iSCSI Questions & Answers
This set of multiple choice SAN
storage questions and answers focuses on iSCSI protocol.
1. iSCSI is mapping of
a. SCSI over TCP/IP
b. IP over SCSI
c. FC over IP
d. None of the above
View Answer
a. SCSI over TCP/IP
b. IP over SCSI
c. FC over IP
d. None of the above
View Answer
Answer:a
2. iSCSI allows what type of access
a. block level
b. file level
c. Both a & b
d. none of the above
View Answer
a. block level
b. file level
c. Both a & b
d. none of the above
View Answer
Answer:a
3. iSCSI names are:
a. Globally unique
b. Local to the setup
c. permanent
d. temporary
View Answer
a. Globally unique
b. Local to the setup
c. permanent
d. temporary
View Answer
Answer:a , c
4.Which of the following is not true
of iSCSI names?
a. iSCSI names are associated with iSCSI nodes(targets and initiators.
b. iSCSI names are associated with n/w adapter cards
c. iSCSI names are world wide unique.
d. iSCSI names are permanant.
View Answer
a. iSCSI names are associated with iSCSI nodes(targets and initiators.
b. iSCSI names are associated with n/w adapter cards
c. iSCSI names are world wide unique.
d. iSCSI names are permanant.
View Answer
Answer:b
5. Which of the following is not a
valid iSCSI name?
a. iqn.2001-04.com.mystorage:storage.tape1
b. iqn.2001-04.com.mystorage
c. iqn.01-04.com.example.disk
d. none of the above.
View Answer
a. iqn.2001-04.com.mystorage:storage.tape1
b. iqn.2001-04.com.mystorage
c. iqn.01-04.com.example.disk
d. none of the above.
View Answer
Answer:c
6. Which of the following is not a
valid iSCSI name? a. eui.1234098769785341
b. eui.4237098769785341
c. eui.12340987697853422.disk
d. none of the above
View Answer
b. eui.4237098769785341
c. eui.12340987697853422.disk
d. none of the above
View Answer
Answer:c
7. Discovery session in iSCSI is
used for:
a. Discovering iSCSI targets and their TargetAddresses.
b. Probing Luns on iSCSI targets.
c. either of above
d. None of the above.
View Answer
a. Discovering iSCSI targets and their TargetAddresses.
b. Probing Luns on iSCSI targets.
c. either of above
d. None of the above.
View Answer
Answer:a
8. Which of the following are valid
SendTargets commands?
a. SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b. SendTargets=all
c. Both a. and b.
d. None of the above
View Answer
a. SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b. SendTargets=all
c. Both a. and b.
d. None of the above
View Answer
Answer:c
9. iSCSI targets can be discovered
by
a. SendTargets
b. Static configuration
c. using SLP/iSNS
d. All of the above
View Answer
a. SendTargets
b. Static configuration
c. using SLP/iSNS
d. All of the above
View Answer
Answer:d
10. Which of the following is false?
a. iSCSI requires login from initiator to target
b. there can be multiple paths between initiator and target
c. Data integrity is ensured using digests
d. None of the above
View Answer
a. iSCSI requires login from initiator to target
b. there can be multiple paths between initiator and target
c. Data integrity is ensured using digests
d. None of the above
View Answer
Answer:d
iSCSI Protocol Interview Questions & Answers
This set of SAN questions and
answers helps anyone preparing for Netapp Data ONTAP Storage certification
exams. One should practice our complete set of questions and answers
continously for 2-3 months for through understanding of SAN Fundamentals and
various exams and interviews.
1. Which of the following is false
regarding multiple paths?
a. Load balancing can be done
b. Higher throughput can be achieved
c. Path Failover can be done
d. None of the above
View Answer
a. Load balancing can be done
b. Higher throughput can be achieved
c. Path Failover can be done
d. None of the above
View Answer
2. Which of the following is invalid
error recovery level?
a. Session level recovery
b. SCSI level recovery
c. Connection level recovery
d. Digest failure recovery
View Answer
a. Session level recovery
b. SCSI level recovery
c. Connection level recovery
d. Digest failure recovery
View Answer
Answer:b
3. Which of the following statement
is true?
a. iSCSI can be implemented in software
b. iSCSI can be implemented in hardware
c. System can boot from iSCSI disk over network
d. All the above
View Answer
a. iSCSI can be implemented in software
b. iSCSI can be implemented in hardware
c. System can boot from iSCSI disk over network
d. All the above
View Answer
Answer:d
4. Which of the following statement
is false?
a. iSCSI is limited to local LAN
b. iSCSI can run both on 1GB and 10GB networks
c. iSCSI requires Fibre Channel HBA on the host
d. iSCSI requires network card on the host
View Answer
a. iSCSI is limited to local LAN
b. iSCSI can run both on 1GB and 10GB networks
c. iSCSI requires Fibre Channel HBA on the host
d. iSCSI requires network card on the host
View Answer
Answer:a , c
5. Which of the following companies
have iSCSI products?
a. Equallogic
b. Qlogic
c. EMC
d. All the above
View Answer
a. Equallogic
b. Qlogic
c. EMC
d. All the above
View Answer
Answer:d
LOL... This questions are copied from sanfoundry site
ReplyDelete