Preview only show first 10 pages with watermark. For full document please download

Hp0 815

   EMBED


Share

Transcript

http://www.TwPass.com HP0-815 HP Advanced SAN Architecture Exam http://www.twpass.com/twpass.com/exam.aspx?eCode= HP0-815 The HP0-815 practice exam is written and formatted by Certified Senior IT Professionals working in today's prospering companies and data centers all over the world! The HP0-815 Practice Test covers all the exam topics and objectives and will prepare you for success quickly and efficiently. The HP0-815 exam is very challenging, but with our HP0-815 questions and answers practice exam, you can feel confident in obtaining your success on the HP0-815 exam on your FIRST TRY! HP HP0-815 Exam Features - Detailed questions and answers for HP0-815 exam - Try a demo before buying any HP exam - HP0-815 questions and answers, updated regularly - Verified HP0-815 answers by Experts and bear almost 100% accuracy - HP0-815 tested and verified before publishing - HP0-815 exam questions with exhibits - HP0-815 same questions as real exam with multiple choice options Acquiring HP certifications are becoming a huge task in the field of I.T. More over these exams like HP0-815 exam are now continuously updating and accepting this challenge is itself a task. This HP0-815 test is an important part of HP certifications. We have the resources to prepare you for this. The HP0-815 exam is essential and core part of HP certifications and once you clear the exam you will be able to solve the real life problems yourself.Want to take advantage of the Real HP0-815 Test and save time and money while developing your skills to pass your HP HP0-815 Exam? Let us help you climb that ladder of success and pass your HP0-815 now! HP0-815 QUESTION: 1 When I/O traffic patterns are unknown, what is the recommended SAN topology? A. ring B. backbone C. meshed D. cascaded Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=1 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 2 In a replication solution, what is the preferred method when logging changes at the local site when the inter-site link is temporarily unavailable? A. snapshot B. change map C. write change map D. write history log Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=2 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 3 A SAN administrator needs to migrate a SAN topology from a ring to a core-edge topology using a new switch. Which two statements are true? (Choose two.) A. The switch routing configuration needs to be manually updated to reflect the new topology. B. The switch routing configuration is automatically updated to reflect the new topology. C. This cannot be done without disruption. D. This migration is not supported. E. This can be done without disruption. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=3 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 4 Why do customers want to extend the SAN? A. to connect geographically distributed data centers B. to make SANs more manageable C. to increase the speed of data transport D. to scale SANs with more switches Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=4 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 5 A customer has 20 local servers that cannot be connected to the SAN because of no HBA support. The customer wants to have them access some SAN-based storage. How many SR2122 storage routers are required to implement this? A. 10 B. 20 C. 5 D. 1 E. 2 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=5 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 6 How can you reduce Total Cost of Ownership (TCO) of a SAN? A. identify and address SAN islands in large corporations that will merge from smaller organizations B. identify and address pain levels when reducing operating staff C. identify and address pain levels associated with data movement, data sharing, and data growth D. identify and address pain levels at upper management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=6 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 7 What are two reasons for using the SAN architecture approach? (Choose two.) A. to simplify SAN storage infrastructure resources in a unified direction B. to provide business-related rationale for SAN infrastructure investment C. to align SAN infrastructure with business processes and priorities D. to minimize SAN technology transitions and establish long-term SAN standards and framework Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=7 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 8 Which three HP storage arrays are capable of remote array-based replication? (Choose three.) A. RA4100 B. MA8000 C. XP1024 D. VA7410 E. MSA1000 F. EVA5000 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=8 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 9 A customer has two sites. Site A has 2 servers with single port Fibre Channel HBAs but no SAN. Site B has servers that are connected to a SAN. The customer wants the servers at Site A to be able to access the SAN-based storage at Site B. How many SR2122s are required to implement this using IP to connect the two sites? A. 2 B. 1 C. 0 D. 4 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=9 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 10 What problem can arise when scaling or merging SAN fabrics? A. If the discovery process determines that the fabrics have different security levels, than the most secure level will be adopted. B. If the discovery process determines changes in business requirements, then the SAN merge will fail. C. If the discovery process determines that the fabrics are not compatible, then the fabric will segment. D. If the discovery process determines specific cabling changes are required, then the merge will fail over. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=10 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 11 In many cases, the growth pattern for a storage installation is difficult or impossible to predict. To accommodate this unpredictability, the SAN architect should allow for growth within a predefined design that _____. A. uses the ring switch topology as the initial installation B. is a subset of the mesh for a smaller configuration C. uses the cascaded switch topology as the initial installation D. uses the initial installation as a subset of a larger pre-designed configuration Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=11 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 12 What is the most important thing to do when implementing a backup/restore solution? A. size the backup solution B. purchase licenses for the servers C. select the backup device technology, DLT or LTO D. ensure that the storage arrays can replicate data between two arrays Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=12 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 13 You have four 16-port switches in a small topology using the mesh configuration, with three ISLs going to each adjacent switch. What is the available number of user ports? A. 64 B. 52 C. 40 D. 61 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=13 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 14 What is a design property of the Core+Edge+Leaf SAN topology? A. It can start at one switch and grow almost without limit. B. It allows many devices to share a single ISL. C. It allows many hosts to share a single storage port. D. It involves simplex I/O, meaning only one path is utilized for I/O. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=14 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 15 What is dark fiber? A. unused fiber optic cable running from a to b offered by a service provider B. a special version of single-mode 9 fiber optic cable C. shared fiber optic cable running from a to b offered by a service provider D. fiber optic cable that has black color coding Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=15 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 16 What is an advantage of a core/edge topology? A. Multiple backup processes can now run on one ISL. B. There is increased management for SAN capacity planning. C. It has performance characteristics suitable fortiering. D. Fewer edge switches are used in this design thereby reducing the overall cost. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=16 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 17 You are implementing a SAN solution. When should a SAN architecture be created? A. anytime B. before any design or implementation C. when the SAN is being designed D. when the SAN is implemented Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=17 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 18 DRAG DROP Click the Task button. A SAN architect plans to implement a managed SAN infrastructure. Arrange the steps in the order that they would be performed. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=18 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 19 What are three characteristics of B-Series (Brocade) Fabric Manager? (Choose three.) A. multiple switch management B. single switch management C. is embedded in the Brocade switch firmware D. provides in-band management E. is a separate software package F. provides out-of-band management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=19 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 20 Which tool should you use to conduct a storage assessment? A. HPOpenView Storage Configuration Manager B. HPOpenView Storage Profiler C. HPOpenView Storage Area Manager D. HPOpenView Storage Provisioner Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=20 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 21 You are replicating data over long distances using 1 Gbps B-series (Brocade) fabric switches. Extended fabrics (increased buffer-to-buffer credits) should be used when the minimum distance exceeds _____ km. A. 10 B. 35 C. 20 D. 15 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=21 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 22 SAN architecture is created at ______. A. the lowest level of storage abstraction B. the highest level of storage abstraction C. the mid level of storage abstraction D. the smallest LUN possible in the SAN Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=22 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 23 What happens in the Storage Assessment phase of the SAN architecture approach? (Choose three.) A. Business data is classified, utilization of data is explored, ownership and usage statistics of application volumes on systems are reported. B. analysis and documentation of business requirements, organization, physical environment, networks, and infrastructure management C. description of the feasibility of an effective solution based on obstacles and constraints D. an inventory of systems, software, employee skills, and internal processes/documentation E. selection and establishment of guidelines models, principles, and standards for the SAN Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=23 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 24 FCIP is best used for _____. (Choose two.) A. increasing network bandwidth B. WAN extensions based on cost effectiveness for distance C. MAN extensions based on cost effectiveness for distance D. eliminating unacceptable performance delays Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=24 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 25 What does a Recovery Time Objective (RTO) of three hours indicate as it relates to backup and restore? A. Data is restored and the environment is operational within three hours. B. The amount of data lost with backups should not exceed three hours. C. The data should be fully backed up and restored every three hours. D. Data should be cloned and restored every three hours. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=25 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 26 What is a challenge when expanding a SAN with SAN extensions? A. switch latency B. disk latency C. network latency D. host latency Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=26 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 27 What are the business benefits of a SAN infrastructure? A. reducing staff skills across distributed geographical locations B. adaptability to meet changing business requirements allowing faster application deployment C. reducing Total Cost of Ownership (TCO) by eliminating staff associated with SANs D. reducing Total Cost of Ownership (TCO) by hiring staff for management tasks Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=27 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 28 What is a common cause of downtime in a customer s IT application, databases, and infrastructure? A. software malfunction B. power outages C. human error D. computer viruses Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=28 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 29 What three results of a storage assessment are useful in determining the cross-sectional bandwidth and topology requirement in a SAN design? (Choose three.) A. volume usage statistics B. application data access patterns C. backup throughput D. number of application users E. application I/O data rates F. total storage capacity Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=29 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 30 What is the recommended way to fail over a site in a replication solution? A. as a result of an application timeout B. by the absence of heart beat of the source array C. by an operator with scripted procedures D. as a result of the loss of the inter-site links Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=30 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 31 What are two features of VersaStor technology? (Choose two.) A. automatic data migration when the sub-pool hierarchy is changed B. object-oriented selective storage presentation C. selective presentation of virtual disks to servers D. ATM Channel over Internet Protocol Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=31 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 32 How long does it typically take to create a SAN architecture for an enterprise-class customer? A. days to weeks B. hours C. weeks to months D. months to years Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=32 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 33 A business continuity strategy for the protection of data can be built on techniques and procedures to _____. (Choose two.) A. avoid data loss B. provide Hierarchical Storage Management (HSM) C. recover data that has been lost D. shrink the backup and recovery window Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=33 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 34 DRAG DROP Click the Task button. What is the recommended power-on sequence for an Enterprise Backup Solution (EBS)? Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=34 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 35 What is the greatest challenge when extending a SAN? A. to maintain speed and availability B. to extend a SAN using the smallest number of IP links C. to exclude dark fiber D. to use all wires including those for IP telephony Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=35 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 36 SAN architecture is created at ______. A. the lowest level of storage abstraction B. the mid level of storage abstraction C. the smallest LUN possible in the SAN D. the highest level of storage abstraction Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=36 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 37 Which statement about B-series (Brocade) and M-series (McDATA) fabric switches is true? A. B-series fabric switches require a license to increase the buffer-to-buffer credits while M-series do not. B. B-series and M-series fabric switches do NOT require a license to increase the buffer-to-buffer credits. C. M-series fabric switches require a license to increase the buffer-to-buffer credits while B-series do not. D. B-series and M-series fabric switches require a license to increase the buffer-tobuffer credits. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=37 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 38 You are using 2 Gb switches connected in a dual ring topology with two ISLs. What is the maximum cross-sectional bandwidth? A. 200Mbyte/sec B. 350Mbyte/sec C. 400Mbyte/sec D. 800Mbyte/sec Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=38 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 39 What does SAN performance management monitor and analyze? A. SAN name server traffic B. SNMP traffic C. SAN traffic patterns D. RSCN traffic patterns Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=39 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 40 What two advantages does implementing a SAN-wide backup solution offer? (Choose two.) A. optimal utilization of backup resources B. easier management C. improved disk array performance D. optimal utilization of drive arrays Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=40 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 41 What does a SAN high availability configuration provide? A. a non-disruptive merging of multiple SANs B. the capability to test new switch firmware in a production environment C. a non-disruptive upgrade process of theiSCSI protocol definitions D. non-disruptive SNMP messages to the system management framework Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=41 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 42 A SAN administrator plans to implement fabric wide storage virtualization. The current SAN consists of dual redundant ring topology. Without detailed information about the virtualization, what topology should they plan to migrate to? A. cascaded topology B. tree topology C. meshed topology D. no change ring topology Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=42 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 43 What are two benefits of migrating from one SAN topology to another SAN topology? (Choose two.) A. The SAN can scale to support additional storage devices and applications servers. B. Zone conflicts and limitations are resolved. C. Many smaller switches are consolidated into fewer large fabric switches. D. The management of the SAN is simplified. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=43 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 44 What is the most important security feature in any environment? A. defined security policies for a defined security domain B. attitude and enforcement of the security policies C. a secure area for the systems in the security domain D. regular security audits Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=44 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 45 A customer has a mission-critical application based on a storage solution with replication on a pair of EVA arrays. Both the source and remote storage arrays must always be synchronized and in the event that a transaction cannot be committed the application should be halted. How must these arrays be set up? A. Synchronized mode=disabled B. Failsafe mode=enabled C. Synchronized mode=enabled D. Failsafe mode=disabled Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=45 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 46 What does SAN performance management monitor and analyze? A. SNMP traffic B. SAN traffic patterns C. RSCN traffic patterns D. SAN name server traffic Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=46 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 47 What three factors could be used to determine which storage systems should be migrated to the SAN first? (Choose three.) A. storage capacity B. business needs C. protocol requirements D. added cost for migration E. storage usage and applications Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=47 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 48 What are three possible outcomes of a storage assessment? (Choose three.) A. ROI on existing storage B. ownership and usage statistics C. SAN design D. inventory of systems E. standards for the SAN F. storage utilization Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=48 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 49 DRAG DROP Click the Task button. Place the four phases of a SAN deployment in order. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=49 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 50 What are two benefits of migrating from one SAN topology to another SAN topology? (Choose two.) A. The management of the SAN is simplified. B. The SAN can scale to support additional storage devices and applications servers. C. Zone conflicts and limitations are resolved. D. Many smaller switches are consolidated into fewer large fabric switches. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=50 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 51 What is the greatest challenge when extending a SAN? A. to extend a SAN using the smallest number of IP links B. to maintain speed and availability C. to use all wires including those for IP telephony D. to exclude dark fiber Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=51 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 52 Which statement about B-series (Brocade) and M-series (McDATA) fabric switches is true? A. B-series fabric switches require a license to increase the buffer-to-buffer credits while M-series do not. B. B-series and M-series fabric switches require a license to increase the buffer-tobuffer credits. C. B-series and M-series fabric switches do NOT require a license to increase the buffer-to-buffer credits. D. M-series fabric switches require a license to increase the buffer-to-buffer credits while B-series do not. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=52 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 53 Who is responsible for the security in the SAN? A. LAN Security Manager B. SAN Configuration Manager C. SAN Change Manager D. SAN Security Manager Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=53 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 54 When planning to scale a SAN by migrating topologies, best practices recommend the SAN should be _____. A. well documented B. using non-persistent addressing C. zoned before the change D. restarted Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=54 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 55 Which two statements about a SAN switch configuration restore are true? (Choose two.) A. The switch must first be disabled before any parameters can be changed. B. The IP address parameters cannot be restored to a switch. C. Fabric switch parameters can be restored to a previous configuration when the switch is offline. D. The IP address parameters can be restored to a switch. E. Fabric switch parameters can be restored to a previous configuration when the switch is online. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=55 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 56 The Continuous Access Storage Appliance (CASA) virtualizes storage at what level? A. application level B. fabric level C. host level D. storage level Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=56 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 57 What are three characteristics of B-Series (Brocade) Fabric Manager? (Choose three.) A. is a separate software package B. single switch management C. multiple switch management D. provides out-of-band management E. provides in-band management F. is embedded in the Brocade switch firmware Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=57 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 58 A SAN architect is designing a SAN and needs to include management. What three best practices should the architect choose? (Choose three.) A. add a dedicated SAN management server(s) B. merge the SAN management with the public LAN for easier access C. integrate the SAN management into the Enterprise framework D. create a dedicated management network with a firewall E. install the SAN management software on one of the existing hosts F. keep the SAN management independent of the Enterprise framework Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=58 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 59 A customer is testing storage array replication with two storage systems between their data centers. The local array and remote arrays are connected by a 2 Gbps Brocade-based SAN, 35 km apart using a Dense Wave Division Multiplexing (DWDM) devices. The performance of the application at the local site is the priority. How should the customer configure replication? A. asynchronous mode replication B. asynchronous mode replication with the extended fabric option C. synchronous mode replication D. synchronous mode replication with the extended fabric option Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=59 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 60 iSCSI is best used for _____. (Choose two.) A. minimizing the amount of data transferred over the FCIP link B. connecting stranded servers to the SAN C. NAS block services D. additional controller pairs to effectively use available bandwidth Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=60 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 61 A customer has a mission-critical application based on a storage solution with replication on a pair of EVA arrays. Both the source and remote storage arrays must always be synchronized and in the event that a transaction cannot be committed the application should be halted. How must these arrays be set up? A. Synchronized mode=enabled B. Failsafe mode=enabled C. Failsafe mode=disabled D. Synchronized mode=disabled Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=61 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 62 A SAN administrator has an existing test SAN, based on 1 Gbps B-series (Brocade) fabric switches. To evaluate the compatibility of 1 Gbps and 2 Gbps switches, the administrator powers on a 1 Gbps and a 2 Gbps fabric switch (factory default settings). An ISL is then installed between the two fabric switches. The administrator notices that the fabric segments. What are two possible causes of this segmentation? (Choose two.) A. The new switch has a conflicting Domain I D. B. The zoning information is incompatible. C. The speed on the port must first be set for 1Gbps operation. D. The Core PID parameters are conflicting. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=62 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 63 Which three types of replication technologies does HP provide? (Choose three.) A. fabric-based B. host-based C. array-based D. disk-based E. tape-based Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=63 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 64 A customer has implemented a multi-switch core-edge fabric with B- series (Brocade) 2 Gbps fabric switches. How can the SAN administrator back up the SAN configuration data every time a change is made to the SAN? (Choose two.) A. download the switch and zoning configurations with the High Availability Fabric Manager B. Switch configuration and zoning configuration are automatically saved to a predefined location before a change is applied to either a switch or the fabric. C. download the switch and zoning configurations with the Fabric Manager D. use a Telnet session with FTP to download the switch and zoning information Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=64 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 65 What is an advantage of a core/edge topology? A. There is increased management for SAN capacity planning. B. It has performance characteristics suitable fortiering. C. Multiple backup processes can now run on one ISL. D. Fewer edge switches are used in this design thereby reducing the overall cost. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=65 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 66 On what is the design of the "Tree" SAN topology based? A. a fabric design that has switches that act as policy controllers for storage failover B. a fabric design that has one or moreFibre Channel switches acting as fabric backbones which dedicate all FC ports as ISLs C. a fabric design that has one or moreFibre Channel switches acting as the ISL trunk manager D. a fabric design that has one or moreFibre Channel switches acting as the Topology Configuration server Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=66 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 67 What is the maximum number of hops in a fabric based on the HP StorageWorks B-Series (Brocade) fabric switches? A. 7 B. 1 C. 6 D. 3 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=67 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 68 To prevent unauthorized configuration or management changes, what three policies does a Secure Fabric OS use? (Choose three.) A. extensive use of Access Control Lists (ACLs) B. compliance with secure sockets C. centralization of fabric configuration changes on trusted switches D. multi-level passwords E. single-level passwords Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=68 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 69 What is the most important security feature in any environment? A. a secure area for the systems in the security domain B. attitude and enforcement of the security policies C. regular security audits D. defined security policies for a defined security domain Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=69 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 70 A business continuity strategy for the protection of data can be built on techniques and procedures to _____. (Choose two.) A. avoid data loss B. recover data that has been lost C. shrink the backup and recovery window D. provide Hierarchical Storage Management (HSM) Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=70 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 71 What can be done to guarantee bandwidth when connecting SANs using IP? (Choose two.) A. create VPNs with Quality of Service (QoS) for FCIP B. create firewalls to isolate traffic C. create separate physical IP networks D. create virtual SANs to isolate FCIP traffic on the fabric Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=71 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 72 A customer currently performs a full backup of a 1 TB LUN on an application server attached to the SAN using an internal tape drive in the server. They want a SAN-based backup that centralizes their backups and minimizes the downtime of their application. Initially, the customer only wants to back up the changes to the data as they already have a full backup. Which solution meets this business need? A. clone + full backup B. snapshot + full backup C. snapshot + incremental backup D. clone + incremental backup E. snapshot + differential backup F. clone + differential backup Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=72 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 73 Which SAN implementation provides high availability but in the event of a failure may experience reduced bandwidth? A. using a single fully meshed, multi-trunked fabric topology B. using dual fabrics implemented with multiple storage paths C. using a minimum of two SMAs for SAN management with Command View D. using dual storage paths to the same switch in transparent failover mode Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=73 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 74 In many cases, the growth pattern for a storage installation is difficult or impossible to predict. To accommodate this unpredictability, the SAN architect should allow for growth within a predefined design that _____. A. uses the initial installation as a subset of a larger pre-designed configuration B. uses the cascaded switch topology as the initial installation C. is a subset of the mesh for a smaller configuration D. uses the ring switch topology as the initial installation Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=74 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 75 Which statement is true about documenting the SAN architecture and design? A. Documentation is not needed if the architect is managing the SAN. B. Without documentation the SAN is difficult to support. C. Without documentation the source of SNMP messages is unknown. D. Documentation increases SAN performance. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=75 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 76 Who is responsible for the security in the SAN? A. LAN Security Manager B. SAN Configuration Manager C. SAN Security Manager D. SAN Change Manager Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=76 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 77 What is a Recovery Point Objective (RPO) of three hours indicate as it relates to backup and restore? A. Data should be cloned and restored every three hours. B. The amount of data lost with backups should not exceed three hours. C. Data is restored and the environment is operational within three hours. D. The data should be fully backed up and restored every three hours. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=77 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 78 What are two security requirements that have evolved as SANs increase in size and are internetworked over MAN/WANs? (Choose two.) A. administrator and user access control/authentication B. strong or binding authentication among SAN devices (switches and servers) C. increased controls and granularity in SAN access and security policy distribution D. increased privacy for sensitive management data such as passwords and files Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=78 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 79 A customer has an application that is considered mission critical. In the event of a disaster, they want a replication solution that will guarantee that the replicated data is identical to the source without any data loss. Which solution accomplishes this? A. synchronous replication B. bidirectional replication C. asynchronous replication D. fan-out replication Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=79 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 80 Which two statements about a SAN switch configuration restore are true? (Choose two.) A. Fabric switch parameters can be restored to a previous configuration when the switch is online. B. Fabric switch parameters can be restored to a previous configuration when the switch is offline. C. The IP address parameters cannot be restored to a switch. D. The IP address parameters can be restored to a switch. E. The switch must first be disabled before any parameters can be changed. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=80 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 81 What are four primary OVSAM management functions? (Choose four.) A. tape management B. asset management C. event management D. performance management E. change management F. protocol management G. device management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=81 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 82 What virtualization model is used in the Continuous Access Storage Appliance (CASA)? A. either symmetrical or asymmetrical selected at the initial configuration B. out-band management of symmetrical virtual objects C. asymmetrical pooling or also called out-band virtualization D. symmetrical pooling or also called in-band virtualization Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=82 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 83 How could you scale a SAN s performance? A. ensure fabric parameters on both fabrics are identical B. replace low speed switches with higher speed switches C. reduce buffer-to-buffer credits for a single switch in the fabric D. change one switch Domain ID at a time to minimize I/O interruption Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=83 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 84 What are three possible outcomes of a storage assessment? (Choose three.) A. storage utilization B. ROI on existing storage C. SAN design D. inventory of systems E. standards for the SAN F. ownership and usage statistics Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=84 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 85 A SAN administrator needs to change the Domain ID and Core PID parameters on a switch that is part of a production fabric. Which two statements about this update are true? (Choose two.) A. The Core PID parameter does not need to be manually changed; it will automatically be selected. B. This process cannot be performed with the switch online and is disruptive. C. This process can be performed with the switch online without disruption. D. The switch must be rebooted to set the Domain ID and Core PI D. E. The Core PID parameter must be manually changed as it is set to a default value in the factory. