0% found this document useful (0 votes)
5 views

ccs367-storagetechnologiesquestionbank

The document is a question bank for a course on Storage Technologies at Anna University, covering various topics related to data, digital data types, data center infrastructure, cloud computing, big data analytics, and intelligent storage systems. It includes both short answer questions and detailed explanations on concepts such as RAID levels, mobile computing, and storage networking technologies. The document serves as a comprehensive resource for students to prepare for examinations in the field of information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

ccs367-storagetechnologiesquestionbank

The document is a question bank for a course on Storage Technologies at Anna University, covering various topics related to data, digital data types, data center infrastructure, cloud computing, big data analytics, and intelligent storage systems. It includes both short answer questions and detailed explanations on concepts such as RAID levels, mobile computing, and storage networking technologies. The document serves as a comprehensive resource for students to prepare for examinations in the field of information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 25

UCE, BIT CAMPUS, ANNA UNIVERSITY TRICHY

DEPARTMENT OF INFORMATION TECHNOLOGY


CCS367 - STORAGE TECHNOLOGIES

YEAR / SEM: III / V


QUESTION BANK

UNIT I-STORAGE SYSTEMS

PART-A-TWO MARK QUESTION & ANSWERS

1. Define data with example.

Data is a collection of raw facts from real world entities Data can come in the
form of text, observations, figures, images, numbers, graphs, or symbols.
Examples
Handwritten letters, a printed book, a family photograph, a movie on video tape,
printed and duly signed copies of mortgage papers, a bank’s ledgers, and an account
holder’s passbooks are all examples of data

2. What is the digital data? And their types

Data in this form is called digital data and is accessible by the user only after it is
processed by a computer.
Types
 structured
 unstructured

3. List out the factors of the growth of digital data.

 Increase in data processing capabilities


 Lower cost of digital storage
 Affordable and faster communication technology

4. What are structured data and unstructured data?

Structured data is organized in rows and columns in a rigidly defined format so


that applications can retrieve and process it efficiently. Structured data is typically stored
using a database management system.
Data is unstructured if its elements cannot be stored in rows and columns, and is
therefore difficult to query and retrieve by business applications.

1
5. Define information with example.

Information is the intelligence and knowledge derived from data.


Example A retailer identifies customers’ preferred products and brand
names by analyzing their purchase patterns and maintaining an inventory of those
products.

6. Outline the desirable components of data center infrastructure

The data center infrastructure includes computers, storage systems, network


devices, dedicated power backups, and environmental controls (such as air
conditioning and fire suppression).

7. List out the core elements functionality of data center.

Five core elements are essential for the basic functionality of a data center

 Application
 Database
 Server and operating system
 Network
 Storage array

8. Outline the desirable key characteristics of data center elements.

Key characteristics of data center elements


 Availability
 Security
 Scalability
 Performance
 Data integrity
 Capacity
 Manageability

9. How to manage the storage infrastructure?

The following activities are


 Monitoring
 Provisioning
 Reporting

2
10. List out the key challenges in managing information.

In order to frame an effective information management policy, businesses need to


consider the following key challenges of information management.
¦
¦

 Exploding digital universe:


 Increasing dependency on information:
 Changing value of information

11. How SAN differs from NAS?

This is a dedicated, high-performance Fibre Channel (FC) network to facilitate


block-level communication between servers. Unlike a SAN, NAS to connects to an
existing communication network (LAN)and provides file access to heterogeneous clients.

12. Define IP-SAN.

IP-SAN (Internet Protocol Storage Area Network) is a convergence of


technologies used in SAN and NAS. IP-SAN provides block-level communication across
a local or wide area network (LAN or WAN), resulting in greater consolidation and
availability of data.

13. What is information life cycle?

The information lifecycle is the “change in the value of information” over time.
When data is first created, it often has the highest value and is used frequently. As data
ages, it is accessed less frequently and is of less value to the organization.

14. List out the characteristic of information lifecycle management.

 Business-centric
 Centrally managed
 Policy-based
 Heterogeneous
 Optimized

15. What are the ways to implement ILM?

 Classifying data and applications


 Implementing policies
 Managing the environment
 Organizing storage resources.

3
16. What is cloud computing?

Cloud computing refers to the delivery of computing services over the internet,
including storage, processing power, and software applications.

