Académique Documents
Professionnel Documents
Culture Documents
14SCN14
MCQs
MCQs
Answer:a
6. Identify a network file protocol in the below mentioned set.
a. FC
b. CIFS
c. SCSI
d. NAS
Answer:b
MCQs
b. RAID 0
c. RAID 5
d. RAID 6
Answer:b
11. An array of disks is more likely to fail compared to a single disk. How is it that
RAID arrays still manage to provide more data protection compared to a single
disk?
a. Using either mirroring or striping
b. Using either mirroring or parity
c. Using better quality disks
d. Using dedicated hardware
Answer:b
12. Which of the following provides byte level striping?
a. RAID 6
b. RAID 4
c. RAID 2
d. RAID 5
Answer:d
13. A tape library does not contain
a. Tape Drive
b. Bar Code Reader
c. Robotic Arm
d. RAID Array
Answer:d
14. For long term storage (archival) of data which of the following storage devices
is generally used
a. Hard Disk
b. CD Rom
c. Floppy Disk
Puneeth Kumar T P, Dept. of ISE, AIT, Bengaluru-107
MCQs
d. Tape Cartridges
Answer:d
15. Which of the following Company manufactures Tape Library?
a. Quantum
b. Brocade
c. NetApps
d. Cisco
Answer:a
16. Which of the following Company manufactures RAID devices?
a. Qlogic
b. LSI
c. Falconstor
d. Quantum
Answer:b
MCQs
b. CD-ROM
c. Tape Cartridge
d. Main Memory
Answer:c
18. Pick odd one out
a. Mirroring
b. Striping
c. Error-correction
d. fault tolerance
Answer:d
19. Pick the false statement about RAID 0
a. Provides no redundancy
b. Provides data striping
c. improves performance
d. Provides fault tolerance
Answer:d
MCQs
d. Layer 4 (ULP)
Answer: c
MCQs
c. Tape Library
d. All the above
Answer:d
MCQs
c. 32 bit
d. 64 bit
Answer:d
31. What is the maximum number of loop ports that can participate in an
arbitrated?
a. 128
b. 127
c. 256
d. 0
Answer:b
32. In FC, which of the following are analogous to IP address in data networks?
a. Node WWN
b. Port WWN
c. Fabric address
d. Well known addresses
Answer:c
33. Who determines the WWN of FC end point
a. Vendor
b. Fabric controller
c. Node/Loop ports participating in the FC connection
d. None of the above
Answer:a
34. Which of the following is the use of trunking?
a. High bandwidth creation between switches
Puneeth Kumar T P, Dept. of ISE, AIT, Bengaluru-107
MCQs
b. Flow control
c. In order delivery
d. Timing service
Answer:a
35. CIFS runs over the following protocols:
a. TCP/IP
b. FTP
c. SNMP
d. DNS
Answer:a
36. CIFS doesnt support the following
a. Oplocks
b. Batch command
c. Unicode support
d. Stateless
Answer:d
37. CIFS is used in the following OS
a. Windows
b. Unix
c. Netware
d. All the above
Answer:d
38. RPC is used for
a. transporting data over the network
b. executing program on different computer
c. reporting process control
d. None of the above
Puneeth Kumar T P, Dept. of ISE, AIT, Bengaluru-107
MCQs
Answer:b
39. This is the pooling of physical storage from multiple network storage devices
into what appears to be a single storage device that is managed from a central
console.
a. Server Provisioning
b. Data mining
c. Disk/Tape virtualization
d. None of the above
Answer:c
10
MCQs
c. Fsck
d. defrag
Answer:a
11