Data Protection
This set of SAN multiple choice questions and answers focuses on Data Protection Techniques.
1. Data protection is required to recover from
a) Disk/System failures
b) Software corruption through virus
c) Human errors
d) All of the mentioned
2. The challenges for data protection are
a) Taking care of the old data
b) Backing up the dynamic data
c) Restoring old data
d) All of the mentioned
3. Name the mechanism which provides the highest level of data protection
a) RAID 0
b) RAID 1
c) RAID 6
d) All of the mentioned
4. Which statements are true w.r.t SMART disks
a) Detect and correct the errors that occur because of failure
b) Monitors the disk at regular intervals
c) Provides information on the disk failures in advance
d) Monitors the disk at regular intervals as provide information on disk failures in advance
5. The drawback of data mirroring is
a) Backing up the data
b) Performance degradation
c) Difficulty involved in configuring the mirrored volume
d) All of the mentioned
6. With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration?
– Volume manager provides protection against multiple disk failures
a) True
b) False
7. Which are all the statements valid statements w.r.t volume manager
a) Achieve protection against single/multiple disk failures
b) Sustain system/node failure
c) Get better performance compared to using individual disk
d) All of the mentioned
8. Point out the false statement. Volume can
a) Span across different partitions/disks
b) Span across different disk arrays
c) Be created on tape device
d) Be a shared volume
9. Identify the correct statements w.r.t. Journal File System (JFS)
a) JFS keeps pointers to all the stale data
b) While recovering data on a system, JFS helps in quicker recovery
c) JFS takes more time to recover the data
d) All of the mentioned
10. In a clustered volume manager scenario, identify the incorrect statement
a) All the nodes in the system will have access to shared volumes
b) Only a set of nodes will have access to shared volumes
c) All the nodes will be allowed to write data to the shared volume
d) All of the mentioned