17. List out the Key Characteristics of Cloud Computing

The Key Characteristics of Cloud Computing are


 On-Demand Self-Service
 Broad Network Access
 Resource Pooling
 Rapid Elasticity
 Measured Service

18. What are the cloud service and deployment models?

There are the following three types of cloud service models are
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
 Software as a Service (SaaS)
There are the following four types of cloud deployment models are
 Private cloud
 Public cloud
 Hybrid cloud
 Community cloud
19. List out the desirable Advantages and disadvantages of cloud computing.

Advantages:
 Easy implementation
 Accessibility
 No hardware required
 Cost per head
 Flexibility for growth
 Efficient recovery
Disadvantages:
 No longer in control
 May not get all the features
 No Redundancy
 Bandwidth issues.

4
20. What Is Big data analytics?

Big data analytics is the process of collecting, examining, and analysing large
amounts of data to discover market trends, insights, and patterns that can help companies
make better business decisions.

21. Outline the desirable benefits of big data analytics.


The benefits of big data analytics
 Cost reduction:
 Product development
 Strategic business decisions
 Customer experience
 Risk management.

22. List out some big data analytics tools

 Hadoop
 Spark
 Data integration software
 Stream analytics tools
 Predictive analytics hardware and software
 Data mining tools
 NoSQL databases

23. Define social networking.

Social Networking refers to grouping of individuals and organizations together


via some medium, in order to share thoughts, interests, and activities.

24. list out some of the social networking services.

 Facebook
 Google+
 Twitter(x)
 Faceparty
 Linkedin
 Flickr
 WhatsApp
 Hike

25. Define mobile computing.

Mobile Computing is a technology that provides an environment that enables users


to transmit data from one device to another device without the use of any physical link or
cables.

5
26. List out the types of mobile communication.

 Fixed and Wired


 Fixed and Wireless
 Mobile and Wired
 Mobile and Wireless

27. What are the applications of mobile computing?

 Web or Internet access.


 Global Position System (GPS).
 Emergency services.
 Entertainment services.
 Educational services.

28. What is data center virtualization?

Data center virtualization is the transfer of physical data centers into digital data centers
(i.e.,virtual) using a cloud software platform, enabling companies to remotely access
information and applications.
Data center virtualization is the process of creating a virtual server—sometimes
called a software defined data center (SDCC) from traditional, physical servers.

PART-B QUESTIONS

1. Explain data center core elements in detail.


2. Explain key characteristic of data center elements.
3. Define digital data and explain how the digital data is differing from traditional
data with suitable example.
4. Discuss the cloud deployment model with suitable example.
5. Write note on
a. Redundant Array of Independent Disks (RAID)
b. Direct-attached storage (DAS)
c. Storage area network (SAN)
d. Network-attached storage (NAS)
6. Explain the Evolution of storage technology and architecture in detail
7. Give an example to illustrate information life cycle management with suitable
example.
8. Write a short note on cloud computing characteristic with example.

6
9. Explain the cloud service models and give the advantage and disadvantages of
each service model.
10. Write a short note on
a. Benefits of big data analytics
b. Big data in the real world
c. Types of big data analytics
d. Big data analytics tools

11. Discuss the steps involved in mobile computing concepts.


12. Write note on
a. Limitations of mobile computing
b. Advantages of mobile Computing
c. Applications of Mobile Computing

13. Explain the characteristic and pillars of the third platform services.
14. Discuss the necessary steps involved to implement third platform transformation.
15. Define SDDC and explain the key components of software defined data center.

7
UNIT II- INTELLIGENT STORAGE SYSTEMS AND RAID

PART-A-TWO MARK QUESTION & ANSWERS

1. What is intelligent storage system?


Intelligent storage is a storage system or service that uses AI to continuously learn and
adapts to its hybrid cloud environment to better manage and serve data. It can be deployed
as hardware on-premises, as a virtual appliance, or as a cloud service.

2. List out the components of intelligent storage system


An intelligent storage system consists of four key components: front end,cache, back end,
and physical disks

3. What is meant by command queuing?

Command queuing is a technique implemented on front-end controllers. It


determines the execution order of received commands and can reduce unnecessary drive
head movements and improve disk performance.

4. List out the command queuing algorithms


 First In First Out (FIFO)
 Seek Time Optimization
 Access Time Optimization

5. Compare fixed pre-fetch and variable pre-fetch in cache memory.


 In fixed pre-fetch, the intelligent storage system pre-fetches a fixed amount of
data. It is most suitable when I/O sizes are uniform.
 In variable pre-fetch, the storage system pre-fetches an amount of data in
multiples of the size of the host request.

8
6. How to measure the cache memory read performance?
Read performance is measured in terms of the read hit ratio, or the hit rate, usually
expressed as a percentage. This ratio is the number of read hits with respect to the total
number of read requests.A higher read hit ratio improves the read performance.

7. What is cache mirroring?


Each write to cache is held in two different memory locations on two independent
memory cards. In the event of a cache failure, the write data will still be safe in the
mirrored location and can be committed to the disk.

8. What is cache vaulting?


Cache is exposed to the risk of uncommitted data loss due to power failure.This problem
can be addressed in various ways:
power ing the memory with a battery until AC power is restored or using battery power to
write the cache content to the disk.

9. What is Cache coherency?


Cache coherency means that data in two different cache locations must be identical at all
times.

10. How cache memory to achieve flushing process?


Flushing is the process of committing data from cache to the disk. On the basis of the
I/O access rate and pattern, high and low levels called watermarks are set in cache to
manage the flushing process.

11. What are the types of flushing?


 Idle flushing
 High watermark flushing
 Forced flushing.

12. Define Logical Unit Numbers in physical disk.


Physical drives or groups of RAID protected drives can be logically split into volumes
known as logical volumes, commonly referred to as Logical Unit Numbers (LUNs).

13. What are the key components of disk drive?


Key components of a disk drive are platter, spindle, read/write head, actuator arm
assembly, and controller.

14. Define Head Disk Assembly (HDA).


The set of rotating platters is sealed in a case, called a Head Disk Assembly(HDA). A
platter is a rigid, round disk coated with magnetic material on both surfaces (top and
bottom).

9
15. What are the factors to affect the performance of disk drive?
 Disk Service Time
 Seek Time
 Rotational Latency
 Data Transfer Rate

16. How to allocate the track numbers in physical disk drive?


The tracks are numbered, starting from zero, from the outer edge of the platter. The
number of tracks per inch (TPI) on the platter (or the track density) measures how tightly
the tracks are packed on a platter.

17. Uses of zoned bit recording in disk drives


In computer storage, zone bit recording (ZBR) is a method used by disk drives to
optimise the tracks for increased data capacity. It does this by placing more sectors per
zone on outer tracks than on inner tracks.

18. Define RAID.


RAID is a way of storing the same data in different places on multiple hard disks or solid
state drives (SSDs) to protect data in the case of a drive failure.
There are two types of RAID implementation, hardware and software.

19. Define RAID set or Logical arrays.


A subset of disks within a RAID array can be grouped to form logical associations called
logical arrays, also known as a RAID set or a RAID group .

20. Define RAID strip.


A RAID set is a group of disks. Within each disk, a predefined number of contiguously
addressable disk blocks.

21. What is RAID mirroring?


Mirroring is a technique whereby data is stored on two different HDDs, yielding two
copies of data. In the event of one HDD failure, the data is intact on the surviving HDD
and the controller continues to service the host’s data requests from the surviving disk of
a mirrored pair.

22. List out the RAID levels.


RAID 0- Striped array with no fault tolerance
RAID 1- Disk mirroring
RAID 3- Parallel access array with dedicated parity disk
RAID 4- Striped array with independent disks and a dedicated parity disk
RAID 5- Striped array with independent disks and distributed parity
RAID 6- Striped array with independent disks and dual distributed parity
Nested- Combinations of RAID levels. Example: RAID 1 + RAID 0

10
23. What are the categories of intelligent storage systems?
Intelligent storage systems generally fall into one of the following two categories:
 High-end storage systems
 Midrange storage systems
BRIEF DESCRIPTION
24. Define scale-up and scale-out storage architecture.
Scale-up data storage architecture, storage drives are added to increase storage capacity
and performance.
Scale-out storage architecture uses software-defined storage (SDS) to separate the
storage hardware from the storage software, letting the software act as the controllers.

PART-B QUESTIONS

1. Explain the key components of hard disk drive and solid state drive.
2. Explain key components of an intelligent storage system.
3. How to calculate cache memory performance? And explain Read and Write operation
performed in cache memory .
4. Discuss the various algorithms for cache memory management
5. Write note on
a. Physical disk drive
b. LNU(logical unit number) masking
c. Platter
d. Spindle with R/W head
6. Explain the factor that affect the performance of hard disk drives and solid state drives
7. Give an example to illustrate addressing of hard disk drives and solid state drives.

