emc networker interview questions

Networker Fundamentals – Free e-Learning

These sample questions are simple and basic questions that represent likeness to the real Dell EMC E20-597 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium Dell EMC NetWorker Specialist Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

NetWorker Specialist Dumps, E20-597 Dumps, E20-597 PDF, NetWorker Specialist VCE, Dell EMC E20-597 VCE, Dell EMC DECS-SA PDF, Dell EMC DCS-SA PDFThe purpose of this Sample Question Set is to provide you with information about the Dell EMC NetWorker Specialist for Systems Administrator exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the E20-597 certification test. To get familiar with real exam environment, we suggest you try our Sample Dell EMC NetWorker Specialist Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual Dell EMC Certified Specialist – Systems Administrator – NetWorker (DECS-SA) certification exam.

Get EMC Training with Industry Oriented Topics By Real Time Experts

36) What does the control Center storage agent monitor?

Ans: CLARIION

37) When is the Port Bypass Card used on a Symmetrix DMX?

Ans: When the Disk Director fails

38) Which of the Celerra data replication options provides a point-in-time filesystem copy over IP?

Ans: Celerra Replicator

39) What does ISL aggregation do?

Ans: Enables distribution of traffic over the combined bandwidth of two or more ISLs and increases availability

40) What are features of Celerra Replicator?

Ans: Synchronous data recovery, Point-in-time copy over an IP network

41) Which protocol does open systems hosts use to access storage in Fibre Channel SANs?

Ans: SCSI

42) Which NetWorker host performs the backup of the bootstrap save set?

Ans: Server during a server-initiated backup

43) Which product is used to create Logical Volumes on a Symmetrix system?

Ans: Control Center Symmetrix Manager

44) Which Symmetrix connectivity options can be used with mainframe hosts?

Ans: ESCON and FICON

45) Which control center view provides a single graphical view of the whole environment, including consolldated alters and threshold charts?

Ans: At A Glance

46) Which set component is required for write caching to be enabled in a CLARIION array?

Ans: 2 power supplies, 2 storage processors,2 LCC cards and at least one standby power supply

47) What is a benefit of using zoning in a SAN?

Ans: Security at the switch port level

48) What is a characteristic of enterprise directors?

Ans: Fully redundant components

49) Which java based interface manages standalone MDS-Series switches?

Ans: Fabric manger

50) Which protocol is used by open system hosts to access block level storage over IP?

Ans: ISCSI

51) What is a characteristic of a Content Address in Centera?

Ans: Globally unique

52) What is the use of Internet Control Message Protocol ICMP?

Ans: Sends administrative information between network devices

53) What is the purpose of storage groups in a CLARiiON storage array?

Ans: LUN masking.

54) What Is Lun Masking?

Ans: LUN (Logical Unit Number) Masking is an authorization process that makes a LUN available to some hosts and unavailable to other hosts. LUN Masking is implemented primarily at the HBA (Host Bus Adapter) level. LUN Masking implemented at this level is vulnerable to any attack that compromises the HBA. Some storage controllers also support LUN Masking.

55) Why Do We Need Lun Masking?

Ans:

  • LUN Masking is important because Windows based servers attempt to write volume labels to all available LUN’s. This can render the LUN’s unusable by other operating systems and can result in data loss.
  • Device masking lets you control your host HBA access to certain storage arrays devices. A device masking database, based in the storage arrays unit, eliminates conflicts through centralized monitoring and access records. Both HBA and storage arrays director ports in their Channel topology are uniquely identified by a 64-bit World Wide Name (WWN). For ease of use, you can associate an ASCII World Wide Name (AWWN) with each WWN.
  • emc networker interview questions

    Do you want to excel in computer field? Are you familiar with computer embedded systems? Wanted fetching and growth in your job? Then move on to wisdom jobs online portal and explore your career. EMC is an electromagnetic compatibility, the use of components in electronic system that do not electrically interfere with each other. EMC storage refers to various storage products, systems which are essential for virtualized and cloud computing environment. Candidates who are willing to join in EMC jobs have a wide scope in EMC design jobs, Embedded Developer jobs, embedded engineer jobs, embedded software developer jobs, EMC compliance testing jobs, EMC symmetric jobs and so on. So, grab the opportunity by looking at the EMC interview questions and answers framed below.

