This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Are The Business Continuity Tools For Symmetrix Array? |
Answer»
|
|
| 2. |
How Do You Prepare The Storage Capacity Planning Reports By Host Wise? |
Answer»
Symcfg -SID 4282 LIST -CONNECTIONS -capacity Copy and paste the output of the above command in excel file and format according to the requirement. Symcfg -Sid 4282 list -connections -capacity Copy and paste the output of the above command in excel file and format according to the requirement. |
|
| 3. |
What Is The Purpose Of Bin File In Symapi Database? |
|
Answer» It is a DATABASE FILE in the HOST which stores the SYMMETRIX array CONFIGURATION data. Can be used to get the configuration data offline. It is a database file in the host which stores the symmetrix array configuration data. Can be used to get the configuration data offline. |
|
| 4. |
How Do You Perform Backup And Restore User Authorization Information? |
|
Answer» Symauth -Sid 4282 BACKUP -F backupfile.cmd COMMITS Symauth -Sid 4282 RESTORE -f backupfile.cmd COMMIT Symauth -Sid 4282 backup -f backupfile.cmd commits Symauth -Sid 4282 restore -f backupfile.cmd commit |
|
| 5. |
Explain Step By Step Procedure To Setup User Authorization On Symmetrix Array? |
|
Answer» User-to-role MAPPINGS have to be created: (Create a command file with the FOLLOWING entry (ex: rolemap.txt)) Assign user H: Host username to role Monitor; Assign user D: ENG username to role Admin; (Execute the above file) Symauth -sid 4282 -F rolemap.txt commit. (ROLES: None, Monitor, Storage admin, admin, Auditor, SecurityAdmin) Enable the user authorization: Symauth -Sid 4282 enable. User-to-role mappings have to be created: (Create a command file with the following entry (ex: rolemap.txt)) Assign user H: Host username to role Monitor; Assign user D: Eng username to role Admin; (Execute the above file) Symauth -sid 4282 -f rolemap.txt commit. (Roles: None, Monitor, Storage admin, admin, Auditor, SecurityAdmin) Enable the user authorization: Symauth -Sid 4282 enable. |
|
| 6. |
What Is Symmetrix User Authorization? |
|
Answer» Set up or UPDATE the Symmetrix array USER authorization INFORMATION. Set up or update the Symmetrix array user authorization information. |
|
| 7. |
How Do You Take The Backup/restore Of Acls? |
|
Answer» Symacl -sid 4282 BACKUP -file "command file" Symacl -sid 4282 COMMIT -restore -f command file Symacl -sid 4282 backup -file "command file" Symacl -sid 4282 commit -restore -f command file |
|
| 8. |
What Is Symmetrix Acl? |
|
Answer» To create access control list on SYMMETRIX array to IMPLEMENT host level or USER level security. To create access control list on symmetrix array to implement host level or user level security. |
|
| 9. |
How Do You Check The Audit Logs On Symmetrix Array? |
Answer»
|
|
| 10. |
How Do You Track The History Of Events On Symmetrix Array With Example? |
|
Answer» To list all EVENTS in symmetrix array Symevent -Sid 4282 list To list SPECIFIC period of TIME events in event logs Symevent -Sid 4282 list -vs -start 9:00 -end 17:00 To list all events in symmetrix array Symevent -Sid 4282 list To list specific period of time events in event logs Symevent -Sid 4282 list -vs -start 9:00 -end 17:00 |
|
| 11. |
How Do You Monitor The Real Time Events On Symmetrix Array With Example? |
|
Answer» To monitor real TIME 100 event RECORDS with 600 SECONDS INTERVAL in the symmetrix array. Symevent -sid 4282 monitor -i 600 -C 100 -warn/-error/-fatal. To monitor real time 100 event records with 600 seconds interval in the symmetrix array. Symevent -sid 4282 monitor -i 600 -c 100 -warn/-error/-fatal. |
|
| 12. |
What Are The Logs Available At Host-end And On Symmetrix Array? |
| Answer» | |
| 13. |
What Is Dynamic Cache Partitioning? |
Answer»
|
|
| 14. |
What Is The Purpose Of Symmetrix Change Tracker? |
Answer»
|
|
| 15. |
What Is Symmetrix Qos And How It Works? |
|
Answer» Quality of Service (QoS) allows more flexibility in managing Symmetrix system’s performance. By increasing the response time for specific COPY operations on selected devices, we can increase the overall performance of the other Symmetrix devices.