8. Explain the categories of intelligent storage array model.


9. Write a short note on
a. Hardware RAID
b. Software RAID
c. RAID Array Components
10. Discuss the steps involved in various RAID levels model.
11. Discuss the impact of random and sequential I/O in different RAID configurations

11
12. Compute the number of drives required to support the application in different RAID
environments if 10K RPM drives with a rating of 130 IOPS per drive were used.
UNIT III STORAGE NETWORKING TECHNOLOGIES AND VIRTUALIZATION
PART-A-TWO MARK QUESTION & ANSWERS

1. List the types of storage systems.


Different types of storage systems as follows,
 Block-Based Storage System – Examples – SAN (Storage Area Network), iSCSI
(Internet Small Computer System Interface), and local disks.
 File-Based Storage System – Examples – NTFS (New Technology File System),
FAT (File Allocation Table), EXT (Extended File System).
 Object-Based Storage System – Examples – Google cloud storage, Amazon
Simple Storage Options.
 United Storage System – Examples – Dell EMC Unity XT All-Flash Unied
Storage and Dell EMC Unity XT Hybrid Unied Storage.

2. Define virtualization.
Virtualization is the technique of masking or abstracting physical resources, which
simplicationes the infrastructure and accommodates the increasing pace of business and
technological changes. It increases the utilization and capability of IT resources, such as
servers, networks, or storage devices, beyond their physical limits.
Virtualization simplifies resource management by pooling and sharing resources for
maximum utilization and makes them appear as logical resources with enhanced
capabilities.

3. State the connectivity of iSCSI protocol.


▪ Native iSCSI connectivity - Native topologies do not have any FC components; they
Perform all communication over IP. The initiators may be either directly attached to
targets or connected using standard IP routers and switches.

12
Bridged iSCSI connectivity - Bridged topologies enable the co-existence of FC with IP
by providing iSCSI-to-FC bridging functionality. For example, the initiators can exist in
an IP environment while the storage remains in an FC SAN.

4. What is zoning?
Zoning allows for inner segmentation of the switched fabric. Zoning can be used to
instigate a barrier between different environments.

Only the members of the same zone can communicate within that zone; all other attempts
from outside are rejected.
Zoning can be implemented in the following ways:
 Hardware zoning
 Software zoning

5. Define switch aggregation?


An aggregation switch is a networking device that allows multiple network connections
to be bundled together into a single link. This enables increased bandwidth and better
network performance.

6. What is meant by file-based storage system?

File storage, also called file-level or file-based storage, stores data in a


hierarchical structure. The data is saved includes and folders, and presented to both the
system storing it and the system retrieving it in the same format.

13
Data can be accessed using the Network File System (NFS) protocol for Unix or Linux,
or the Server Message Block (SMB) protocol for Microsoft Windows.

7. Define Link aggregation?


Link aggregation allows combining multiple Ethernet links into a single logical link
between two networked devices. Link aggregation is sometimes called by other names:
Ethernet bonding. Ethernet teaming.

8. List the types of connectivity in FC SAN.


The three FC SAN topologies are as follows
 Point-to-point,
 Fibre Channel-Arbitrated Loop (FC -AL),
 Switched Fabric.

9. List the types of topologies in FC SAN


The three FC SAN topologies are
 Single-Switch topology
 Mesh topology
 Core-edge topology

10. What is FCoE SAN?


FCoE SAN is a Converged Enhanced Ethernet (CEE) network that is capable of
transporting FC data along with regular Ethernet traffic over high speed (such as 10 Gbps or
higher) Ethernet links.

11. Define Unified storage architecture.


Unified storage architecture enables the creation of a common storage pool that
can be shared across a diverse set of applications with a common set of management
processes.

12. What is the use of FC-SAN?


Fibre Channel SAN (FC SAN) is also referred as SAN. It uses Fibre Channel
(FC) protocol for communication. FC protocol (FCP) is used to transport data,
commands, and status information between the compute-systems and the storage systems.
It is also used to transfer data between the storage systems.

13. How to achieve data transmission in FC-SAN?


The flow control mechanism in FC SAN delivers data as fast as the destination buffer is
able to receive it, without dropping frames. FC also has very little transmission overhead.
The FC architecture is highly scalable, and theoretically, a single FC SAN can
accommodate approximately 15 million devices.

