.

12 drives and RAID 5

C.

13 drives and RAID 6

D.

22 drives and RAID 1

Buy Now
Questions 24

Click the Exhibit button.

S10-210 Question 24

Your company has purchased a new storage array that has dual management access network ports. You need to connect the array and provide maximum redundancy without affecting production traffic.

Referring to the exhibit, where should the ports be attached?

Options:

A.

Cable one management access network port into management switch 1 and the other port into management switch 2.

B.

Cable both management access network ports into management switch 2.

C.

Cable one management access network port into core switch 1 and the other into core switch 2.

D.

Cable both management access network ports into management switch 1.

Buy Now
Questions 25

Click the Exhibit button.

S10-210 Question 25

The customer application requires a 50/50 R/W ratio with 100 MBps throughput requirements for each direction of the link. The application servers will simultaneously sustain these data rates across all LUNs in parallel.

Referring to the exhibit, where will the oversubscribed link(s) occur?

Options:

A.

Links between hosts and Switch A

B.

Inter-switch link between Switch A and Switch B

C.

Inter-switch link between Switch B and Switch C

D.

Links between Switch C and storage

Buy Now
Questions 26

You receive a ticket from a database group which is complaining about slow access to storage on only one particular server, as compared to other servers in an active-active cluster. You verify zoning and LUN masking which are fine. On the FC switch, you verify link speed, errors, and throughput for the FC switch ports used by this server. There are no errors on the ports and the link speed is the same as on the switch ports used by other servers in the cluster. You notice that on one port on the FC switch used by this server, that there is no throughput at all.

What is causing the problem?

Options:

A.

The switch has obsolete firmware.

B.

There are too many ports used on the FC switch.

C.

Multipathing was not configured for load-balancing.

D.

The switch is over-subscribed.

Buy Now
Questions 27

You have determined that the root cause of your problem is related to invalid characters being intermittently transmitted on your 4 Gb FC link.

What describes this condition?

Options:

A.

Disparity error character

B.

Link hardware cannot detect k28.3 characters

C.

Link hardware cannot detect k28.5 characters

D.

Character does not fit in allowed 8b/10b codes or special characters

Buy Now
Questions 28

Your CTO is concerned over misuse of corporate storage assets because an employee was found to be hosting a music library on one of the SANs storage arrays. You have been instructed to provide some level of device security to the corporate FC SAN. FC has a number of cost-effective (free) industry standard protection mechanisms that provide or restrict user access to SAN resources.

Which two FC provided mechanisms would you implement first? (Choose two.)

Options:

A.

LUN masking

B.

Device authentication and authorization

C.

Zoning

D.

Key management system

Buy Now
Questions 29

Which protocol commonly uses CNA devices?

Options:

A.

FCIP

B.

iFCP

C.

FCoE

D.

FCR

Buy Now
Exam Code: S10-210
Exam Name: Storage Networking Management and Administration
Last Update: Apr 30, 2026
Questions: 97

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now S10-210 testing engine

PDF (Q&A)

$43.57  $124.49
buy now S10-210 pdf