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=85 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 86 A customer has implemented a multi-switch core-edge fabric with B- series (Brocade) 2 Gbps fabric switches. How can the SAN administrator back up the SAN configuration data every time a change is made to the SAN? (Choose two.) A. download the switch and zoning configurations with the High Availability Fabric Manager B. Switch configuration and zoning configuration are automatically saved to a predefined location before a change is applied to either a switch or the fabric. C. use a Telnet session with FTP to download the switch and zoning information D. download the switch and zoning configurations with the Fabric Manager Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=86 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 87 A SAN administrator has a dual fabric (Fabric-A and Fabric-B) NSPOF SAN with Windows hosts that are connected to an EVA storage subsystem. Each host has two HBAs and Secure Path. The administrator needs to move all the data traffic to Fabric-B. What are two recommended ways to accomplish this? (Choose two.) A. power off all the switches in Fabric-A B. disable all the switches in Fabric-A C. disconnect the cables from the HBAs attached to Fabric-A D. disable all the switch ports in Fabric-A attached the HBAs in the hosts E. use Secure Path to move the LUN access to the required HBA Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=87 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 88 Which three HP storage arrays are capable of remote array-based replication? (Choose three.) A. MA8000 B. MSA1000 C. VA7410 D. XP1024 E. EVA5000 F. RA4100 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=88 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 89 What is a common cause of downtime in a customer s IT application, databases, and infrastructure? A. software malfunction B. human error C. power outages D. computer viruses Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=89 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 90 A customer is testing storage array replication with two storage systems between their data centers. The local array and remote arrays are connected by a 2 Gbps Brocade-based SAN, 35 km apart using a Dense Wave Division Multiplexing (DWDM) devices. The performance of the application at the local site is the priority. How should the customer configure replication? A. synchronous mode replication B. asynchronous mode replication with the extended fabric option C. synchronous mode replication with the extended fabric option D. asynchronous mode replication Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=90 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 91 FCIP is best used for _____. (Choose two.) A. increasing network bandwidth B. WAN extensions based on cost effectiveness for distance C. eliminating unacceptable performance delays D. MAN extensions based on cost effectiveness for distance Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=91 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 92 DRAG DROP Click the Task button. Arrange the steps in sequence as they would be implemented as part of the Storage Architecture process. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=92 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 93 What is a common cause of downtime in a customer s IT application, databases, and infrastructure? A. power outages B. computer viruses C. software malfunction D. human error Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=93 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 94 Which statement is true about storage virtualization using Continuous Access Storage Appliance (CASA) in a SAN? A. It is a methodology used to increase employee productivity and to avoid unexpected overtime. B. It provides seamless integration of block level data objects. C. It provides a layer of abstraction of storage at the block level. D. It allows an integrated, metadata description of a transparent storage box. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=94 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 95 What is the most important thing to do when implementing a backup/restore solution? A. size the backup solution B. ensure that the storage arrays can replicate data between two arrays C. select the backup device technology, DLT or LTO D. purchase licenses for the servers Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=95 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 96 A customer has implemented a multi-switch core-edge fabric with B- series (Brocade) 2 Gbps fabric switches. How can the SAN administrator back up the SAN configuration data every time a change is made to the SAN? (Choose two.) A. Switch configuration and zoning configuration are automatically saved to a predefined location before a change is applied to either a switch or the fabric. B. use a Telnet session with FTP to download the switch and zoning information C. download the switch and zoning configurations with the High Availability Fabric Manager D. download the switch and zoning configurations with the Fabric Manager Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=96 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 97 A customer has an application with a single I/O stream. Data will be replicated over 100 km using DWDM between 2 Gbps SAN fabrics. From where does the most significant delay come? A. replication algorithm B. DWDM devices C. ISLs D. switch internal routing Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=97 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 98 You are using 2 Gb switches connected in a dual ring topology with two ISLs. What is the maximum cross-sectional bandwidth? A. 800Mbyte/sec B. 200Mbyte/sec C. 400Mbyte/sec D. 350Mbyte/sec Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=98 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 99 A SAN administrator plans on migrating the existing SAN topology. What two factors should be considered to prepare for this process? (Choose two.) A. number of storage systems B. application I/O profile C. the RAID level of the storage systems D. data locality Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=99 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 100 In IP networks, which two best practices should site planning include? (Choose two.) A. minimize the amount data transferred over the FCIP link(s) B. merge the FCIP network with your corporate network for better management C. create a design that will accommodate additional storage I/O without impacting normal data traffic D. use only one controller pair per FCIP link to avoid link congestion Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=100 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 101 iSCSI is a protocol that allows for _____. A. access to storage through a NIC B. a switch to manage a SCSI device C. data replication between SCSI devices D. SCSI devices to be managed interactively on the SAN Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=101 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 102 What are three fabric topology events that can be monitored with the B-Series (Brocade) Fabric Manager? (Choose three.) A. SAN peak hours traffic changes B. average SAN resource utilization C. topology reconfigurations D. zone changes E. GBIC/SFP extractions/insertions Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=102 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 103 Backbone SANs are best suited for what type of traffic? A. localized B. many-to-one C. many-to-many D. one-to-one Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=103 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 104 For what are SAN extensions used? A. business rules that decrease management overhead B. business continuance in case of site failure C. business policies that extend across the SAN D. high-speed business process engineering Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=104 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 105 You have a topology with two 16-port switches in a cascaded SAN using four ISLs from each switch. What is the port efficiency of the topology? A. 25% B. 40% C. 75% D. 100% Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=105 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 106 What are Fiber Optic Interconnects/Distance Rules for HP StorageWorks M-Series (McDATA) and B-Series (Brocade) fabric switches, per cable segment between devices and switches or switches and switches using 2 Gbit/sec speed and 50/125 micron multi-mode fiber optic cable and short wavelength SFP or SFF? A. up to 500 meters maximum distance B. up to 100 meters maximum distance C. up to 200 meters maximum distance D. up to 300 meters maximum distance Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=106 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 107 A customer has a mission-critical application based on a storage solution with replication on a pair of EVA arrays. Both the source and remote storage arrays must always be synchronized and in the event that a transaction cannot be committed the application should be halted. How must these arrays be set up? A. Failsafe mode=enabled B. Synchronized mode=disabled C. Synchronized mode=enabled D. Failsafe mode=disabled Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=107 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 108 What three factors should be considered when migrating a SAN from a ring topology to a coreedge topology. (Choose three.) A. security B. port count C. cross-sectional bandwidth D. zoning E. traffic patterns Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=108 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 109 You have a topology with two 16-port switches in a cascaded SAN using four ISLs from each switch. What is the port efficiency of the topology? A. 75% B. 40% C. 100% D. 25% Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=109 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 110 A user requests that a SAN architect designs a backbone SAN using McDATA directors and Edge switches. The user has some high performance storage systems that need to be accessed by multiple hosts. Where should these storage systems be connected in the SAN? A. to the bottom tier of switches B. to the top tier of switches C. to the same switch with the host with predominate access D. to the core switches Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=110 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 111 How long does it typically take to create a SAN architecture for an enterprise-class customer? A. days to weeks B. hours C. weeks to months D. months to years Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=111 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 112 What are three characteristics of the M-series (McDATA) High Availability Fabric Manager? (Choose three.) A. single switch management B. provides in-band management C. is embedded in theMcDATA switch/director firmware D. provides out-of-band management E. is a separate software package F. multiple switch management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=112 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 113 What are three OVSAM primary device discovery components? (Choose three.) A. system reboot discovery B. host agent discovery C. SNMP discovery D. discovery by event modeling E. managed hosts discovery F. LUN masking discovery Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=113 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 114 Which topology strategy supports unpredictable growth rates? A. core + edge B. cascaded + ring C. mesh + ring D. cascaded + mesh Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=114 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 115 What are three fabric topology events that can be monitored with the B-Series (Brocade) Fabric Manager? (Choose three.) A. zone changes B. topology reconfigurations C. average SAN resource utilization D. GBIC/SFP extractions/insertions E. SAN peak hours traffic changes Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=115 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 116 What problem can arise when scaling or merging SAN fabrics? A. If the discovery process determines specific cabling changes are required, then the merge will fail over. B. If the discovery process determines that the fabrics are not compatible, then the fabric will segment. C. If the discovery process determines changes in business requirements, then the SAN merge will fail. D. If the discovery process determines that the fabrics have different security levels, than the most secure level will be adopted. