1.
Which technology should be used to provide transparent low latency FC transport across a metropolitan area?
2.
Which statement is true concerning the Cisco MDS switch when operating in native interop mode?
3.
Your customer has a number of data storage requirements: servers are not responsible for volume management or data migration storage is provisioned in real time legacy and heterogeneous storage assets can be consolidated and fully utilized data can be protected using simplified snapshot and replication techniques data can be assigned to different classes easily Which solution would meet these requirements?
4.
Your customer is using an IPS-8 module in its data center to provide FCIP connectivity to 20 remote sites. It has encountered connectivity problems at four of the remote sites. After investigating, the customer's network administrator found that the IPS-8 is sending 2300-byte packets, but the receiving switches at the four remote sites do not support jumbo frames. What should you do?
5.
A customer has a need to synchronously replicate data from the primary data center to a standby data center that is 30 kilometers away. The customer owns the fiber between the two data centers and uses the link for Gigabit Ethernet connectivity today. The Gigabit Ethernet connection is heavily utilized and generally remains at 90-percent utilization. The customer expects that the replication traffic will require approximately 30 MBps, and is looking for a low-cost solution. Which replication solution would you recommend?
6.
Which SAN extension topology is a low-latency, cost-effective, high-bandwidth solution that is suitable only within a limited geographical area?
7.
Which of these provides fabric-based virtualization for multiple independent software vendors?
8.
How does Role-Based Access Control (RBAC) enhance manageability in an environment with VSANs?
9.
Your customer uses a custom change-management application. The customer wants running configuration files from Cisco MDS 9000 switches to be saved automatically to an FTP server every night. How can this be accomplished?
10.
Your customer has implemented an IPS-8 for iSCSI connectivity to workgroup servers. How can this customer prevent unauthorized hosts from connecting to the Cisco MDS 9000 fabric through the iSCSI interfaces?