Quality of Service (QoS) allows more flexibility in managing Symmetrix system’s performance. By increasing the response time for specific copy operations on selected devices, we can increase the overall performance of the other Symmetrix devices. |
|
| 16. |
What Is Symmetrix Optimizer And How It Works? |
|
Answer» Symmetrix OPTIMIZER improves array performance by continuously monitoring access patterns and migrating devices (Symmetrix logical volumes) to achieve balance across the disks in the array. Step 1: Symmetrix Optimizer builds a database of device activity statistics on the Symmetrix back-end. Step 2: Using the statistical data collected, configuration information, and the user-defined parameters, the Optimizer algorithm identifies busy and idle devices and their locations on the physical drives. The algorithm tries to minimize average disk service time by balancing I/O activity across physical disks. Optimizer determines which disks require balancing by locating busy devices close to each other on the same disk, and/or by locating busy devices on faster disks or faster areas of the disks. Optimizer takes into account the speed of the disk, the disk geometry, and the actuator speed to DETERMINE faster disks. Step 3: Once a solution for load balancing has been developed, the next phase is to carry out the Symmetrix device swaps. This is done using established Time Finder TECHNOLOGY, which maintains data PROTECTION and availability. We can specify whether swaps should occur in a completely automated fashion, or if the device swaps require user approval before the action is taken. Step 4: Once a SWAP function completes, Symmetrix Optimizer continues data analysis for the next swap. Symmetrix Optimizer improves array performance by continuously monitoring access patterns and migrating devices (Symmetrix logical volumes) to achieve balance across the disks in the array. Step 1: Symmetrix Optimizer builds a database of device activity statistics on the Symmetrix back-end. Step 2: Using the statistical data collected, configuration information, and the user-defined parameters, the Optimizer algorithm identifies busy and idle devices and their locations on the physical drives. The algorithm tries to minimize average disk service time by balancing I/O activity across physical disks. Optimizer determines which disks require balancing by locating busy devices close to each other on the same disk, and/or by locating busy devices on faster disks or faster areas of the disks. Optimizer takes into account the speed of the disk, the disk geometry, and the actuator speed to determine faster disks. Step 3: Once a solution for load balancing has been developed, the next phase is to carry out the Symmetrix device swaps. This is done using established Time Finder technology, which maintains data protection and availability. We can specify whether swaps should occur in a completely automated fashion, or if the device swaps require user approval before the action is taken. Step 4: Once a swap function completes, Symmetrix Optimizer continues data analysis for the next swap. |
|
| 17. |
What Are The Available Performance Types In Symstat Command? |
|
Answer» REQUESTS: REPORTS I/O requests and throughput for selected devices, directors, or SRDF/a session. (This is the default TYPE; if no type is specified REQUESTS is used.) BACKEND: Reports back-end I/O requests and throughput for selected devices. PORT: Reports performance statistics for a director port. ISCSI Report Gig-E NETWORK statistics. CACHE: Reports cache activity for selected front-end or remote link directors, or SRDF/A sessions. MEMIO: Reports cache memory to disk activity for selected devices. PATH Report R-Copy path information for no incremental sessions. Symmetrix arrays that have all or some incremental sessions will report an error. CYCLE: Report cycle summary information for SRDF-A sessions. DISK: Reports back-end I/O requests and throughput for selected disks. PREFETCH: Reports track prefetch disk activity for selected back-end director’s only.DMSP Reports dynamic mirroring service policy (DMSP) statistics for the selected DEVICE(s). RDF: Reports SRDF statistics from the perspective of RA groups, devices, or directors. REQUESTS: Reports I/O requests and throughput for selected devices, directors, or SRDF/a session. (This is the default type; if no type is specified REQUESTS is used.) BACKEND: Reports back-end I/O requests and throughput for selected devices. PORT: Reports performance statistics for a director port. ISCSI Report Gig-E network statistics. CACHE: Reports cache activity for selected front-end or remote link directors, or SRDF/A sessions. MEMIO: Reports cache memory to disk activity for selected devices. PATH Report R-Copy path information for no incremental sessions. Symmetrix arrays that have all or some incremental sessions will report an error. CYCLE: Report cycle summary information for SRDF-A sessions. DISK: Reports back-end I/O requests and throughput for selected disks. PREFETCH: Reports track prefetch disk activity for selected back-end director’s only.DMSP Reports dynamic mirroring service policy (DMSP) statistics for the selected device(s). RDF: Reports SRDF statistics from the perspective of RA groups, devices, or directors. |
|
| 18. |
How To Monitor Performance Of Emc Symmetrix? |
|
Answer» Using PERFORMANCE MONITORING feature in EMC Control CENTER. Using SYMSTAT symcli command. Using Performance Monitoring feature in EMC Control Center. Using SYMSTAT symcli command. |
|
| 19. |
What Are The Symmetrix External Locks And How To Check And Release? |
|
Answer» Symmetrix external locks are USED by SYMAPI (locks 0 to 15) and also for applications assigned by EMC (>15) to lock access to the ENTIRE Symmetrix array during critical OPERATIONS.