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=116 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 117 How can you reduce Total Cost of Ownership (TCO) of a SAN? A. identify and addressain levels?at upper management B. identify and addressain levels?when reducing operating staff C. identify and address SAN islands in large corporations that will merge from smaller organizations D. identify and addressain levels?associated with data movement, data sharing, and data growth Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=117 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 118 What virtualization model is used in the Continuous Access Storage Appliance (CASA)? A. symmetrical pooling or also called in-band virtualization B. either symmetrical or asymmetrical selected at the initial configuration C. asymmetrical pooling or also called out-band virtualization D. out-band management of symmetrical virtual objects Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=118 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 119 What is the maximum number of hops in a fabric based on the HP StorageWorks B-Series (Brocade) fabric switches? A. 7 B. 1 C. 6 D. 3 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=119 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 120 How does a SAN management infrastructure reduce Total Cost of Ownership (TCO)? A. by reducing staffing associated with SANs B. by reducing operating system problems C. by implementing hardware consolidation D. by implementing SAN automation Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=120 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 121 What are four requirements for implementing the Brocade Secure Fabric OS with the B-Series (Brocade) of switches? (Choose four.) A. secure SES client communication B. digital certificates C. firmware, zoning, and security licenses D. at least one core switch 2/64 E. Fabric Management Policy Sets F. secure Telnet client communication G. dedicated security server Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=121 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 122 When planning to scale a SAN by migrating topologies, best practices recommend the SAN should be _____. A. zoned before the change B. restarted C. using non-persistent addressing D. well documented Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=122 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 123 How do you detect a possible security intrusion attempt into the SAN? A. switch event logging B. switch port connection monitoring C. switch zone rejection log D. switch security audit log Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=123 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 124 What is the result of merging a zoned fabric with a non-zoned fabric? A. Devices that were in the non-zoned fabric are not accessible until they are added into the current enabled configuration. B. Devices in the fabric are not accessible until the devices in the non-zoned fabric are zoned and made part of the effective configuration. C. Any devices that were in the non-zoned fabric are automatically configured into a new zone as part of the effective configuration so they can function. D. The fabrics do not merge. They segment and require manual intervention. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=124 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 125 What are Fiber Optic Interconnects/Distance Rules for HP StorageWorks M-Series (McDATA) and B-Series (Brocade) fabric switches, per cable segment between devices and switches or switches and switches using 1 Gbit/sec speed and 50/125 micron multi-mode fiber optic cable and short wavelength GBICs or GLMs? A. up to 500 meters maximum distance B. up to 300 meters maximum distance C. up to 1000 meters maximum distance D. up to 200 meters maximum distance Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=125 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 126 You have four 16-port switches in a small topology using the mesh configuration, with three ISLs going to each adjacent switch. What is the available number of user ports? A. 64 B. 52 C. 61 D. 40 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=126 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 127 A customer has a SAN solution that is configured for disaster recovery using EVAs with synchronous data replication. An employee suggests that they do not need to back up their EVAs anymore as the data is protected at all times. As a SAN architect, what is your advice to the customer? A. You agree with the employee but only if clones are maintained at set intervals. B. You agree with the employee but only if snapshots and clones are maintained at set intervals. C. You agree with the employee. D. You disagree and recommend continuing with the backups and explain why. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=127 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 128 What virtualization model is used in the Continuous Access Storage Appliance (CASA)? A. asymmetrical pooling or also called out-band virtualization B. out-band management of symmetrical virtual objects C. either symmetrical or asymmetrical selected at the initial configuration D. symmetrical pooling or also called in-band virtualization Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=128 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 129 What are two security requirements that have evolved as SANs increase in size and are internetworked over MAN/WANs? (Choose two.) A. administrator and user access control/authentication B. increased controls and granularity in SAN access and security policy distribution C. strong or binding authentication among SAN devices (switches and servers) D. increased privacy for sensitive management data such as passwords and files Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=129 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 130 Which statement is true about storage virtualization using Continuous Access Storage Appliance (CASA) in a SAN? A. It is a methodology used to increase employee productivity and to avoid unexpected overtime. B. It provides a layer of abstraction of storage at the block level. C. It provides seamless integration of block level data objects. D. It allows an integrated, metadata description of a transparent storage box. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=130 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 131 You are implementing a SAN solution. When should a SAN architecture be created? A. anytime B. when the SAN is being designed C. before any design or implementation D. when the SAN is implemented Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=131 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 132 iFCP is a protocol that translates _____. A. Fibre Channel protocol into IP protocol B. ATM protocol intoFibre Channel protocol C. Fibre Channel protocol into SCSI protocol D. SCSI protocol intoFibre Channel protocol Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=132 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 133 A SAN administrator has a dual fabric (Fabric-A and Fabric-B) NSPOF SAN with Windows hosts that are connected to an EVA storage subsystem. Each host has two HBAs and Secure Path. The administrator needs to move all the data traffic to Fabric-B. What are two recommended ways to accomplish this? (Choose two.) A. use Secure Path to move the LUN access to the required HBA B. disable all the switches in Fabric-A C. disable all the switch ports in Fabric-A attached the HBAs in the hosts D. power off all the switches in Fabric-A E. disconnect the cables from the HBAs attached to Fabric-A Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=133 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 134 A customer currently performs a full backup of a 1 TB LUN on an application server attached to the SAN using an internal tape drive in the server. They want a SAN-based backup that centralizes their backups and minimizes the downtime of their application. Initially, the customer only wants to back up the changes to the data as they already have a full backup. Which solution meets this business need? A. clone + differential backup B. clone + incremental backup C. snapshot + incremental backup D. clone + full backup E. snapshot + differential backup F. snapshot + full backup Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=134 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 135 A business continuity strategy for the protection of data can be built on techniques and procedures to _____. (Choose two.) A. avoid data loss B. recover data that has been lost C. provide Hierarchical Storage Management (HSM) D. shrink the backup and recovery window Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=135 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 136 A SAN administrator plans on migrating the existing SAN topology. What two factors should be considered to prepare for this process? (Choose two.) A. application I/O profile B. the RAID level of the storage systems C. data locality D. number of storage systems Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=136 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 137 SAN architecture is created at ______. A. the mid level of storage abstraction B. the smallest LUN possible in the SAN C. the lowest level of storage abstraction D. the highest level of storage abstraction Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=137 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 138 A customer has an application that is considered mission critical. In the event of a disaster, they want a replication solution that will guarantee that the replicated data is identical to the source without any data loss. Which solution accomplishes this? A. asynchronous replication B. synchronous replication C. fan-out replication D. bidirectional replication Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=138 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 139 What problem can arise when scaling or merging SAN fabrics? A. If the discovery process determines changes in business requirements, then the SAN merge will fail. B. If the discovery process determines that the fabrics are not compatible, then the fabric will segment. C. If the discovery process determines specific cabling changes are required, then the merge will fail over. D. If the discovery process determines that the fabrics have different security levels, than the most secure level will be adopted. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=139 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 140 What does a SAN high availability configuration provide? A. a non-disruptive upgrade process of theiSCSI protocol definitions B. the capability to test new switch firmware in a production environment C. a non-disruptive merging of multiple SANs D. non-disruptive SNMP messages to the system management framework Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=140 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 141 Which tool should you use to conduct a storage assessment? A. HPOpenView Storage Configuration Manager B. HPOpenView Storage Area Manager C. HPOpenView Storage Provisioner D. HPOpenView Storage Profiler Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=141 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 142 What are Fiber Optic Interconnects/Distance Rules for HP StorageWorks M-Series (McDATA) and B-Series (Brocade) fabric switches, per cable segment between devices and switches or switches and switches using 2 Gbit/sec speed and 50/125 micron multi-mode fiber optic cable and short wavelength SFP or SFF? A. up to 200 meters maximum distance B. up to 100 meters maximum distance C. up to 300 meters maximum distance D. up to 500 meters maximum distance Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=142 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 143 Knowing very little about a customer and their environment, you are asked to propose a large SAN solution. What three recommendations should you make? (Choose three.) A. manage all LUN masking at the switch-level B. use only core or director switches C. create a SAN design which is a subset of a larger design D. use core plus edge switch topology E. use multiple independent fabrics F. never mix 1Gbps switches with 2 Gbps switches Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=143 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 144 The Continuous Access Storage Appliance (CASA) virtualizes storage at what level? A. application level B. host level C. storage level D. fabric level Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=144 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 145 SAN data management policies involve developing the necessary plans, processes and procedures _____. A. for file export and format sharing B. to integrate with system management frameworks C. for classifying, storing, and recovering data D. for export, print, or email of multiple SAN data reports Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=145 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 146 A SAN administrator needs to migrate a SAN topology from a ring to a core-edge topology using a new switch. Which two statements are true? (Choose two.) A. This cannot be done without disruption. B. This migration is not supported. C. This can be done without disruption. D. The switch routing configuration needs to be manually updated to reflect the new topology. E. The switch routing configuration is automatically updated to reflect the new topology. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=146 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 147 A SAN administrator must implement a new SAN and is told that the primary data access will be one-to-one. Which two SAN topologies are optimized for this data access pattern? (Choose two.) A. ring B. cascaded C. meshed D. tree backbone Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=147 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 148 On what is the design of the "Tree" SAN topology based? A. a fabric design that has one or moreFibre Channel switches acting as fabric backbones which dedicate all FC ports as ISLs B. a fabric design that has one or moreFibre Channel switches acting as the ISL trunk manager C. a fabric design that has one or moreFibre Channel switches acting as the Topology Configuration server D. a fabric design that has switches that act as policy controllers for storage failover Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=148 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 149 You have a topology with two 16-port switches in a cascaded SAN using four ISLs from each switch. What is the port efficiency of the topology? A. 25% B. 40% C. 100% D. 75% Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=149 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 150 Which statement is true about documenting the SAN architecture and design? A. Without documentation the SAN is difficult to support. B. Documentation is not needed if the architect is managing the SAN. C. Documentation increases SAN performance. D. Without documentation the source of SNMP messages is unknown. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=150 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 151 What is a Recovery Point Objective (RPO) of three hours indicate as it relates to backup and restore? A. Data is restored and the environment is operational within three hours. B. The amount of data lost with backups should not exceed three hours. C. The data should be fully backed up and restored every three hours. D. Data should be cloned and restored every three hours. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=151 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 152 A SAN administrator has an existing test SAN, based on 1 Gbps B-series (Brocade) fabric switches. To evaluate the compatibility of 1 Gbps and 2 Gbps switches, the administrator powers on a 1 Gbps and a 2 Gbps fabric switch (factory default settings). An ISL is then installed between the two fabric switches. The administrator notices that the fabric segments. What are two possible causes of this segmentation? (Choose two.) A. The new switch has a conflicting Domain I D. B. The speed on the port must first be set for 1Gbps operation. C. The Core PID parameters are conflicting. D. The zoning information is incompatible. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=152 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 153 Knowing very little about a customer and their environment, you are asked to propose a large SAN solution. What three recommendations should you make? (Choose three.) A. never mix 1Gbps switches with 2 Gbps switches B. use only core or director switches C. use core plus edge switch topology D. manage all LUN masking at the switch-level E. create a SAN design which is a subset of a larger design F. use multiple independent fabrics Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=153 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 154 What is the maximum number of switches within a fabric that can be designated as fabric configuration servers? A. 3 switches B. all switches C. 7 switches D. 1 switch Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=154 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 155 What does a Recovery Time Objective (RTO) of three hours indicate as it relates to backup and restore? A. The amount of data lost with backups should not exceed three hours. B. Data is restored and the environment is operational within three hours. C. Data should be cloned and restored every three hours. D. The data should be fully backed up and restored every three hours. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=155 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 156 A SAN administrator must implement a new SAN and is told that the primary data access will be one-to-one. Which two SAN topologies are optimized for this data access pattern? (Choose two.) A. cascaded B. tree backbone C. ring D. meshed Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=156 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 157 What information should a SAN architecture contain? (Choose three.) A. SAN implementation guidelines B. detailed process description C. detailed SAN topology maps D. product specific information for every component in the SAN E. product independent information F. high-level process description Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=157 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 158 What does a Recovery Time Objective (RTO) of three hours indicate as it relates to backup and restore? A. Data should be cloned and restored every three hours. B. The data should be fully backed up and restored every three hours. C. Data is restored and the environment is operational within three hours. D. The amount of data lost with backups should not exceed three hours. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=158 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 159 Which statement is true about storage virtualization using Continuous Access Storage Appliance (CASA) in a SAN? A. It provides a layer of abstraction of storage at the block level. B. It provides seamless integration of block level data objects. C. It is a methodology used to increase employee productivity and to avoid unexpected overtime. D. It allows an integrated, metadata description of a transparent storage box. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=159 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 160 What is a best practice for large scale SANs and SAN scaling? A. implement many-to-one connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion B. implement one-to-one connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion C. implement any-to-any connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion D. implement many-to-one-to-many connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=160 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 161 A customer currently performs a full backup of a 1 TB LUN on an application server attached to the SAN using an internal tape drive in the server. They want a SAN-based backup that centralizes their backups and minimizes the downtime of their application. Initially, the customer only wants to back up the changes to the data as they already have a full backup. Which solution meets this business need? A. clone + differential backup B. snapshot + full backup C. snapshot + differential backup D. clone + full backup E. snapshot + incremental backup F. clone + incremental backup Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=161 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 162 What are two reasons for using the SAN architecture approach? (Choose two.) A. to simplify SAN storage infrastructure resources in a unified direction B. to provide business-related rationale for SAN infrastructure investment C. to align SAN infrastructure with business processes and priorities D. to minimize SAN technology transitions and establish long-term SAN standards and framework Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=162 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 163 What is the maximum number of hops in a fabric based on the HP StorageWorks B-Series (Brocade) fabric switches? A. 7 B. 1 C. 6 D. 3 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=163 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 164 DRAG DROP Click the Task button. Two SANs must be merged. SAN-A has no zoning implemented while SAN-B has zoning in effect. The SAN administrator needs to perform a number of steps to accomplish this. Arrange the steps in the sequential order that would be optimal for this process. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=164 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 165 What is a design property of the Core+Edge+Leaf SAN topology? A. It allows many devices to share a single ISL. B. It allows for placingtrunking-capable switches adjacent to each other. C. It involves simplex I/O, meaning only one path is utilized for I/O. D. It provides a reasonable bandwidth guarantee to nodes connected to a first- or second-level edge switch. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=165 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 166 Which three are necessary for a SAN that requires a moderate level of security? (Choose three.) A. routine periodic security audits B. computer system security awareness training for all personnel C. locating storage systems andFibre Channel switches in a secure area D. enabling SES management interface toFibre Channel switches E. a SAN-wide restricted permanent administrator-level password F. disabling Selective Storage Presentation on array and using switch LUN zoning Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=166 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 167 What is a design property of the Core+Edge+Leaf SAN topology? A. It allows many devices to share a single ISL. B. It allows many hosts to share a single storage port. C. It can start at one switch and grow almost without limit. D. It involves simplex I/O, meaning only one path is utilized for I/O. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=167 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 168 What information should a SAN architecture contain? (Choose three.) A. product independent information B. high-level process description C. detailed SAN topology maps D. detailed process description E. product specific information for every component in the SAN F. SAN implementation guidelines Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=168 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 169 What are three characteristics of B-Series (Brocade) Fabric Manager? (Choose three.) A. is a separate software package B. provides out-of-band management C. is embedded in the Brocade switch firmware D. provides in-band management E. multiple switch management F. single switch management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=169 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 170 What are four requirements for implementing the Brocade Secure Fabric OS with the B-Series (Brocade) of switches? (Choose four.) A. at least one core switch 2/64 B. secure Telnet client communication C. digital certificates D. secure SES client communication E. firmware, zoning, and security licenses F. Fabric Management Policy Sets G. dedicated security server Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=170 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 171 Why does a SAN infrastructure need an architectural approach? A. to achieve a lower number of switches in a fabric and reduce the number of redundant ISLs in the topology B. to provide an architecture for one-to-many traffic patterns C. to allow multiple application servers connected to one of the storage sets connected across all the switches D. to manage complexity due to flexibility and multiple degrees of freedom Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=171 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 172 What SAN documentation is recommended before beginning the actual implementation? (Choose four.) A. Configuration Layout B. Topology Map C. RSS Layout D. Zoning Map E. Storage Map F. Name Server Map G. Performance Map Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=172 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 173 For HP, what is Data Availability Level 4 in a SAN? A. designs with dual fabrics using multiple physically separate fabrics, multi-path designs B. designs with more than one ISL between switches that provide the benefit of fabric resiliency against link failure C. maximum connectivity using a single non-meshed fabric, a single server and single storage paths D. designs with more than one ISL between switches and the addition of multiple data paths between servers and storage connecting into one fabric Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=173 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 174 Which SAN implementation provides high availability but in the event of a failure may experience reduced bandwidth? A. using a single fully meshed, multi-trunked fabric topology B. using dual storage paths to the same switch in transparent failover mode C. using dual fabrics implemented with multiple storage paths D. using a minimum of two SMAs for SAN management with Command View Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=174 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 175 What are three characteristics of the M-series (McDATA) High Availability Fabric Manager? (Choose three.) A. provides out-of-band management B. provides in-band management C. is embedded in theMcDATA switch/director firmware D. single switch management E. is a separate software package F. multiple switch management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=175 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 176 What three factors could be used to determine which storage systems should be migrated to the SAN first? (Choose three.) A. business needs B. added cost for migration C. protocol requirements D. storage usage and applications E. storage capacity Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=176 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 177 To prevent unauthorized configuration or management changes, what three policies does a Secure Fabric OS use? (Choose three.) A. centralization of fabric configuration changes on trusted switches B. extensive use of Access Control Lists (ACLs) C. compliance with secure sockets D. multi-level passwords E. single-level passwords Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=177 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 178 What is a best practice for large scale SANs and SAN scaling? A. implement many-to-one-to-many connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion B. implement any-to-any connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion C. implement one-to-one connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion D. implement many-to-one connectivity in the topology with an adequate number of ports to support future storage virtualization/expansion Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=178 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 179 A SAN administrator needs to change the Domain ID and Core PID parameters on a switch that is part of a production fabric. Which two statements about this update are true? (Choose two.) A. This process can be performed with the switch online without disruption. B. The Core PID parameter does not need to be manually changed; it will automatically be selected. C. The switch must be rebooted to set the Domain ID and Core PI D. D. This process cannot be performed with the switch online and is disruptive. E. The Core PID parameter must be manually changed as it is set to a default value in the factory. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=179 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 180 Why does a SAN infrastructure need an architectural approach? A. to allow multiple application servers connected to one of the storage sets connected across all the switches B. to provide an architecture for one-to-many traffic patterns C. to achieve a lower number of switches in a fabric and reduce the number of redundant ISLs in the topology D. to manage complexity due to flexibility and multiple degrees of freedom Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=180 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 181 What is Wavelength Division Multiplexing (WDM)? A. multiple wavelengths used to allow multiple simultaneous connections on a single fiber optic cable B. multiple wavelengths using Frequency Modulation on a single fiber optic cable C. multiple wavelengths using Time-Division Multiplexing on a single fiber optic cable D. multiple wavelengths using Amplitude Modulation on a single fiber optic cable Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=181 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 182 What does a SAN high availability configuration provide? A. a non-disruptive upgrade process of theiSCSI protocol definitions B. a non-disruptive merging of multiple SANs C. non-disruptive SNMP messages to the system management framework D. the capability to test new switch firmware in a production environment Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=182 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 183 What is the most important thing to do when implementing a backup/restore solution? A. size the backup solution B. ensure that the storage arrays can replicate data between two arrays C. purchase licenses for the servers D. select the backup device technology, DLT or LTO Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=183 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 184 What are three characteristics of the M-series (McDATA) High Availability Fabric Manager? (Choose three.) A. multiple switch management B. is embedded in theMcDATA switch/director firmware C. single switch management D. provides out-of-band management E. provides in-band management F. is a separate software package Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=184 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 185 Which two affect the merging of SANs? (Choose two.) A. zoning naming standards B. switch fabric parameters C. SNMP configuration D. switch naming standards E. IP addresses Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=185 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 186 What is SAN event management? A. monitoring IP network resources through the same Ethernet infrastructure B. monitoring external system events when a triggering condition occurs C. monitoring the planning, acquisition, and optimal usage of SAN resources D. monitoring storage resources to ensure availability per business requirements Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=186 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 187 You are using ten 2 Gbit/sec 16-port switches in a tree design. There are four ISLs from each of the four edge switches to the two core switches. What is the cross sectional bandwidth for this tree? A. 3200 MB/s B. 400 MB/s C. 1600 MB/s D. 6400 MB/s Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=187 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 188 Which statement about B-series (Brocade) and M-series (McDATA) fabric switches is true? A. B-series fabric switches require a license to increase the buffer-to-buffer credits while M-series do not. B. B-series and M-series fabric switches do NOT require a license to increase the buffer-to-buffer credits. C. B-series and M-series fabric switches require a license to increase the buffer-tobuffer credits. D. M-series fabric switches require a license to increase the buffer-to-buffer credits while B-series do not. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=188 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 189 When deciding which storage system to migrate to the SAN, a customer may have a large investment in legacy storage systems that cannot be moved to the SAN. What should you recommend they do? (Choose two.) A. retire the storage system B. leave the storage system as is C. upgrade to a newer storage system D. move the storage system to business that is less critical Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=189 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 190 What is the result of merging a zoned fabric with a non-zoned fabric? A. Devices that were in the non-zoned fabric are not accessible until they are added into the current enabled configuration. B. Devices in the fabric are not accessible until the devices in the non-zoned fabric are zoned and made part of the effective configuration. C. Any devices that were in the non-zoned fabric are automatically configured into a new zone as part of the effective configuration so they can function. D. The fabrics do not merge. They segment and require manual intervention. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=190 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 191 SAN data management policies involve developing the necessary plans, processes and procedures _____. A. for classifying, storing, and recovering data B. to integrate with system management frameworks C. for file export and format sharing D. for export, print, or email of multiple SAN data reports Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=191 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 192 What does SAN performance management monitor and analyze? A. SNMP traffic B. SAN traffic patterns C. RSCN traffic patterns D. SAN name server traffic Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=192 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 193 You are using 2 Gb switches connected in a dual ring topology with two ISLs. What is the maximum cross-sectional bandwidth? A. 400Mbyte/sec B. 200Mbyte/sec C. 800Mbyte/sec D. 350Mbyte/sec Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=193 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 194 What three factors should be considered when migrating a SAN from a ring topology to a coreedge topology. (Choose three.) A. cross-sectional bandwidth B. traffic patterns C. port count D. security E. zoning Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=194 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 195 What are Fiber Optic Interconnects/Distance Rules for HP StorageWorks M-Series (McDATA) and B-Series (Brocade) fabric switches, per cable segment between devices and switches or switches and switches using 1 Gbit/sec speed and 50/125 micron multi-mode fiber optic cable and short wavelength GBICs or GLMs? A. up to 200 meters maximum distance B. up to 300 meters maximum distance C. up to 500 meters maximum distance D. up to 1000 meters maximum distance Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=195 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 196 What is an advantage of a core/edge topology? A. Fewer edge switches are used in this design thereby reducing the overall cost. B. It has performance characteristics suitable fortiering. C. Multiple backup processes can now run on one ISL. D. There is increased management for SAN capacity planning. