1Z0-547 | Leading 1Z0-547 Exam Study Guides With New Update Exam Questions


Q31. The "by latency" breakdown is displayed as: 

A. A line graph showing the average 

B. A line graph with average and maximum breakdowns 

C. A heat map showing quantized distribution 

D. A bar graph showing maximum latency 

E. A pie chart showing percentage utilization 

Answer:

Explanation: Whenever disk performance is investigated, using: *Disk: I/O operations broken down by latency This is presented as a heat map allowing the pattern of I/O latency to be observed, and outliers to be easily identified (click the outlier elimination button to view more). 

Q32. In which section of the Browser User Interface (BUI) can you create snapshots? 

A. Shares 

B. Configuration 

C. Maintenance 

D. Services 

Answer:

Q33. Which two items define why the CLUSTRON (Cluster Control) relies on serial links for inter-head communications? 

A. Serial links provide greater reliability and are sufficient for a heartbeat. 

B. Both InfiniBand and serial links are used for performance and reliability. 

C. Serial links take interrupts at high priority. 

D. InfiniBand links are used, and not serial links. 

Answer: A,C 

Explanation: All inter-head communication consists of one or more messages transmitted over one of the three cluster I/O links provided by the CLUSTRONhardware.Thisdevice offers two low-speed serial links and one Ethernet link.The use of serial links allows forgreater reliability; Ethernet links may not be serviced quickly enough by a system under extremely heavy load. The serial links used by the Sun ZFS Storage 7000 series appliances are not susceptible to this failure mode. The Ethernet link provides a higher-performance transport for non-heartbeat messages such as rejoin synchronization and provides a backup heartbeat. 

Q34. Which of the following is required in order to bind a 7000-series system to an LDAP server? 

A. A self-signed Certificate 

B. A Base Search DN (Distinguished Name) 

C. LDAP Proxy Server 

D. A password for the LDAP Proxy Server 

Answer:

Explanation: Base search DN: Distinguished name of the base object, the starting point for directory searches. 

Q35. Which statement on shadow migrations is true? 

A. Shares are unavailable to clients during shadow migration. 

B. The source filesystem or directory must be read-only. 

C. It uses interposition and requires a separate physical machine. 

D. Migration from LUNS is supported. 

Answer:

Explanation: When shares are created, they can optionally "shadow" an existing directory, either locally or over NFS. In this scenario, downtime is scheduled once, where the source appliance X is placed into read-only mode, a share is created with the shadow property set, and clients are updated to point to the new share on the Sun Storage 7000 appliance. Clients can then access the appliance in read-write mode. 

Reference: Sun ZFS Storage 7000 System Administration Guide,ShadowMigration 

Q36. Which three are good starting points for general purpose database implementations on the 7000- series systems? 

A. Aggregate online redo log files, control files, and production data flies within a single share. 

B. Segregate different databases to different projects. 

C. Configure write-optimized SSD-based log devices. 

D. Fine-tune share settings for recordsize, compression, checksumming, and security based on the requirements for the database. 

Answer: B,C,D 

Q37. Data integrity is provided through which two features? 

A. Enhanced version of UFS 

B. Copy-on-write operations 

C. Parallel reads and writes to the same file 

D. Memory-based, end-to-end checksumming 

Answer: B,D 

Explanation: B:ZFS use Copy-On-Write, which means old data is not altered. Whenever data is edited and updated, the old data is always left intact, and only the edits are stored, on a new place on the disk. This means every change can be traced back in time. This allows the user to discard thelatest change which caused the problem, and instead go back to an earlier functioning state. This is also how ZFS Snapshots works. 

D:To maximize the availability of your data in production, Sun ZFS Storage appliances include acomplete end-to-end architecture for data integrity, including redundancies at every level of the stack. Key features include: *the ZFS file system provides memory-based end-to-end dataand metadata checksumming with self-healing capabilities to fix potential issues. 

Note:ZFS is a combined file system and logical volume manager designed by Sun Microsystems. The features of ZFS include data integrity verification against data corruption modes, support for high storage capacities, integration of the concepts of filesystem and volume management, snapshots and copy-on-write clones, continuous integrity checking and automatic repair, RAID-Z and native NFSv4 ACLs. 

One major feature that distinguishes ZFS from other file systems is that ZFS is designed from the ground up with a focus on data integrity. That is, protect the user's data on disk, against silent data corruption caused by e.g., bit rot, current spikes, bugs in disk firmware, ghost writes, etc. 

Reference:Sun Storage 7000Unified Storage System,Just the Facts 

Q38. Which share property cannot be changed on-the-fly? 

A. Data compression 

B. Database record size 

C. Synchronous write bias 

D. Cache device usage 

E. Case sensitivity 

Answer:

Explanation: 

Reference: Sun ZFS Storage 7000 System Administration Guide,Editing Share Properties 

Q39. Random read workloads are usually best served from: 

A. DRAM, followed by pool disks 

B. Read cache devices (Readzillas) 

C. DRAM, followed by read cache devices 

D. Log devices (Logzillas) 

E. Tape drives 

Answer:

Explanation: Readzillais aread-optimizedflash SSD for the L2ARC. 

Reference: Sun ZFS Storage 7000 System Administration Guide 

Q40. What is the unique identifier of a device in an iSCSI network? 

A. Initiator target device (ITD) 

B. ICN-Initiator CHAP name 

C. iSCSI LUN designator (ILD) 

D. IQN-iSCSI qualified name 

E. iSCSI device id 

Answer:

Explanation: In an iSCSI configuration, the iSCSI host or server sends requests to a node. The host contains one or more initiators that attach to an IP network to initiate requests to and receive responses from an iSCSI target. Each initiator and target are given a unique iSCSI name such as an iSCSI qualified name (IQN) or an extended-unique identifier (EUI). An IQN is a 223-byte ASCII name.