0% found this document useful (0 votes)
25 views4 pages

Ism - Nov - 2023 QP

Uploaded by

Smaran R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
25 views4 pages

Ism - Nov - 2023 QP

Uploaded by

Smaran R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
[Reg No]R [A [2 [1 J: Jr Jo Jo [3 Jo [4 le Jo]: B.Tech DEGREE EXAMINATION, NOVEMBER 2023 Fifth to Seventh Semester 18CSE360T - INFORMATION STORAGE AND MANAGEMENT or the candidates admitted during the academic year 2020 - 202] & 2021 - 2022) i, Part - A should be answered in OMR sheet within first 40 minutes and OMR sheet should be handed _, hall invigilator at the end of 40 minute. ii, Part - Band Part - C should be answered in answer booklet. Time: 3 Hours Max. Mark PART - A (20 x 1 = 20 Marks) Barta BL Answer all Questions 1 is the process of assigning storage resources to hosts based on capacity, 1 1 availability, and performance requirements of applications running on the hosts, . (A) Storage Provisioning (B) Network Provisioning (©) User Provisioning (D) Server Provisioning. 2. Data is transferred between the disk controller and magnetic through the 1 1 read-write (R/W) head — (A) Spindle B) Platter (©) RW head @) Tape : is a technique of abstracting physical resources such as compute, 1 1 morage and astwork und making them appeatas lepical revcurees a (A) Prov B) Virtualization (C) Monitoring (D) Reporting 4, The storage architecture that cannot be shared with any other server is called (A) Instance storage architecture (B) Information centric storage architecture (D) Virtual storage (C) Server centric storage architecture 5. Which one is not true? (A) iSCSI gateway is used to enable communication between iSCSI host FC storage (©) iSCSI initiator is configured with gateway’s IP address (B) ISCSI gateway works as bridge between FC and IP network (D) iSCSI gateway is configured as FC target 6 A company named Brocade Communications Systems LLC has the world wide 1 2 name as 10:00:00:60:69:00:23:74. In the given name, identify the bits representing the company ID. (A) 100000 (B) 000006 (©) 006069 (D) 606900 7. Which three statements describe differences between Storage Area Network (SAN) 1 2 and Network Attached Storage (NAS) solutions? Choose three. i, SAN is generally more expensive but provides higher performance NAS uses TCP/IP for communication between hosts and the NAS server NAS requires additional hardware on a host: a host bus adapter for connectivity iv, SAN uses proprietary protocols for communication between hosts and the SAN fabric. 29NFS-7-1 Page tot 8. In the context of FC (Fibre Channel) and iSCSI (Internet Small Computer System Interface), what does "FC scan" typically refer to? (A) A network scanning tool ®) — for detecting faulty cables (C) A process to discover Fibre Channel _(D) A tool for analyzing internet traffic devices 9. This validation scheme is called the __, scheme since transactions execut: optimistically, assuming they will be able fo Taish execution and validate at the end, (A) Validation protocol (B) Validation-based protocol (©) Timestamp protocol ©) Optimistic concurrency-control 10. In backup to tape environment, what does ‘shoe shining; mean? (A) Writing data from multiple streams —_(B) Process of emulating disk drives ona single tape and presenting as tapes to backup software (©) Repeated back and forth motion that (D) Process of deleting redundant a tape drive makes when there is an content in the backup data interruption in the backup data stream 11. Consider a 24-bit FC address of N_Port. There are 239 available addres: i of N Port. ses for domain ID. Therefore, the maximum possible number of node Ports ina Switched fabric is : (A) 61,184 (B) 65,536 (©) 57,121 @) 15,663,104 12. A repository at a remote site where data can be periodically or continuously copied (A) Data vault B) Hot site (© Cold site (@) Server Cluster 13, Network security can be configured on the FC switch by using (A) integrity check (B) security check (©) data control lists () access control lists 14, Eaves dropping and snooping refers to (A) modification attack ) types of passive attack (C) types of active attack () denial of service 15, Security monitoring also helps to track unauthorized configuration changes of storage (A) Infrastructure elements (B) substitute elements (C) backup elements (D) data elements 16. Which technique is used for the detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver? (A) Error Correction (B) Error Detection (©) Availability (D) Accountability 1. is a control mechanism on the switches that segments the network into Specific paths to be used for the data traffic (A) Snooping (B) Vulnerability (©) Zoning (D) Denial of service 1 A hosts an active cloud service and is further accessed by a cloud consumer for administrative purposes. (A) Virtual Server B) Physical server (C) Logical server () Database Server Page2ot4 plement the resource replication mechanism technology is used to 19, fo replicate cloud-based IT resources. (A) Cloud computing (B) Virtualization (C) Data privacy (D) Encryption a 20. In cloud storage level, are the lowest level of storage and the closest to the hardware. (A) Files (B) Datasets (© Blocks @) Objects Marks BL PART - B (5 x 4 = 20 Marks) Answer any 5 Questions ‘ 21. Differentiate virtual and traditional storage provisioning. . medical college uses an application that stores patient X-ray data in the form ofgielle 22. A medical college uses an application that stores patient X-ray data in the Form of large binary objects in an Oracle database. The ap] x server, and the medical college staff accesses the Xray records through Gigabit Ethernet backbone. Storage array provides storage to the UNIX server, which has terabytes of usable capacity. Explain the core elements of the data center. 23, A cloud consumer is using a virtual server within an IaaS environment, second one is accessing the a ready-made PaaS environment, third is using the SaaS, Discuss the challenges faced by Service provider. is Bon 3 24. A university is considering implementing storage. They do not have a current storage inffastmctire to use, but ihey have a network that gives them good performance. Discuss whether native or bridged iSCSI should be used and explain your recommendation. Compare the policies of file sharing protocols supported by NAS to handle file VO 4 request fo a remote file system. 25. 26. Write short nodes on charge back report 4 27. List out the steps for Kerberos authentication. 4 PART - C (5 x 12 = 60 Marks) Marks Answer all Questions 2 28. (a) How will you create and navigate a virtual storage machine? (OR) (b) (DA group of friends are doing a project and wanted to expand their business by creating a virtual environment. They were confused in choosing the service provider. What are the challenges faced by the consumers. (ii) Uninterrupted service of Data Centers is critical for success of Business. Explain the characteristics of a data center that ensures reliable Data, 29. (a) Demonstrate the details of CAS an object-based storage device designed for 12 secure online storage and retrieval of fixed content with needed features for configuration and Tracing, (OR) (b) A large company is considering a storage infrastructure one that is scalable and provides high availability. More importantly, the company also needs Performance for its mission-critical applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and why? Page3of4 30. (a) (i) Provide real-world examples of how the below concept apply to different (a) rane " “industries or organizations. : i dont i jonents and requires all three to be operational Soko Monday through Peay, Failure of component 1 occurs as follows: - Monday lo failure Tuesday a.m, to 7 a.m. Wednesday = No failure Thursday = 4 p.m. to 8 p.m. Friday = 8 a.m. to ll am, Calculate the MTBF and MTTR of component 1. (OR) (&) @ List and briefly describe the Steps involved in Backup and restore operations with the necessary diagram, GBC pana Plstninglofien involves multiple stakeholders, including executives, obs fessionals, employees, and ext. ‘ermal partners. Using a common set of Gayrres that everyone involved in BC activities can commmsicate fffectively and understand the concepts being discussed This common language facilitates collaboration and coordination during planning and we ‘1. (a) Illustrate Performance monitoring with a neat sketch s (OR) © Exnln ‘in detail'ebout one way and two way of Securing Implementation in 32. (@ Explain the selection procedure of deployment model for cloud. (OR) jhe following with necessary diagrams: 3) Cloud deployment Models ) Cloud Service Models (®) Describe tenes

You might also like