14. What is the Software Defined Networking?


As per EMC definition, Software-defined networking is an approach to abstract
and separate the control plane functions from the data plane functions. Instead of the built-

14
in control functions at the network components level, the software external to the
components takes over the control functions.

15. List out the key advantages of software defined networking.


 Centralized control
 Policy-based automation
 Simplified, agile management

16. List out the FC Storage Arrays


 Active-active storage system
 Active-passive storage system
 Asymmetrical storage system.

17. Difference between Multimode fiber (MMF) cable and Single-mode fiber (SMF).

 Multimode fiber (MMF) cable carries multiple beams of light projected at different
angles simultaneously onto the core of the cable.
 In an MMF transmission, multiple light beams travelling inside the cable tend to
disperse and collide. This collision weakens the signal strength after it travels a certain
distance a process known as modal dispersion.
 Due to modal dispersion, an MMF cable is typically used for short distances,
commonly within a data center.

 Single-mode fiber (SMF) carries a single ray of light projected at the center of the
core. The small core and the single light wave help to limit modal dispersion.
 Single-mode Provides minimum signal attenuation over maximum distance (up to 10
km).
 A single mode cable is used for long-distance cable runs, and the distance usually
depends on the power of the laser at the transmitter and the sensitivity of the receiver.

18. Define VSAN Trunking link.


VSAN trunking allows network traffic from multiple VSANs to traverse a single ISL. It
supports a single ISL to permit traffic from multiple VSANs along the same path. The ISL
through which multiple VSAN traffic travels is called a trunk link.

19. What is VSAN Tagging?


VSAN tagging is the process of adding or removing a marker or tag to the FC frames
that contains VSAN-specific information. Associated with VSAN trunking, it helps
isolate FC frames from multiple VSANs that travel through and share a trunk link.

20. List out the FC SAN Connectivity.


The different types of FC architecture which can be designed are
 Point-to-point
 Fibre channel arbitrated loop (FC-AL)

15
 Fibre channel switched fabric (FC-SW)

21. List out the Key components for iSCSI communication.


Key components for iSCSI communication are

 iSCSI initiators such as an iSCSI HBA


 iSCSI targets such as a storage system with an iSCSI port
 IP-based network such as a Gigabit Ethernet LAN An iSCSI initiator sends
commands and associated data to a target and the target returns data and
responses to the initiator.
22. What are topologies available for iSCSI Connectivity
Native iSCSI
Native topologies do not have any FC components; they perform all communication over
IP. The initiators may be either directly attached to targets or connected using standard IP
routers and switches.
Bridged iSCSI
Bridged iSCSI Connectivity - Bridged topologies enable the co-existence of FC with IP
by providing iSCSI-to-FC bridging functionality

PART-B QUESTIONS

1. Explain in detail about Block-based, File-based, Object-based and Unified Storage systems.
2. Describe in detail about the components and architecture of FC SAN
3. Write a note on FC SAN topologies and connectivity
4. Describe in detail about zoning and link aggregation
5. What is Virtual SAN of FC SAN. Explain in detail.
6. Explain in detail about the IP SAN Protocols (iSCSI protocol Stack, FCIP protocol Stack)
7. Explain in detail about zoning and aggregation in iSCSI IP SAN
8. Explain the components, performance and addressing in FCIP
9. Explain in detail about the components and architecture of FCoE
10. Describe about Converged Enhanced Ethernet
11. Write notes on benefits of all storage systems in storage networking technologies.
12. Explain the architecture of unified storage technologies.
13. Explain in details about the software defined architecture
14. Discuss the various FC topologies in detail.

16
15. Write note on
a. FC SAN virtualization
b. IP SAN

16. What is uses of iSCSI ? Explain key components of an iSCSI and host connectivity.
17. Explain the various topologies used in iSCSI connectivity.
18. Write notes on
a. iSCSI protocol stack
b. link Aggregation
c. Switch Aggregation
d. What are the parameters to consider to selecting
Aggregation switch?

17
UNIT IV BACKUP, ARCHIVE AND REPLICATION

PART-A-TWO MARK QUESTION & ANSWERS

1. Define Business continuity (BC) .


Business continuity (BC) is an integrated and enterprisewide process that includes all
activities (internal and external to IT) that a business must perform to mitigate the impact
of planned and unplanned downtime.

2. What is Information availability (IA) ?


IA refers to the ability of the infrastructure to function according to business expectations
during its specified time of operation. Information availability ensures that people
(employees, customers, suppliers, and partners) can access information whenever they
need it.

