|Exam Name||:||IBM Storwize Family Technical Solutions V4|
|Questions and Answers||:||60 Q & A|
|Updated On||:||October 20, 2017|
|PDF Download Mirror||:||C9020-562 Dump|
|Get Full Version||:||Pass4sure C9020-562 Full Version|
IBM Spectrum Control Base Edition (SCB) version 2.2.1 (or higher)
Compatible storage system running IBM Spectrum Virtualize version 7.6.0 (or higher
VMware vSphere 6.0 (or higher):
VMware ESXi version 6.0
VMware vCenter Server 6.0 or vCenter Server Appliance (vCSA) 6.0 (vSphere Web Client 6.0)) We use the term VVols-enabled host to describe a host that meets the following requirements:
VMware ESXi (ESXi) version 6.0 or later installed.
Registered with the storage system with host type set to VVol. Note that in the CLI, the VVol host type is referred to as adminlun.
Configuring VMware Virtual Volumes for Systems Powered by IBM Spectrum Virtualize, page 6, page 11 http://www.redbooks.ibm.com/redbooks/pdfs/sg248328.pdf
A customer is installing a new IBM Storwize V7000 model 524.
What should the customer do to access the management GUI for the first time?
Use the USB drive to configure the system
Connect to the technician port and use the initialization wizard
Connect to the 10Gb Ethernet port to create the cluster
Download and use the lnit tool
You can use the management GUI to manage your system as soon as you have completed the USB flash drive initialization.
Note: Accessing the Storwize V7000 Unified management GUI Procedure
Which network authentication protocol is supported on the IBM Storwize V7000 Unified storage system, is used for client/server applications, and provides symmetric key cryptography?
Network Information Service (NIS)
Services for UNIX (SFU)
To provide heterogeneous file sharing for Unix and Windows, the Storwize V7000 Unified system must support authentication methods for Unix and Windows. The Storwize V7000Unified system uses Windows authentication for incoming CIFS connections and Unix authentication for incoming NFS, HTTP, SFTP and SCP connections.
Kerberos is a network authentication protocol for client/server applications that uses symmetric key cryptography.
Note: User password in clear text format is never sent over a network; the Kerberos server grants a ticket to the client for a short span of time. This ticket is used while communicating with the server to obtain access to the service, such as a file server. The Windows based authentication is based on Kerberos. MIT Kerberos is a free implementation of the Kerberos protocol, which is provided by the Massachusetts Institute of Technology.
An IBM technical specialist has positioned the IBM FlashSystem V9000 storage solution to meet a customer's requirement for a storage solution to host high lOPS with low latency workloads. The IBM FlashSystem V9000 uses an IBM patented Variable Stripe RAID with two dimensional Flash RAID technology.
Which statements describe these features?
The Variable Stripe Array function stripes data across its set of chips within a Microlatency Module. Two Dimensional Flash RAID function provides protection for the Microlatency Modules.
The Variable Stripe Array function stripes data across its set of chips within a Microlatency Module. Two Dimensional Flash RAID function provides cluster protection between two installed FlashSystem V9000 systems.
The Variable Stripe Array function stripes data across all the installed Microlatency Modules. Two Dimensional Flash RAID function provides protection across DIMM memory within a Microlatency Module.
The Variable Stripe Array function stripes data across DIMM memory within a Microlatency Module. Two Dimensional Flash RAID function provides protection for the Microlatency Modules.
IBM Variable Stripe RAID is a patented IBM technology that provides an intra-module RAID stripe on each flash module.
With two-dimensional (2D) Flash RAID, system-wide RAID 5 along with Variable Stripe RAID helps reduce downtime and maintain performance, and enables the provisioning of an entire flash module as a spare to be used in another flash module failure.
Introducing and Implementing IBM FlashSystem V9000, page 22
A local credit union is installing a new Power Linux Spectrum Protect server with container storage pools and needs more bulk storage. It has a business requirement for encryption at rest. Cost is a consideration.
Which solution meets the customer requirements?
IBM Storwize V5030
IBM Storwize V5010
IBM Storwize V5020
IBM Storwize V9000
Storwize V5020 control enclosure models offer mid-level performance, scalability, and functionality with:
Two 2-core, four-thread processors and up to 32GB of cache
Support for up to 392 drives per system with the attachment of Storwize V5000 expansion enclosures
Encryption of data at rest stored within the Storwize V5000 system
A customer has a pair of IBM Storwize storage systems installed and plans to implement
IP based replication for DR and has asked a technical specialist for guidance on remote- copy port groups. The technical specialist explains that remote-copy port groups are unique to IP partnerships and must contain at least one IP address in the local system and one IP address in the remote system. What is the maximum number of remote-copy port groups that is supported?
Remote-copy port groups are unique to IP partnerships, and are the local and remote IP addresses accessible to each other through an IP partnership. A remote-copy port groupmust contain at least one IP address in the local system and one IP address in the remote system. You must configure ports and assign to them a remote-copy port group number before establishing the IP partnership.
A remote-copy port group is designated by a number between 0 and 2 inclusive that identifies a set of IP addresses. These port groups are defined as follows:
Group 0 - These ports are not configured for remote copy (supports iSCSI host attachment by default) Group 1- Ports that belong to remote-copy port group 1 Group 2- Ports that belong to remote-copy port group 2
The system will select one pair of IP addresses within port groups 1 and 2, one address
on each system, and will open a remote copy connection between them .
References: https://www.ibm.com/support/knowledgecenter/STHGUJ_7.6.1/com.ibm.storwize.tbS.7 61.doc/svc_remot ecopyportgroups.html
A small customer has an old VNXe with iSCSI and needs a new storage system that is easy to manage. Price is a concern . Which IBM Storwize family product should the technical specialist recommend to the customer?
A customer has SAS connected storage in its environment that was purchased from a competitor. The customer does not have a SAN but wishes to add 10 Gb iSCSI. The customer is considering buying an IBM Storwize product because the competitor charges for migration. Which IBM product should the technical specialist recommend that includes these features?
IBM Storwize V7000
IBM SAN Volume Controller
IBM Storwize V5030
IBM Storwize V5010
IBM SAN Volume Controller key features include:
Combine storage capacity from multiple vendors for centralized management
Increase storage utilization by providing more flexible access to storage assets
Support for almost 400 different storage systems
Help improve data security with support for encryption
Implement hybrid cloud capabilities rapidly and with existing on-premises storage
Has four 10 Gbps copper (RJ45) Ethernet ports for management and/or iSCSI
Which IBM Storwize family member is capable of two-way system clustering?
Storwize V5030 supports maximum of 760 drives per system and 1,056 drives in two-
Which tool is used to report usable capacity for IBM Storwize disk subsystems?
IBM Capacity Magic is an easy-to-use tool that runs on a PC, requires a minimum of input, and calculates the physical and effective capacity of the IBM System Storage Systems, including Storwize V7000.