iSCSI Questions & Answers

This set of multiple choice SAN storage questions and answers focuses on iSCSI protocol.

1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned
View Answer

Answer: a
Explanation: None.

2. iSCSI allows what type of access
a) block level
b) file level
c) both block and file level
d) none of the mentioned
View Answer

Answer: a
Explanation: None.

3. iSCSI names are:
a) Globally unique and temporary
b) Local to the setup
c) Globally unique and permanent
d) Local to the setup and temporary
View Answer

Answer: c
Explanation: None.
advertisement
advertisement

4.Which of the following is not true of iSCSI names?
a) iSCSI names are associated with iSCSI nodes(targets and initiators.
b) iSCSI names are associated with n/w adapter cards
c) iSCSI names are world wide unique.
d) iSCSI names are permanant.
View Answer

Answer: b
Explanation: None.

5. Which of the following is not a valid iSCSI name?
a) iqn.2001-04.com.mystorage:storage.tape1
b) iqn.2001-04.com.mystorage
c) iqn.01-04.com.example.disk
d) none of the mentioned.
View Answer

Answer: c
Explanation: None.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Which of the following is not a valid iSCSI name?
a) eui.1234098769785341
b) eui.4237098769785341
c) eui.12340987697853422.disk
d) none of the mentioned
View Answer

Answer: c
Explanation: None.

7. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses
b) Probing Luns on iSCSI targets
c) Probing New Luns
d) None of the mentioned
View Answer

Answer: a
Explanation: None.
advertisement

8. Which of the following are valid SendTargets commands?
a) SendTargets=iqn.2001-04.com.mystorage:storage.tape1
b) SendTargets=all.FC
c) SendTargets=all.iSCSI
d) None of the mentioned
View Answer

Answer: a
Explanation: None.

9. iSCSI targets can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned
View Answer

Answer: d
Explanation: None.
advertisement

10. Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned
View Answer

Answer: d
Explanation: None.

Sanfoundry Global Education & Learning Series – Storage Area Networks.

Here’s the list of Best Books in Storage Area Networks

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.