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=196 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 197 A customer has a SAN solution that is configured for disaster recovery using EVAs with synchronous data replication. An employee suggests that they do not need to back up their EVAs anymore as the data is protected at all times. As a SAN architect, what is your advice to the customer? A. You agree with the employee but only if snapshots and clones are maintained at set intervals. B. You agree with the employee. C. You disagree and recommend continuing with the backups and explain why. D. You agree with the employee but only if clones are maintained at set intervals. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=197 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 198 Which three are necessary for a SAN that requires a moderate level of security? (Choose three.) A. computer system security awareness training for all personnel B. disabling Selective Storage Presentation on array and using switch LUN zoning C. enabling SES management interface toFibre Channel switches D. a SAN-wide restricted permanent administrator-level password E. routine periodic security audits F. locating storage systems andFibre Channel switches in a secure area Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=198 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 199 You are replicating data over long distances using 1 Gbps B-series (Brocade) fabric switches. Extended fabrics (increased buffer-to-buffer credits) should be used when the minimum distance exceeds _____ km. A. 15 B. 35 C. 10 D. 20 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=199 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 200 In IP networks, which two best practices should site planning include? (Choose two.) A. use only one controller pair per FCIP link to avoid link congestion B. minimize the amount data transferred over the FCIP link(s) C. create a design that will accommodate additional storage I/O without impacting normal data traffic D. merge the FCIP network with your corporate network for better management Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=200 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 201 A SAN administrator plans to implement fabric wide storage virtualization. The current SAN consists of dual redundant ring topology. Without detailed information about the virtualization, what topology should they plan to migrate to? A. cascaded topology B. tree topology C. meshed topology D. no change ring topology Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=201 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 202 You have four 16-port switches in a small topology using the mesh configuration, with three ISLs going to each adjacent switch. What is the available number of user ports? A. 61 B. 64 C. 40 D. 52 Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=202 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 203 What is a challenge when expanding a SAN with SAN extensions? A. network latency B. disk latency C. host latency D. switch latency Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=203 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 204 What is a best practice for large scale SANs and SAN scaling? A. implement bandwidth and throughput with support for a cascaded SAN topology B. implement enough bandwidth and throughput to support the business requirements C. implement enough bandwidth and throughput to support twice the business growth D. implement adequate bandwidth and throughput with support for business driven growth over time Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=204 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 205 What are three types of backup topologies? (Choose three.) A. WAN backup B. MAN backup C. local backup D. SAN backup E. LAN backup Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=205 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 206 What is a design property of the Core+Edge+Leaf SAN topology? A. It allows many devices to share a single ISL. B. It provides a reasonable bandwidth guarantee to nodes connected to a first- or second-level edge switch. C. It allows for placingtrunking-capable switches adjacent to each other. D. It involves simplex I/O, meaning only one path is utilized for I/O. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=206 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 207 What happens in the Storage Assessment phase of the SAN architecture approach? (Choose three.) A. selection and establishment of guidelines models, principles, and standards for the SAN B. description of the feasibility of an effective solution based on obstacles and constraints C. an inventory of systems, software, employee skills, and internal processes/documentation D. analysis and documentation of business requirements, organization, physical environment, networks, and infrastructure management E. Business data is classified, utilization of data is explored, ownership and usage statistics of application volumes on systems are reported. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=207 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 208 A customer is testing storage array replication with two storage systems in their data center. The arrays are connected with fiber optic cables that are a total of 30 meters in length. The replication mode is changed from synchronous to asynchronous. How does this affect replication performance in this case? A. Asynchronous mode replication is much faster than synchronous mode. B. Synchronous mode replication is slightly faster than asynchronous mode C. Synchronous mode replication is much faster than asynchronous mode. D. Asynchronous mode replication is about the same as synchronous mode. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=208 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 209 A best practice for SAN architecture and design is to implement a subset of _____. A. an under-designed single-fabric fat tree with dual HBAs to the switches B. an over-designed single-fabric skinny tree SAN with edge switches C. an over-designed multi-fabric fat tree core SAN with edge switches D. correctly-sized multi-fabric switches Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=209 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 210 What are three OVSAM primary device discovery components? (Choose three.) A. SNMP discovery B. system reboot discovery C. LUN masking discovery D. discovery by event modeling E. managed hosts discovery F. host agent discovery Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=210 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 211 A SAN architect must design a SAN-based Enterprise Backup Solution (EBS) using a tape library with Ultrium II tape drives. What is the minimum tape drive data read rate with 1:1 compression necessary to keep the drive streaming? A. > or = 10 MB/s B. > or = 15 MB/s C. > or = 30 MB/s D. > or = 20 MB/s E. > or = 25 MB/s Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=211 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 212 A customer wants to use 2 Gbps B-series (Brocade) fabric switches in an extended fabric configuration with two 35 km single-mode fiber optic ISLs. What is required for the two switches on either end of the link? A. An extended fabric license must be added to all switches in the SAN. B. A remote switch license must be added to both switches. C. Nothing is required, simply connect the ISLs. D. An extended fabric license must be added to both switches. Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=212 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 213 What three results of a storage assessment are useful in determining the cross-sectional bandwidth and topology requirement in a SAN design? (Choose three.) A. application I/O data rates B. number of application users C. total storage capacity D. backup throughput E. volume usage statistics F. application data access patterns Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=213 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 214 For HP, what is Data Availability Level 4 in a SAN? A. maximum connectivity using a single non-meshed fabric, a single server and single storage paths B. designs with more than one ISL between switches and the addition of multiple data paths between servers and storage connecting into one fabric C. designs with more than one ISL between switches that provide the benefit of fabric resiliency against link failure D. designs with dual fabrics using multiple physically separate fabrics, multi-path designs Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=214 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 215 What is SAN event management? A. monitoring IP network resources through the same Ethernet infrastructure B. monitoring external system events when a triggering condition occurs C. monitoring storage resources to ensure availability per business requirements D. monitoring the planning, acquisition, and optimal usage of SAN resources Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=215 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 216 iSCSI is best used for _____. (Choose two.) A. NAS block services B. additional controller pairs to effectively use available bandwidth C. minimizing the amount of data transferred over the FCIP link D. connecting stranded servers to the SAN Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=216 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 217 Backbone SANs are best suited for what type of traffic? A. many-to-many B. one-to-one C. many-to-one D. localized Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=217 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 218 Why do customers want to extend the SAN? A. to connect geographically distributed data centers B. to make SANs more manageable C. to increase the speed of data transport D. to scale SANs with more switches Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=218 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 219 In many cases, the growth pattern for a storage installation is difficult or impossible to predict. To accommodate this unpredictability, the SAN architect should allow for growth within a predefined design that _____. A. uses the cascaded switch topology as the initial installation B. is a subset of the mesh for a smaller configuration C. uses the ring switch topology as the initial installation D. uses the initial installation as a subset of a larger pre-designed configuration Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=219 ------------------------------------------------------------------------------------------------------------------------------------- QUESTION: 220 A customer is testing storage array replication with two storage systems in their data center. The arrays are connected with fiber optic cables that are a total of 30 meters in length. The replication mode is changed from synchronous to asynchronous. How does this affect replication performance in this case? A. Asynchronous mode replication is much faster than synchronous mode. B. Asynchronous mode replication is about the same as synchronous mode. C. Synchronous mode replication is much faster than asynchronous mode. D. Synchronous mode replication is slightly faster than asynchronous mode Answer: http://www.twpass.com/twpass.com/exam.aspx?ecode=HP0-815&qno=220 ------------------------------------------------------------------------------------------------------------------------------------- TwPass Certification Exam Features; - TwPass offers over 2500 Certification exams for professionals. More than 98,800 Satisfied Customers Worldwide. Average 99.8% Success Rate. Over 120 Global Certification Vendors Covered. Services of Professional & Certified Experts available via support. Free 90 days updates to match real exam scenarios. Instant Download Access! No Setup required. Price as low as $19, which is 80% more cost effective than others. Verified answers researched by industry experts. Study Material updated on regular basis. Questions / Answers are downloadable in PDF format. Mobile Device Supported (Android, iPhone, iPod, iPad) No authorization code required to open exam. Portable anywhere. Guaranteed Success. Fast, helpful support 24x7. View list of All Exams (AE); http://www.twpass.com/twpass.com/vendors.aspx Download Any Certication Exam DEMO. http://www.twpass.com/twpass.com/vendors.aspx To purchase Full version of exam click below; http://www.TwPass.com/