iSCSI Protocol ? 1
Posted by Superadmin on August 11 2022 14:28:35

iSCSI Protocol – 1

 

 

This set of multiple choice SAN storage questions and answers focuses on iSCSI protocol.

 

 

1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned

Answer: a
Explanation: None.

 

 

2. iSCSI allows what type of access
a) block level
b) file level
c) both block and file level
d) none of the mentioned

Answer: a
Explanation: None.

 

 

3. iSCSI names are:
a) Globally unique and temporary
b) Local to the setup
c) Globally unique and permanent
d) Local to the setup and temporary

Answer: c
Explanation: None.

 

4.Which of the following is not true of iSCSI names?
a) iSCSI names are associated with iSCSI nodes(targets and initiators.
b) iSCSI names are associated with n/w adapter cards
c) iSCSI names are world wide unique.
d) iSCSI names are permanant.

Answer: b
Explanation: None.

 

 

5. Which of the following is not a valid iSCSI name?
a) iqn.2001-04.com.mystorage:storage.tape1
b) iqn.2001-04.com.mystorage
c) iqn.01-04.com.example.disk
d) none of the mentioned.

Answer: c
Explanation: None.

 

 

6. Which of the following is not a valid iSCSI name?
a) eui.1234098769785341
b) eui.4237098769785341
c) eui.12340987697853422.disk
d) none of the mentioned

Answer: c
Explanation: None.

 

7. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses
b) Probing Luns on iSCSI targets
c) Probing New Luns
d) None of the mentioned

Answer: a
Explanation: None.

 

 

8. Which of the following are valid SendTargets commands?
a) SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b) SendTargets=all.FC
c) SendTargets=all.iSCSI
d) None of the mentioned

Answer: a
Explanation: None.

 

 

9. iSCSI targets can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned

Answer: d
Explanation: None.

 

 

10. Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned

Answer: d
Explanation: None.