Symmetrix external locks are used by SYMAPI (locks 0 to 15) and also for applications assigned by EMC (>15) to lock access to the entire Symmetrix array during critical operations. |
|
| 20. |
How To Display And Set The Symmetrix Metrics? |
|
Answer» Symcfg -SID XXXX -SA all LIST -V SET Symmetrix MatricName=MatricValue Symcfg -Sid XXXX -SA all list -v Set Symmetrix MatricName=MatricValue |
|
| 21. |
What Is Vcmdb And How Do You Take The Backup? |
|
Answer» The DEVICE masking database (VCMDB) holds device masking records and typically RESIDES on a 24 or 48 cylinder DISK device. Symmaskdb -Sid XXXX backup -f filename. The device masking database (VCMDB) holds device masking records and typically resides on a 24 or 48 cylinder disk device. Symmaskdb -Sid XXXX backup -f filename. |
|
| 22. |
How Many Gate Keeper Devices Are Required Per Array? |
| Answer» | |
| 23. |
What Is The Purpose Of Gate Keeper Device? |
Answer»
|
|
| 24. |
Explain Step By Step Procedure To Setup New Host? |
Answer»
|
|
| 25. |
How Do You Create Thin Pools And Thin Devices? |
| Answer» | |
| 26. |
What Is Thin Provisioning? |
|
Answer» Thin provisioning is a METHOD of optimizing the EFFICIENCY with which the available space is utilized in storage area networks. Thin provisioning OPERATES by allocating disk space in a flexible manner among MULTIPLE users, based on the minimum space REQUIRED by each user at any given time. Thin provisioning is a method of optimizing the efficiency with which the available space is utilized in storage area networks. Thin provisioning operates by allocating disk space in a flexible manner among multiple users, based on the minimum space required by each user at any given time. |
|
| 27. |
Host Is Unable To See The Storage, How Do You Troubleshoot? |
Answer»
|
|
| 28. |
How Do You Check The Free Space By Disk Group And Array As Whole? |
|
Answer» By DISK Group: Symdisk -Sid XXXX LIST -by_diskgroup. ARRAY as whole: Symconfigure -Sid XXXX list –freespace. By Disk Group: Symdisk -Sid XXXX list -by_diskgroup. Array as whole: Symconfigure -Sid XXXX list –freespace. |
|
| 29. |
How Do You Create The Disk Groups? |
|
Answer» We cannot create Disk Groups; it should be done by CHANGING BIN file by CE. We can rename the existing disk groups. Example: symconfigure -SID 207 -CMD “set disk_group 4 disk_group_name = flash_dsks;” -v -nop commit. We cannot create Disk Groups; it should be done by changing BIN file by CE. We can rename the existing disk groups. Example: symconfigure -Sid 207 -cmd “set disk_group 4 disk_group_name = flash_dsks;” -v -nop commit. |
|
| 30. |
What Are Preview, Prepare And Commit While Using Symconfigure Command? |
Answer»
|
|
| 31. |
What Is Vault Drives And Hot Spare? |
|
Answer» VAULT Drivers: At the TIME of emergency shutdown of an Array, whatever the data in cache memory will be destaged/saved on temporary drives called vault drives. Hot SPARE: At the time of PHYSICAL drive failure hot spare drives will take place. Vault Drivers: At the time of emergency shutdown of an Array, whatever the data in cache memory will be destaged/saved on temporary drives called vault drives. Hot Spare: At the time of physical drive failure hot spare drives will take place. |
|
| 32. |
What Is Stripping And What Is Concatenating? |
|
Answer» Stripped Meta Devices: Meta device ADDRESSING by striping divides each Meta member device into a series of stripes, addressing a stripe from each device before advancing to the next stripe on the first device. When writing to a striped volume, equal size stripes of data from each participating DRIVE are written alternately to each member of the set. Concatenated Meta Devices: Concatenated devices are volume sets that are organized with the first BYTE of data at the beginning of the first device. Addressing continues to the end of the first device before any data on the next device is referenced. When writing to a concatenated device, the first meta device member receives all the data until it is FULL, and then data is directed to the next member and so on. Stripped Meta Devices: Meta device addressing by striping divides each Meta member device into a series of stripes, addressing a stripe from each device before advancing to the next stripe on the first device. When writing to a striped volume, equal size stripes of data from each participating drive are written alternately to each member of the set. Concatenated Meta Devices: Concatenated devices are volume sets that are organized with the first byte of data at the beginning of the first device. Addressing continues to the end of the first device before any data on the next device is referenced. When writing to a concatenated device, the first meta device member receives all the data until it is full, and then data is directed to the next member and so on. |
|
| 33. |
What Is Dynamic Lun Addressing? |
|
Answer» This feature will AUTOMATICALLY selects and ASSIGNS the LUN IDs to the devices while device MAPPING to the port Instead of manually assigning ADDRESS to the device while mapping. This feature will automatically selects and assigns the LUN IDs to the devices while device mapping to the port Instead of manually assigning address to the device while mapping. |
|
| 34. |
How Many Lun Ids Available Per Fa Port? |
|
Answer» 256 LUN IDs are available PER FA PORT, 255 LUN IDs are USABLE out of 256. 256 LUN IDs are available per FA port, 255 LUN IDs are usable out of 256. |
|
| 35. |
What Is The Maximum Hyper Size In Dmx-4? |
|
Answer»
Maximum CAPACITY = 59GB or 61425 MB Maximum Cylinders = 65520 Maximum Capacity = 59GB or 61425 MB |
|