CNIT 242 Exam 2: Storage Services Part 3

studied byStudied by 25 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 44

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

45 Terms

1

What is RAID?

Redundant Array of Inexpensive Disks that are used to create a single logical disk from multiple physical disks.

New cards
2

Why use RAID?

To increase performance and for fault tolerance

New cards
3

T/F: RAID is only implemented in hardware.

False, they can be implemented in hardware or software

New cards
4

How does hardware RAID work?

RAID operations are managed by the attachment controller and don’t use processor clock cycles or memory

New cards
5

What does Hardware RAID create?

A single point of failure, if the RAID controller fails, the entire array is down

New cards
6

How is Software RAID performed?

By the OS and uses processor clock cycles and memory

New cards
7

T/F: Physical drives are partitioned into special RAID partitions with hardware RAID

False, they are partitioned into special RAID partitions with software RAID

New cards
8

What is RAID 0

Striping, meaning data is distributed across multiple disks and provides performance, but no redundancy

New cards
9

T/F: In RAID 0, if one disk fails, all data is lost

True

New cards
10

What is RAID 1?

Mirroring, meaning data is duplicated across multiple disks providing no increased performance, but is fault tolerant

New cards
11

T/F: In RAID 1, if one disk fails, all data is lost.

False, a copy can be used

New cards
12

What is RAID 5?

Striped with parity, meaning data is striped across multiple disks and parity data is kept for each set of stripes. Increases performance and provides some redundancy.

New cards
13

What is RAID 10?

Striped and mirrored, meaning it stripes data across multiple disks which are then mirrored, which increases performance and is fault tolerant

New cards
14

What is Network Attached Storage (NAS)?

File level storage that is available over the network and is already partitioned and formatted.

New cards
15

T/F: NAS doesn’t require dedicated hardware

True, ethernet is the transport of choice

New cards
16

What are some common NAS technologies?

SMB, Common Internet File System, NFS

New cards
17

What is Storage Area Networks (SAN)?

Block level storage accessible over a network that uses dedicated hardware to interconnect the storage arrays

New cards
18

T/F: A physical connection is required for SAN

True

New cards
19

What are some SAN technologies?

iSCSI, Fiber Channel

New cards
20

What is SAN typically used for?

Datacenter-class applications because they separate traffic on networks

New cards
21

What is NAS typically used for?

File server applications, and the traffic is shared with other traffic

New cards
22

What is iSCSI?

Internet Small Computer System Interface, which is an OSI Session layer protocol

New cards
23

T/F: iSCSI uses UDP as the protocol and is not routable

False, uses TCP and is routable

New cards
24

What is an initiator in iSCSI?

A device that originates a session to a storage device and is typically a computing host

New cards
25

What is a target in iSCSI?

The storage device to which an intiator connects which is typically a dedicated device offering network storage

New cards
26

T/F: A single target is accessed by a single initiator in iSCSI

False, a single target can be accessed by multiple initiators

New cards
27

What is a Logical Unit Number (LUN)?

A logicial drive/partition presented over the network.

New cards
28

T/F: Each target contains multiple LUNs

True

New cards
29

What is network fabric?

The interconnection betweens nodes, typically ethernet

New cards
30

How are iCSI initiators and targets named

By iQNs or extended Unique Identifiers

New cards
31

T/F: In iSCSI, the network storage devices must be enumerated before they can be accessed

True

New cards
32

What is SendTargets in iSCSI?

A target server is queried by the initiator for the list of available targets and requires no additional infrastructure or services

New cards
33

In iSCSI security, what are the 4 componenents of it?

Logon, authentication, authorization, and encryption.

New cards
34

Which componenents of iSCSI security are optional?

Authentication and encryption

New cards
35

T/F: Initiators don’t have to logon to targets.

False, they must logon to targets

New cards
36

What is the process in iSCSI Logon?

Initiators create a connection and open a session, the first PDU sent must be a login request else the connection must be terminated by the target.

New cards
37

T/F: Until the login is completed, no other PDUs can be exchanged in the iSCSI logon process

True

New cards
38

T/F: The logon process can carry on if another PDU is received by the target.

False, it must fail the logon

New cards
39

iSCSI Authentication is provided by what?

Challenge-Handshake Authentication Protocol (CHAP)

New cards
40

What differentiates one way CHAP with mutual CHAP?

One way chap is when the target authenticates the initiator and mutual chap is when the target and initiator authenticate each other

New cards
41

Which CHAP is the minimum authentication level that should be used in protection?

One way CHAP

New cards
42

T/F: Authentication must be used in development in iSCSI Authentication

False, it’s ok to use no authentication in development

New cards
43

What is iSCSI Authorization based on?

Based on iQN, eui, IP address

New cards
44

How does iSCSI Authorization work?

The target checks ACL to determine if access to target is allowed

New cards
45

T/F: ACLs can be wildcarded to allow anyone access in iSCSI Authorization

True

New cards

Explore top notes

note Note
studied byStudied by 16 people
838 days ago
5.0(1)
note Note
studied byStudied by 31 people
866 days ago
5.0(3)
note Note
studied byStudied by 7 people
854 days ago
5.0(1)
note Note
studied byStudied by 7 people
881 days ago
5.0(1)
note Note
studied byStudied by 313 people
321 days ago
5.0(2)
note Note
studied byStudied by 7 people
109 days ago
5.0(4)
note Note
studied byStudied by 172 people
533 days ago
5.0(1)
note Note
studied byStudied by 14 people
61 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (116)
studied byStudied by 2 people
97 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 7 people
822 days ago
4.5(2)
flashcards Flashcard (71)
studied byStudied by 1 person
697 days ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 7 people
105 days ago
5.0(1)
flashcards Flashcard (103)
studied byStudied by 40 people
485 days ago
5.0(1)
flashcards Flashcard (83)
studied byStudied by 2 people
649 days ago
5.0(2)
flashcards Flashcard (269)
studied byStudied by 8 people
590 days ago
5.0(3)
flashcards Flashcard (69)
studied byStudied by 36 people
21 days ago
5.0(1)
robot