0% found this document useful (0 votes)
17 views4 pages

San Final QB 2024

Uploaded by

gousebagban09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

San Final QB 2024

Uploaded by

gousebagban09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

SAN Q-BANK (19KBCS741)

Module-1

2 Marks

1. Define the factors that have contributed to the growth of digital data.
2. With figure determine the types of data.
3. Draw the figure for evolution of storage architecture.
4. Describe any four characteristics of file system.
5. Draw the figure for disk partitioning and concatenation.
6. With diagram define data and digital data.
7. Write short note on storage devices.
8. Draw the figure for logical block addressing.

8 Marks

1. With figure explain physical components of connectivity. Write a short note on interface
protocols.
2. Explain in detail disk drive performance.
3. Explain with figure process of mapping user files to disk storage.
4. With figure explain,
a) Disk I/O controller utilization.
b) Host access to data.

10 Marks

1. Explain with figure key data center elements and key characteristics of data center elements.
2. With figure explain,
a) Physical disk structure.
b) Zoned bit recording.
3. Explain with figure direct-attached storage, DAS benefits and limitations.

Module-2

2 Marks

1. Write any two features of the methods of RAID implementation.


2. Draw the figure for the components of RAID array.
3. Give the diagram for FC-SAN implementation.
4. Give the formulas for the following,
a) Parity (Ep) b) Ep new
5. Draw the figure for RAID-3 level.
6. Define Cache. List any two features of Cache.
7. Define LRU and MRU.
8. Define flushing, HWM and LWM.
8 Marks

1. With figure explain RAID techniques.


2. Explain with figure RAID-5 and RAID-6 levels.
3. Explain with figure components of an intelligent storage system.
4. Explain the types of intelligent storage systems.

10 Marks

1. With figure explain the RAID-0, RAID-1 and nested RAID levels.
2. With necessary figures, explain Cache.
3. Explain with figures, components of FC-SAN.

Module-3

2 Marks

1. What are the components of iSCSI ?


2. Name the two ways through which iSCSI discovery takes place?
3. What are the key components of FCoE network?
4. What are the two factors affecting NAS performance?
5. Which are the two types of iSCSI names commonly used?
6. Draw the figure for iSCSI session.
7. Describe any four benefits of NAS.
8. Draw the figure for FCoE switch generic architecture.

8 Marks

1. Explain with figure iSCSI topologies.


2. With figure explain, FCIP protocol stack and FCIP encapsulation.
3. Write a short note on the two common NAS file sharing protocols.

10 Marks

1. With figure explain,


a) iSCSI protocol stack b) iSCSI PDU
2. Explain with figure FCIP topology.
3. With figure explain the components of NAS and NAS I/O operation.

Module-4

2 Marks

1. What are the causes of information unavailability?


2. Describe BC technology solutions.
3. Define MTBF and MTTR.
4. Draw the figure for single point of failure.
5. Define hot and cold backup methods.
6. Define the three backup granularity levels.
7. List any four measures to resolve single points of failure.
8. Draw the figure for backup architecture.

8 Marks

1. Explain in detail BC terminology.


2. With figure explain in detail restoring from incremental backup and restoring from
cumulative backup.
3. With figure explain,
a) Server-based backup in a NAS environment.
b) Serverless backup in a NAS environment.

10 Marks

1. Explain with figure BC planning lifecycle.


2. With figure explain, backup and restore operation.
3. With figure explain backup topologies.

Module-5

2 Marks

1. Describe any four uses of local replicas.


2. Describe with figure synchronous replication.
3. Describe with figure asynchronous replication.
4. Explain briefly four primary security attributes.
5. What are the three storage security domains?
6. Define assets and threats.
7. Define CLI and GUI management interface.
8. Define the three factors to consider when assessing vulnerability to security threats.

08 Marks

1. Explain with figure


a) Host-based local replication.
b) Storage array-based replication.
2. With figure explain SAN security architecture.
3. Describe with figure securing IPSAN with CHAP authentication.
4. Explain with figure three-site replication.

10 Marks

1. Explain with figure the following storage array-based remote replication


a) Synchronous replication mode.
b) Asynchronous replication mode.
2. Explain with figure securing the application access domain and securing backup, recovery and
archive domain.
3. Explain with figure
a) Kerberos.
b) Network-layer firewalls.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy