Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

S10-210 SNIA Storage Networking Management and Administration Free Practice Exam Questions (2025 Updated)

Prepare effectively for your SNIA S10-210 Storage Networking Management and Administration certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 97 questions

A customer has upgraded all switches in their redundant fabrics during a single maintenance window. Shortly after the upgrades are completed on the core switches, all servers lose access to all SAN attached storage.

What would have prevented this scenario?

A.

High availability

B.

Fault tolerance

C.

Change or risk management

D.

Clustered servers

You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.

What is the cause?

A.

The database requires replication from a second storage array.

B.

The database requires synchronous storage replication.

C.

Two copies of databases are required at the DR site to be able to replay transaction logs.

D.

An installed agent is required for the database to be quiesce and replicated in crash-consistent state.

You are asked to set up a server to boot from a SAN.

Which setting on the HBA needs to be configured?

A.

Change the queue depth value.

B.

Set Enable BIOS.

C.

Enable Persistent Bindings.

D.

Set Enable Target Rescan.

The CIO would like to segregate management device IP network traffic from server IP network traffic within the data center to limit potential security threats.

What would be used to accomplish this?

A.

IPsec

B.

Firewall

C.

VLANs

D.

PKI

Click the Exhibit button.

What is the protocol stack shown in the exhibit?

A.

FCoE

B.

SCSI

C.

InfiniBand

D.

Fibre Channel

You are designing a security solution for a storage array which stores customer credit card information. Data on the storage array must be encrypted and if necessary, you want to be able to revoke access to data on demand.

In addition to encryption, which solution would allow you to do this in a secure and automated fashion?

A.

Use a manual record deletion solution.

B.

Physically destroy hard drives holding the data

C.

Store data indefinitely.

D.

Use the key management solution.

Click the Exhibit button.

Your company has purchased a new storage array that has dual management access network ports. You need to connect the array and provide maximum redundancy without affecting production traffic.

Referring to the exhibit, where should the ports be attached?

A.

Cable one management access network port into management switch 1 and the other port into management switch 2.

B.

Cable both management access network ports into management switch 2.

C.

Cable one management access network port into core switch 1 and the other into core switch 2.

D.

Cable both management access network ports into management switch 1.

Click the Exhibit button.

Referring to the exhibit, which three switch indicators will help you to determine the stability of a link? (Choose three.)

A.

er_crc

B.

er_toolong

C.

er_enc_in

D.

er_bad_eof

E.

er_trunk

A number of servers are experiencing slower than expected performance. Analyzing the server, switch, and storage logs do not indicate any issues. You have been asked by the customer to address this issue.

What will improve performance?

A.

Increase the current queue depth setting from 1.

B.

Change the frame size from 2148 bytes,

C.

Decrease the buffer-to-buffer credits setting.

D.

Enable write caching functionality for the device driver.

You have a server which is booting from a SAN. After adding new SAN storage to a host, the host will not boot from the SAN.

What will resolve this problem?

A.

LUN masking

B.

Persistent binding

C.

Trunking

D.

Multiplex binding

You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.

Which server within the Fibre Channel fabric would be used to do this?

A.

Fabric Login server

B.

Name server

C.

Management server

D.

Fabric Controller

Your company's Service Level Agreement (SLA) requires that no more then one hour's worth of data be lost in case of a system crash. The data must also be restored within 10 hours.

Which two RTO/RPO combinations meet the SLA? (Choose two.)

A.

RTO 1 hour, RPO 10 hours

B.

RTO 10 hours, RPO 1 hour

C.

RTO 9 hours, RPO 1 hour

D.

RTO 1 hour, RPO 9 hours

After the storage administrator merged two multi-vendor FC SANs, an error indicates that two ports have become isolated causing a segmentation to exist in the fabric.

Which two events would cause this? (Choose two.)

A.

Overlapping zones

B.

Different port names

C.

Unsupported routing protocols

D.

Different link speeds

When troubleshooting an issue on a host, you discover that the existing file system partition has been corrupted after you provisioned a LUN to another host connected to the same FC fabric.

What is the cause of this problem?

A.

Incorrect zoning

B.

Incorrect LUN masking

C.

Incorrect multipathing policy

D.

Incorrect LUN size

A security audit reveals deficiencies in your company's FC zoning practices. Your manager asks you to make a recommendation to implement the most secure FC zoning possible. Your company is using switches from a single vendor.

What do you recommend?

A.

All zones should use frame-based hardware enforcement using pWWN identification exclusively for all configurations.

B.

All zones should use software-based enforcement using pWWN identification exclusively for all configurations.

C.

All zones should use frame-based hardware enforcement using destination port identification exclusively for all configurations.

D.

All zones should use software-based enforcement using destination port identification exclusively for all configurations.

A storage subsystems Web browser management interface reports that the subsystem has become degraded and remotely opens a service request with the vendor. Your vendors level three storage support engineer wants to remotely access your storage subsystem for troubleshooting.

What is a SNIA Storage Security Best Current Practices solution?

A.

Open firewall ports to allow the vendor's support engineer to access the Web browser management interface.

B.

Provide the vendor's support engineer with a temporary user ID that has sudo access to become a super user on the storage subsystem; this ensures an audit trail for all remote support activities.

C.

Provide the vendor's support engineer with a shared remote control session where you can monitor what the support engineer is doing while troubleshooting the subsystem without needing to share credentials.

D.

Provide a temporary user ID to allow the vendor's support engineer to access the Web browser management interface remotely over HTTP/TLS.

You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).

Which two protocol methods would be used? (Choose two.)

A.

Directory Name Service protocol (DNS)

B.

Simple Network Management Protocol (SNMP)

C.

Internet Storage Name Server protocol (iSNS)

D.

Service Location Protocol (SLP)

You have been hired to consult with storage administrators that are working with zoning and naming convention consistency issues. There are numerous types of zoning methods available using standards that also include aliasing. You want to use a method that guarantees unique global port identification.

What accomplishes this goal?

A.

WWPN

B.

domain_id:port_#

C.

Alias

D.

Zone set

The latest storage utilization report shows that 80% of the current 500 TB of enterprise storage is allocated. The storage administrator must specify the amount of additional storage needed for local copies for approximately half of the active storage.

How much additional storage should the administrator request?

A.

400 TB

B.

300 TB

C.

200 TB

D.

100 TB

You are installing an OLTP application on a new server. The I/O profile of the application consists of 100% random read operations of 8 kilobyte transfers. You need to determine which HBA to use in your application to accommodate 50,000 IOPS.

What is the minimum FC link speed that will satisfy the application's requirements?

A.

1 Gbps

B.

2 Gbps

C.

4 Gbps

D.

8 Gbps

Page: 1 / 2
Total 97 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved