Users Online

· Guests Online: 118

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Articles Hierarchy

iSCSI Protocol ? 1

iSCSI Protocol – 1

 

 

This set of multiple choice SAN storage questions and answers focuses on iSCSI protocol.

 

 

1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned

Answer: a
Explanation: None.

 

 

2. iSCSI allows what type of access
a) block level
b) file level
c) both block and file level
d) none of the mentioned

Answer: a
Explanation: None.

 

 

3. iSCSI names are:
a) Globally unique and temporary
b) Local to the setup
c) Globally unique and permanent
d) Local to the setup and temporary

Answer: c
Explanation: None.

 

4.Which of the following is not true of iSCSI names?
a) iSCSI names are associated with iSCSI nodes(targets and initiators.
b) iSCSI names are associated with n/w adapter cards
c) iSCSI names are world wide unique.
d) iSCSI names are permanant.

Answer: b
Explanation: None.

 

 

5. Which of the following is not a valid iSCSI name?
a) iqn.2001-04.com.mystorage:storage.tape1
b) iqn.2001-04.com.mystorage
c) iqn.01-04.com.example.disk
d) none of the mentioned.

Answer: c
Explanation: None.

 

 

6. Which of the following is not a valid iSCSI name?
a) eui.1234098769785341
b) eui.4237098769785341
c) eui.12340987697853422.disk
d) none of the mentioned

Answer: c
Explanation: None.

 

7. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses
b) Probing Luns on iSCSI targets
c) Probing New Luns
d) None of the mentioned

Answer: a
Explanation: None.

 

 

8. Which of the following are valid SendTargets commands?
a) SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b) SendTargets=all.FC
c) SendTargets=all.iSCSI
d) None of the mentioned

Answer: a
Explanation: None.

 

 

9. iSCSI targets can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned

Answer: d
Explanation: None.

 

 

10. Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned

Answer: d
Explanation: None.

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.79 seconds
10,259,471 unique visits