1 | Name the three types of iSCSI names. |
Answer: | IQN, EUI and NAA. |
2 | Why does RFC 3720 encourage the reuse of ISIDs? |
Answer: | To promote initiator SCSI port persistence for the benefit of applications and to facilitate target recognition of initiator SCSI ports in multi-path environments. |
3 | What key feature does iSNS support that SLP does not support? |
Answer: | RSCN. |
4 | In the context of iSCSI, what is the difference between immediate data and unsolicited data? |
Answer: | Immediate data is sent in the SCSI Command PDU, whereas unsolicited data accompanies the SCSI Command PDU in a separate Data-Out PDU. |
5 | What is the function of the iSCSI R2T PDU? |
Answer: | The iSCSI target signals its readiness to receive write data via the R2T PDU. |
6 | Can security parameters be re-negotiated during an active iSCSI session? |
Answer: | No. |
7 | Why must iSCSI use its own CRC-based digests? |
Answer: | Because the TCP checksum cannot detect all bit errors. |
8 | Does iSCSI support stateful recovery of active tasks in the presence of TCP connection failures? |
| |
Answer: | Yes. |
9 | Does FCP natively support the exchange of all required operating parameters to establish a new session? |
Answer: | No. FCP relies on SCSI Mode commands for the exchange of certain operating parameters. |
10 | Does FCP support immediate data? |
Answer: | No. |
11 | How many bytes long is the FCP_DATA IU header? |
Answer: | Zero. The receiver uses only the FC Header to identify an FCP_DATA IU, and ULP data is directly encapsulated in the Data field of the FC frame. |
12 | What is the name of the FC-4 link service defined by the FCP-3 specification? |
Answer: | Sequence Retransmission Request (SRR). |
13 | FCP mandates a one-to-one relationship between which two data constructs? |
Answer: | IUs and sequences. |
| |
14 | When an FCP target that supports only Exchange level error recovery detects a frame error, what action does the target take? |
| |
Answer: | The FCP target discards all frames associated with the Exchange. The target takes no further action and waits for the initiator to detect the error via timeout. |
15 | What determines the functional model of an FC-BB device? |
Answer: | The type of non-FC network to which the FC-BB device connects. |
16 | How many FC Entities may be paired with an FCIP Entity? |
Answer: | One. |
17 | Does the FCIP addressing scheme map to the SAM addressing scheme? |
Answer: | No. |
18 | Why must the FC frame delimiters be encapsulated for transport across FC backbone networks? |
Answer: | Because they serve several purposes rather than merely delimiting the start and end of each FC frame. |
19 | Which field in the FSF may be set to zero for the purpose of discovery? |
Answer: | The Destination FC Fabric Entity WWN field. |
20 | What procedure begins after an FCIP link becomes fully active? |
| |
Answer: | The FC switch-to-switch extended link initialization procedure. |
21 | Why must jumbo frames be supported end-to-end if they are implemented? |
Answer: | To avoid excessive fragmentation. |