3. What are the causes of information unavailability?


Various planned and unplanned incidents result in data unavailability.
 Planned outages include installation/integration/maintenance of new
hardware, soft- ware upgrades or patches, taking backups, application and data
restores, facility operations (renovation and construction), and refresh/migration
of the testing to the production environment.
 Unplanned outages include failure caused by database corruption, component
failure, and human errors.

4. How to measuring information availability in data center?


 Mean Time Between Failure (MTBF): It is the average time available for a
system or component to perform its normal operations between failures.
 Mean Time To Repair (MTTR): It is the average time required to repair a failed
component. While calculating MTTR, it is assumed that the fault responsible for
the failure is correctly identified and that the required spares and personnel are
available.

5. List out the common terms used in BC.


The common terms are
 Disaster recovery
 Disaster restart
 Recovery-Point Objective (RPO)
 Recovery-Time Objective (RTO)

18
6. How to differs Hot backup from cold backup?
Hot backup and cold backup are the two methods deployed for backup. They are based
on the state of the application when the backup is performed.

7. What is data deduplication?


Data deduplication emerged as a key technology to dramatically reduce the
amount of space and the cost that are associated with storing large amounts of data. Data
deduplication is the art of intelligently reducing storage needs in order of magnitude.

8. List out the types of data deduplication.


 Hash-based data deduplication
 Content-aware data deduplication
 IBM HyperFactor

9. Short notes on IBM HyperFactor


IBM HyperFactor® is a patented technology that is used in the IBM System
Storage ProtecTIER Enterprise Edition and higher software. HyperFactor takes an
approach that reduces the phenomenon of missed factoring opportunities, providing a
more efficient process. HyperFactor data deduplication uses a 4 GB Memory Resident
Index to track similarities for up to 1 petabyte (PB) of physical disk in a single repository.

10. How to perform data deduplication process?


Data deduplication can either occur while the data is backed up to the storage media (real-
time or inline) or after the data is written to the storage media (post-processing). Each
method contains positive and negative aspects.

11. List out the types of data archive.

Online archive: The storage device is directly connected to the host to make the data
immediately available. This is best suited for active archives.
Nearline archive: The storage device is connected to the host and infor- mation is local, but
the device must be mounted or loaded to access the information.
Offline archive: The storage device is not directly connected, mounted, or loaded. Manual
intervention is required to provide this service before information can be accessed..

12. Define data Replication.


Replication is the process of creating an exact copy of data. Creating one or more replicas
of the production data is one of the ways to provide Business Continuity (BC).
Data replication, where the same data is stored on multiple storage devices.

13. Data Migration.


Data migration is the process of selecting, preparing, extracting, and transforming data
and permanently transferring it from one computer storage system to another.

19
14. List out the types of data migrations.
 Storage migration
 Database migration
 Application migration
 Cloud migration
 Business process migration.
15. What are the challenges faced during data migration process?
 Source data.
 Wrong data formats
 Mapping data
 Sustainable governance
 Security

16. Define Big bang migrations.


Big bang migrations transfer all associated data within a set time window. The
advantages of creating a migration strategy around this method include lower cost, a
quicker move and less complexity. The downside, however, is that big bang migrations
require the system to be offline for the entire migration. There's also a risk of losing data
if it isn't properly backed up to another location ahead of time.

17. Define Trickle migrations.


Trickle migrations complete a data migration within phases. During the migration, both
old and new systems run at the same time, so there's no downtime, which means there's
less risk of losing data. However, trickle migrations are more complicated and need more
planning and time to implement properly.

18. What are the phases available in data migration process?


o Discovery. This should include considerations such as data sources, destinations,
security, cost and which migration strategy to use.
o Resource assessment. Identify who will be taking part in the migration.
o Data inspection. Examine the data being migrated for data quality, anomalies or
duplications.Data should also be backed up.
o Design. Data is organized and mapped out for where it's being moved to.
o Software tools. Any software that will help in the transition is purchased or
created.
o Migration. The migration process is initiated.
o Cleanup. Old or legacy systems are shut down and decommissioned.

19. What are the categories in data movers?


o Host-based software is best for application-specific migrations, such as
platform upgrades,database replication and file copying.
o Array-based-based software is primarily used to migrate data between similar
systems.
o Network appliances migrate volumes, files or blocks of data depending on
their configuration.

20
20. Difference between Data migration and data conversion.
Data migration is the process of transferring data between data storage systems or
formats.
Data conversion is the process of changing data from one format to another. If a legacy
system and a new system have identical fields, an organization could just do a data
migration; however, the data from the legacy system is generally different and needs to
be modified before migrating. Data conversion is often a step in the data migration
process.

PART-B QUESTIONS
1. Explain the BC planning lifecycle process.
2. Discuss in detail about backup architecture and their methods.
3. Define data deduplication and explain the various types of data deduplication
4. Explain the cloud based and mobile device backup process.
5. Write notes on
a. Types of Data archive
b. Types of Data migrations
6. Explain the various Data replication process.
7. Discuss the various strategies used in data migrations and phases of data
migration process.
8. Explain in detail Disaster Recovery As A Service (DRAAS)

21
UNIT V-SECURING STORAGE INFRASTRUCTURE

PART-A-TWO MARK QUESTION & ANSWERS

1. What are the information security goals?


In Information security, it is a collection of practices intended to convey personal
information secure from unapproved access and modification throughout of storing or
broadcasting from one place to another place.
Goals are
 Confidentiality
 Integrity
 Availability
2. What are the domains available in storage security?
access paths to data storage can be categorized into three security domains: application
access, management access, and BURA (backup, recovery, and archive).

3. How to securing the application access domain?


The application access domain may include only those applications that access the data
through the file system or a database interface.
 Controlling User Access to Data
 Protecting the Storage Infrastructure
 Data Encryption.
4. What are the security controls to protect a storage
infrastructure?
The security controls are
 Physical security controls

22
 Digital security controls
 Cybersecurity controls
 Cloud security controls

5. Define Governance.
Governance is the set of policies, rules, or frameworks that a company uses to achieve its
business goals. It defines the responsibilities of key stakeholders, such as the board of
directors and senior management.

6. What are the parameters including in Governance?


Good governance includes the following:
 Ethics and accountability
 Transparent information sharing
 Conflict resolution policies
7. What are the types available in Risk management?
Businesses face different types of risks, including financial, legal, strategic, and security
risks. Proper risk management helps businesses identify these risks and find ways to
remediate any that are found

8. Define Compliance
Compliance is the act of following rules, laws, and regulations. It applies to legal
and regulatory requirements set by industrial bodies and also for internal corporate
policies.

9. What are the benefits of GRC?


The following are some benefits of implementing a GRC strategy at your organization.
 Data-driven decision-making
 Responsible operations
 Improved cyber security

10. What are the challenges in GRC?


GRC requires cross-functional collaboration across different departments that practices
governance, risk management, and regulatory compliance.
Some examples include the following:
 Senior executives who assess risks when making strategic decisions
 Legal teams who help businesses mitigate legal exposures
 Finance managers who support compliance with regulatory requirements
 HR executives who deal with confidential recruitment information
 IT departments that protect data from cyber threats.
11. What are the tools available in GRC?
There are some of the following GRC tools to integrate business processes, reducecosts,
and improve efficiency.
 GRC software
 User management

23
 Security information and event management
 Auditing

12. How do organizations implement an effective GRC strategy?


Building an effective GRC requires continuous evaluation and mprovement.
The following tips make GRC implementation easier.
 Define clear goals
 Assess existing procedures
 Start from the top
 Use GRC solutions
 Test the GRC framework
 Set clear roles and responsibilities

13. Give Some examples of GRC.


 Diligent HighBond.
 IBM OpenPages.
 LogicManager.
 LogicGate Risk Cloud.
 MetricStream Enterprise GRC.
 Navex Global Lockpath.
 ServiceNow Governance, Risk, and Compliance
14. What are the key attributes of Storage management ?
Storage management has some key attribute which is generally used to manage the
storage capacity of the system. These are given below:
 Performance
 Reliability
 Recoverability
 Capacity

15. What are the different processes in Storage management?


The most common processes found in storage management are
 Provisioning
 Data compression
 Data migration
 Data replication
 Automation
 Disaster recovery

PART-B QUESTIONS

1. Explain in detail about storage security domains .


2. Discuss the various methods to secure the backup, recovery, and archive the
informations.
3. Explain the various security controls to protect a storage infrastructure.
4. Writes notes on
a. Governance

24
b. Risk management
c. Compliance
d. Benefits Of GRC
5. Explain the various challenges faced during GRC implementation process.
6. Explain the functions and process involved in storage infrastructure management.

25

You might also like