CNIT 242 Exam 2: Storage Services Part 3

0.0(0)
studied byStudied by 32 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:38 PM on 3/10/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

What is RAID?

Redundant Array of Inexpensive Disks that are used to create a single logical disk from multiple physical disks.

2
New cards

Why use RAID?

To increase performance and for fault tolerance

3
New cards

T/F: RAID is only implemented in hardware.

False, they can be implemented in hardware or software

4
New cards

How does hardware RAID work?

RAID operations are managed by the attachment controller and don’t use processor clock cycles or memory

5
New cards

What does Hardware RAID create?

A single point of failure, if the RAID controller fails, the entire array is down

6
New cards

How is Software RAID performed?

By the OS and uses processor clock cycles and memory

7
New cards

T/F: Physical drives are partitioned into special RAID partitions with hardware RAID

False, they are partitioned into special RAID partitions with software RAID

8
New cards

What is RAID 0

Striping, meaning data is distributed across multiple disks and provides performance, but no redundancy

9
New cards

T/F: In RAID 0, if one disk fails, all data is lost

True

10
New cards

What is RAID 1?

Mirroring, meaning data is duplicated across multiple disks providing no increased performance, but is fault tolerant

11
New cards

T/F: In RAID 1, if one disk fails, all data is lost.

False, a copy can be used

12
New cards

What is RAID 5?

Striped with parity, meaning data is striped across multiple disks and parity data is kept for each set of stripes. Increases performance and provides some redundancy.

13
New cards

What is RAID 10?

Striped and mirrored, meaning it stripes data across multiple disks which are then mirrored, which increases performance and is fault tolerant

14
New cards

What is Network Attached Storage (NAS)?

File level storage that is available over the network and is already partitioned and formatted.

15
New cards

T/F: NAS doesn’t require dedicated hardware

True, ethernet is the transport of choice

16
New cards

What are some common NAS technologies?

SMB, Common Internet File System, NFS

17
New cards

What is Storage Area Networks (SAN)?

Block level storage accessible over a network that uses dedicated hardware to interconnect the storage arrays

18
New cards

T/F: A physical connection is required for SAN

True

19
New cards

What are some SAN technologies?

iSCSI, Fiber Channel

20
New cards

What is SAN typically used for?

Datacenter-class applications because they separate traffic on networks

21
New cards

What is NAS typically used for?

File server applications, and the traffic is shared with other traffic

22
New cards

What is iSCSI?

Internet Small Computer System Interface, which is an OSI Session layer protocol

23
New cards

T/F: iSCSI uses UDP as the protocol and is not routable

False, uses TCP and is routable

24
New cards

What is an initiator in iSCSI?

A device that originates a session to a storage device and is typically a computing host

25
New cards

What is a target in iSCSI?

The storage device to which an intiator connects which is typically a dedicated device offering network storage

26
New cards

T/F: A single target is accessed by a single initiator in iSCSI

False, a single target can be accessed by multiple initiators

27
New cards

What is a Logical Unit Number (LUN)?

A logicial drive/partition presented over the network.

28
New cards

T/F: Each target contains multiple LUNs

True

29
New cards

What is network fabric?

The interconnection betweens nodes, typically ethernet

30
New cards

How are iCSI initiators and targets named

By iQNs or extended Unique Identifiers

31
New cards

T/F: In iSCSI, the network storage devices must be enumerated before they can be accessed

True

32
New cards

What is SendTargets in iSCSI?

A target server is queried by the initiator for the list of available targets and requires no additional infrastructure or services

33
New cards

In iSCSI security, what are the 4 componenents of it?

Logon, authentication, authorization, and encryption.

34
New cards

Which componenents of iSCSI security are optional?

Authentication and encryption

35
New cards

T/F: Initiators don’t have to logon to targets.

False, they must logon to targets

36
New cards

What is the process in iSCSI Logon?

Initiators create a connection and open a session, the first PDU sent must be a login request else the connection must be terminated by the target.

37
New cards

T/F: Until the login is completed, no other PDUs can be exchanged in the iSCSI logon process

True

38
New cards

T/F: The logon process can carry on if another PDU is received by the target.

False, it must fail the logon

39
New cards

iSCSI Authentication is provided by what?

Challenge-Handshake Authentication Protocol (CHAP)

40
New cards

What differentiates one way CHAP with mutual CHAP?

One way chap is when the target authenticates the initiator and mutual chap is when the target and initiator authenticate each other

41
New cards

Which CHAP is the minimum authentication level that should be used in protection?

One way CHAP

42
New cards

T/F: Authentication must be used in development in iSCSI Authentication

False, it’s ok to use no authentication in development

43
New cards

What is iSCSI Authorization based on?

Based on iQN, eui, IP address

44
New cards

How does iSCSI Authorization work?

The target checks ACL to determine if access to target is allowed

45
New cards

T/F: ACLs can be wildcarded to allow anyone access in iSCSI Authorization

True