Ccs367 Storage Technologies - QB
Ccs367 Storage Technologies - QB
UNIT III
Bloom’
QNo CO
Questions s
s
Level
1 What is block based storage? CO K1
3
2 Show the schematic operation of operations of SCSI. CO K1
3
List the characteristics of file system. CO K1
3
3
Compare FC SAN and IP SAN. CO K2
4
3
Show the multi-mode fiber and single mode fiber. CO K1
5
3
List the FC-AL configuration limitations in terms of CO K1
6 3
scalability.
State the functions of FC-SW transmission.. CO K1
7
3
Infer the advantage of FCP. CO K1
8
3
Compare and contrast FC-4 layer and FC-2 layer. CO K2
9
3
Outline the 24 bit FC address of N port. CO K1
10
3
State the FC class of services. CO K1
11
3
List out the types of Zoning. CO K1
12
3
Define the term ‘mesh topology’. CO K1
13
3
Illustrate the fiber channel protocol stack. CO K2
14
3
Define switched fabric port. CO K1
15
3
Define Single mode fiber. CO K1
16
3
What is software defined storage? CO K1
17
3
Define iSCSI. CO K1
18
3
Define CAS. CO K1
19
3
List the Data storage process in OSD CO K1
20
3
Part – B
Explain in detail about object based and unified CO K2
1 3
storage.
Explain in detail about file-based storage. CO K2
2
3
Explain in detail about FC SAN Architecture. CO K2
3
3
Explain any two FC SAN Topologies. CO K2
4
3
Discuss in detail about zoning. CO K2
5
3
Explain in detail about iSCSI. CO K2
6
3
Explain virtualisation in FC SAN environment. CO K2
7
3
Explain the FCoE architecture. CO K2
8
3
Part – C
Summarize about Software defined networking and CO K2
1 3
VLAN.
Summarize about 140 connectivity. CO K2
2
3
UNIT IV
Bloom’
QNo CO
Questions s
s
Level
1 Define business continuity. CO K1
4
State the benefit of business continuity. CO K1
2
4
What is back up architecture? CO K1
3
4
Define backup targets. CO K1
4
4
How to identify unique data. CO K1
5
4
What is hashing or Fingerprinting? CO K1
6
4
How to elimination redundancy? CO K1
7
4
What is data migration? CO K1
8
4
Define DRaaS? CO K1
9
4
What is cloud based backup? CO K1
10
4
What is mobile device backup? CO K1
11
4
What are the data archiving methods? CO K1
12
4
What are the characteristics of replication? CO K1
13
4
List out the advantages of backup architecture. CO K1
14
4
What is compute-based replication? CO K1
15
4
16 What is Network-based replication? CO K1
4
List out the use cases of data migration? CO K1
17
4
Define backup methods. CO K1
18
4
What is local replication? CO K1
19
4
Define Data deduplication. CO K1
20
4
Part – B
1 Explain about data archiving. CO K2
4
Illustrate the use of replication and its CO K2
2
characteristics. 4
Explain briefly on Storage based replication. CO K2
3
4
Explain data migration in detail. CO K2
4
4
Illustrate in detail on Disaster Recovery as a Service. CO K2
5
4
Explain briefly on Network based replication. CO K2
6
4
Explain in detail on backup targets and backup CO K2
7 4
methods.
Explain briefly on business continuity. CO K2
8
4
Part – C
Illustrate Continuous data protection on local CO K2
1 4
replication.
Explain Tracking Changes to Source and Replica. CO K2
2
4
UNIT V
Bloom’
QNo CO
Questions s
s
Level
1 What is information security goals? CO K1
5
How to achieve data Integrity? CO K1
2
5
Define Management domain. CO K1
3
5
4 What is Data corruption? CO K1
5
How to prevent Data loss? CO K1
5
5
Define Application domain. CO K1
6
5
Compare Backup and replication domain. CO K2
7
5
Define Confidentiality. CO K1
8
5
State the Capacity-Planning Process. CO K1
9
5
What is Network security? CO K1
10
5
What are the threats to storage infrastructure? CO K1
11
6
Define Access control. CO K1
12
6
Define Data encryption. CO K1
13
6
What is Governance? CO K1
14
6
Define Risk Management. CO K1
15
6
What is Compliance? CO K1
16
6
What is Storage infrastructure management (SIM)? CO K1
17
6
Define Storage provisioning. CO K1
18
6
How Storage monitoring is done? CO K1
19
6
Define Storage troubleshooting. CO K1
20
6
Part – B
1 Explain any eight information security goals. CO K2
5
Illustrate in detail about storage security domains. CO K2
2
5
Explain about the threats to a storage infrastructure. CO K2
3
5
Illustrate about security controls to protect a storage CO K2
4 5
infrastructure.
Explain GRC in detail. CO K2
5
6
Explain in detail about Storage infrastructure CO K2
6 6
management functions.
Part – C
1 Discuss on an integrated GRC and its benefits. CO K2
6
Explain about any eight Storage infrastructure CO K2
2 6
management processes.