SNIA (S10-110): Certified Storage Professional (SCSP) Sample Questions

  1. Home
  2. SNIA (S10-110): Certified Storage Professional (SCSP) Sample Questions
SNIA Certified Storage Professional (SCSP) Sample Questions

Question 1 – When the same or similar information is sent or received during certain periods of time, a company is concerned about space usage on its storage devices. Which of the following solution will address this concern?

  • A. data compression
  • B. encryption
  • C. thin provisioning
  • D. deduplication

Correct Answer: A

Question 2 – What is the term used by SNIA to describe how a volume or file system allocates space as data is written?

  • A. thick provisioning
  • B. thin provisioning
  • C. hybrid provisioning
  • D. static provisioning

Correct Answer: B

Question 3 – Which of the following is the function of the Fibre Channel name server?

  • A. retrieves all files from a file store by name.
  • B. provides a service to register Fibre Channel N_Ports.
  • C. partitions Logical Unit Numbers (LUNs).
  • D. load balances the SAN traffic.

Correct Answer: B

Question 4 – Which of the following level of data access does a SAN device provide compared to NAS?

  • A. file access
  • B. block access
  • C. packet access
  • D. object access

Correct Answer: B

Question 5 – Using which two security methods will you be able to prevent unauthorized tampering and spoofing of iSCSI traffic? (Choose two.)

  • A. Internet Protocol Security (IPsec)
  • B. B. ACLs
  • C. B. encryption at rest
  • D. Challenge Handshake Authentication Protocol (CHAP)

Correct Answer: A, D

Question 6 – According to policy, how are data transferred between different types of disks and storage?

  • A. data clustering
  • B. IOPS monitoring
  • C. storage tiering
  • D. LUN migration

Correct Answer: C

Question 7 – Which of the following two are the scenarios where using disk replication is a valid risk mitigation strategy? (Choose two.)

  • A. a primary storage array non-recoverable hardware failure
  • B. B. an extended power failure at the primary site
  • C. C. information destruction due to a security breach
  • D. system instability due to a bad OS update

Correct Answer: A, B

Question 8 – Which of the following backup technique is the slowest in terms of backup time?

  • A. full backup
  • B. incremental backup
  • C. differential backup
  • D. mirror backup

Correct Answer: D

Question 9 – Installing a native or bare-metal hypervisor on a physical server is the first step in the deployment process. In this scenario, which of the following statement is true?

  • A. The hypervisor runs as a program on a host operating system and supports only one instance of a virtual server
  • B. The hypervisor runs directly on the server hardware and supports the creation of multiple concurrent instances of virtual servers
  • C. The hypervisor runs directly on the server hardware and supports the creation of only one instance of a virtual server.
  • D. The hypervisor runs as a program on a host operating system and supports multiple concurrent instances of virtual servers.

Correct Answer: B

Question 10 – When you rebuild data in a RAID 5 set, what do you use?

  • A. Flash memory
  • B. mirroring
  • C. parity
  • D. data quiescing

Correct Answer: C

Question 11 – Which of the following statement describes a N_Port login?

  • A. a process by which a server HBA port logs into a fabric
  • B. a process by which FC initiators establish sessions with targets
  • C. a process by which users obtain access to a host
  • D. a process by which two FC-4 layer processes establish communication

Correct Answer: B

Question 12 – What are two valid storage tiering types, as defined by SNIA? (Choose two.)

  • A. storage cache tiering
  • B. host tiering
  • C. C. application tiering
  • D. cloud tiering

Correct Answer: A, D

Question 13 – You are using a RAID 5 set with five disks at 400 GB each. What would be the approximate amount of usable space produced by this configuration?

  • A. 1 terabyte
  • B. 2 terabytes
  • C. 1.2 terabytes
  • D. 16 terabytes

Correct Answer: C

Question 14 – To expand their capabilities, one customer has contemplated mixing disk technologies in the same storage array. In this scenario, which of the following is a benefit of doing this?

  • A. allowing for more encrypted data to be stored on the array
  • B. improving the performance of the array
  • C. performing compression before writing data to the HDDs
  • D. performing deduplication before writing data to the HDDs

Correct Answer: B

Question 15 – Multi-pathing is initiated at what point in the communication chain?

  • A. the operating system device driver level
  • B. the switch level
  • C. the storage array level
  • D. the physical cable interface level

Correct Answer: C

Question 16 – What is the most suitable definition of Software Defined Storage?

  • A. virtualized storage with a Fibre Channel interface
  • B. virtualized storage with an Ethernet interface
  • C. physical storage with a service management interface
  • D. virtualized storage with a service management interface

Correct Answer: D

Question 17 – Which of the following technology uses lossless Ethernet?

  • A. FC
  • B. FcoE
  • C. FCIP
  • D. iFCP

Correct Answer: B

Question 18 – Data structures signed with digital signatures based on public keys that confirm that the key belongs to a particular subject are called what, according to SNIA?

  • A. secure key
  • B. certificate
  • C. public key
  • D. private key

Correct Answer: B

Question 19 – Which two of the following statements regarding hybrid drives are correct? (Choose two.)

  • A. Flash memory stores frequently accessed content.
  • B. B. Flash memory is located on the motherboard of the server
  • C. C. Flash memory is located on the HDD circuit board.
  • D. Flash memory is not used with a hybrid drive.

Correct Answer: B,C

Question 20 – Which of the following type of devices can be used for file access storage?

  • A. SAN
  • B. NAS
  • C. DAS
  • D. HBA

Correct Answer: B

Menu