    LUN (Logical Unit Number) Masking is an authorization manner that makes a LUN to be had to a few hosts and unavailable to different hosts.LUN Masking is applied broadly speaking on the HBA (Host Bus Adapter) stage. LUN Masking carried out at this level is prone to any attack that compromises the HBA. Some storage controllers additionally aid LUN Masking.

    Use the Persistent Binding for Tape Devices. Persistent binding is a host-centric enforced manner of directing an working device to assign certain SCSI goal IDs and LUNs. Persistent Name Binding support is for target devices. Persistent binding is supplied for customers to companion a certain tool World Wide Port Name (WWPN) to a exact SCSI target ID. For instance, in which a particular host will usually assign SCSI ID 3 to the primary router it finds, and LUNs 0, 1, and a couple of to the 3-tape drives connected to the router. Practical examples:For Emulex HBA on a Solaris host for putting in place chronic binding:# lputil MAIN MENUList Adapters Adapter Information Firmware Maintenance Reset Adapter Persistent Bindings Using choice 5 will perform a manual continual binding and the document is: /kernel/drv/lpfc.Conf file.Lpfc.Conf file seems like:fcp-bind-WWNN=”50060XY484411 c6c11:lpfc0t1″, “50060XY4411 c6c12:lpfc1t2”;sd.Conf record looks as if: call=”sd” parent=”lpfc” target=1 lun=zero; name=”sd” figure=”lpfc” goal=2 lun=zero;Reconfigure:# touch /reconfigure # shutdown -y -g0 -i6

    The device covering instructions can help you:Assign and mask get admission to privileges of hosts and adaptersConnected in a Fibre Channel topology to garage arrays and devices.Specify the host bus adapters (HBAs) via which a bunch can get admission to garage arrays devices.Display or list tool overlaying gadgets and their relationships: Typical gadgets are hosts, HBAs, storage arrays gadgets, and Fibre Channel Adapter (FA) ports.Modify properties, along with names and get entry to privileges related to tool protecting gadgets (as an example, trade the Name of a bunch).

    Q. Which protocol is used by open systems hosts to access storage in Fiber Channel SANs?

    Hard zoning is zoning that is applied in hardware. Soft zoning is zoning that is applied in software. Hard zoning bodily blocks access to a area from any device out of doors of the region. Soft zoning makes use of filtering applied in fibre channel switches to prevent ports from being seen from out of doors in their assigned zones. The security vulnerability in smooth zoning is that the ports are still reachable if the consumer in another area correctly guesses the fibre channel address.

    FAQ

    What does EMC NetWorker do?

    EMC NetWorker (formerly Legato NetWorker) is an enterprise-level data protection software product from Dell EMC that unifies and automates backup to tape, disk-based, and flash-based storage media across physical and virtual environments for granular and disaster recovery.

    How do I add clients to EMC NetWorker?

    Manually create a Client resource:
    1. From the Administration window, click Configuration.
    2. In the expanded left pane, select Clients.
    3. From the File menu, select New.
    4. In the Name attribute, type the hostname of the NetWorker client computer.
    5. In the Comment attribute, type a description of the client.

    What is clone in EMC NetWorker?

    A clone operation is where NetWorker duplicates a saveset. It makes a registered copy of the saveset, and at the conclusion of the operation is aware that it has an additional copy. A stage operation is where NetWorker moves a saveset.

    What is workflow in NetWorker?

    The NVE Server Backup workflow is used to backup the database used by the NetWorker Installation Manager, which is included in the NVE appliance. This workflow backs up this database in the event that a restore is required to fix any NetWorker Installation Manager web page issues.

    Related Posts

    Leave a Reply

    Your email address will not be published. Required fields are marked *