Data Center II Final
Select one or more choices of typical operating process areas that are documented in the Data Center.
Access and change management policies Application unit testing guidelines Service Level Agreements (SLAS) Server installation guidelines and equipment moves Operational procedures
Which of the following areas are examples where consolidation in the Data Center occurs?
All of the answers are correct and have been a focus in consolidation efforts.
Select one or more choices of what is typically included in a server inventory list.
All the above
Which of the following technologies are examples of recent trends in Data Centers?
All the above
Select one or more of the following as business benefits of cloud computing.
Almost zero upfront infrastructure investment Just-in-time infrastructure More efficient resource utilization Usage-based costing
Which of the following choices is NOT typically included in an application inventory?
Application end of life date
Select one or more as valid technical benefits of cloud computing:
Automation Auto and proactive scaling More efficient development lifecycle Disaster recovery and business continuity
Select one or more valid DC or cloud certifications
Cisco CCNA - Data Center CloudU - Rackspace Cloud University Data Center Certified Associate CCIE
Select one of the following answers that is not a characteristic of cloud computing.
Cloud computing is a one-size-fits-all proposition
Of the following items, which one has the greatest depth of security
Computer racks
Select one or more of the following as valid principles of equipment layout according to course notes and APC White Paper #144.
Controlling airflow using a hot-aisle/cold-aisle layout is commonly used.. Provide safe and convenient access ways Plan complete equipment layout in advance as much as possible Align floor or ceiling tile systems with equipment
The component in the Data Center which typically consumes the most power proportionally is _________.
Cooling is the most energy intensive component - consuming approximately 38% of the power.
Which of the following metrics is derived by taking the IT equipment power divided by total facility power?
DCIE
Which of the following elements are not typically part of a preventative maintenance Statement of Work (SOW)?
Data center availability metrics
Which one of the following is not a best practices design principle for the Data Center?
Design for rigidity
Select one or more of the following as valid examples of network-based threats.
E-mail or web-based virus Denial of service (DOS) attack Distributed denial of service (DDOS) attack
_____ is the rapid discharge of static electricity between bodies at different electrical potentials and can damage electronic components.
ESD
Select one of the following as not an essential design criteria for the data center.
Equipment such as forklifts and pallet jacks
According to a study from Los Alamos National Laboratory, the failure rate of components in a data center only marginally increases with a rise in temperature of ten degrees Celsius.
False
As computing and memory requirements have grown over time, this has resulted in more generated heat. However, the power requirements have actually decreased proportionally.
False
Service Management would not be considered a software category applicable to the data center.
False
T/F: A company's Data Center should always be required to host any application irrespective of the technology upon which it is built.
False
T/F: As Data Centers remain relatively static in their configuration, it is not that important to update its documentation on an on-going basis.
False
T/F: Current best practices in system management software continues to rely upon human intervention to take action upon notification of a failure notification.
False
T/F: Modern planning tools are similar in functionality to legacy tools in that they cannot predict the impact of a new server on power and cooling distribution or calculate the impact of moves and changes on data center space,and on power and cooling capacities.
False
T/F: The value of an efficiency metric in a Data Center should not vary during the course of a day or week.
False
T/F: Virtualization within the context of your Data Center and IT infrastructure is the introduction of an abstraction layer that enables logical resources to be consumed at a physical level.
False
The axis selection is not a critical decision in a data center plan and has minimal impact on performance and economy.
False
The strategic or best practices approach to preventative maintenance is to have multiple management systems, each addressing its own component type.
False
VMWare and Microsoft are two prominent virtual machine management vendors - with Microsoft having the largest market share in the world.
False
Writing your own Nagios check scripts is difficult and you are confined to it's proprietary scripting language.
False
Select one or more choices below for typical areas of Data Center documentation.
Floor plans and cabinet locations Electrical infrastructure Server details Application Design Documentation and Database Schema Details
Select one or more of the following as valid preventative maintenance techniques considered non-invasive.
General appearance examination Roof penetrations
Select one or more of the following vendors who are major providers of data center management software:
IBM HP Computer associates
Select one or more of the following as valid common errors in equipment layout according to the course notes.
Ignoring support columns in advance Adding partitions without studying the effect on equipment layout Failure to plan the entire layout in advance
Which of the following are not part of the TIA-942 scope for Data Centers?
Local regulations
Select one of the following which is not one of the core features of Nagios.
No reporting, trending, and capacity planning - but provides hooks where you can customize them if you wish.
Select one or more of the following as valid characteristics of cloud computing.
On Demand self service model Resource pooling Rapid elasticity Broad network access
Which of the following devices require preventative maintenance during their life cycle?
PDUs Raised Floors Humidifiers Fire Alarm Systems
The most widespread use these days is Power Usage Effectiveness (PUE), which gauges the electrical efficiency of a server environment by focusing on its electrical overhead. Select the correct choice below for the formula for computing PUE.
PUE = Total Facility Power / IT Equipment Power
Which of the following is not typically a category for defining current Data Center Requirements?
Past requirements
A "power sag" or "brownout" can be prevented by using _______ Technology.
Power conditioning
Potential loss needs to be weighed against the known costs of security when designing and implementing a physical security strategy. Which of the following is NOT a known cost of keeping people out in security?
Productivity loss during downtime
Familiarity with your company and products is not typically a requirement.
Select a category from the list below that should not typically be included as requirements when evaluating external hosting providers?
Design for modularity Design for simplicity Design for standards adherence Design for security
Select one or more of the following as valid data center design principles:
Availability Data Archiving and Retention Security
Select one or more valid non-functional requirements of the Data Center:
Select one or more monitoring capabilities below that the Enterprise System Monitoring (ESM) category typically performs.
Servers Networking Databases Environment Facilities
Which of the following are frequent implementations / service models of Cloud Computing?
Software as a Service Platform as a Service Infrastructure as a Service
When calculating the air flow needs of a data center for under floor cooling, which of the following should have higher air pressure?
Subfloor
Which Data Center tier level below most correctly describes a Data Center with multiple active distribution paths?
Tier 3
Which of the following Data Center Tier levels according to the Uptime Institute meet all of the following criteria : 1. 2 simultaneously active distribution paths, 2. Continuous Cooling (Class A), and 3) is concurrently maintainable, fault tolerant, has N active capacity components to support IT load, and provides compartmentalization.
Tier 4
According to the textbook in chapter 3, the Bahnhof Data Center in Sweden makes their customers secure about the physical security of the DC because it is built within a former nuclear bunker and is conveniently located centrally in Stockholm.
True
According to the textbook in chapter 8, the Digital Realty Trust data center involved converting an historic building - and today is the largest consumer of power in the Chicago area according to the textbook.
True
According to the textbook in chapter 9 (nine), the eBay Project Mercury Data Center was able to simplify the complexity of the data center by going with two main SKUs - one for 96 servers at 28 kW and one for 48 servers intended for Hadoop-based applications.
True
In the data floor planning process, there are room dimensions for data centers based upon the pitch chosen.
True
It is important to identify rows in the DC floor plan in order to align the floor grid for raised floor with a ceiling grid for a suspended ceiling.
True
It is reasonable to have a requirement for a Data Center hosting provider around the area of Service Level Agreements and Objectives.
True
T/F: One of the functions of Data Center analytics tools is to generate inventory reports organized by device type, age, manufacturer, and properties of the device
True
T/F: One of the functions of Data Center planning tools is to generate recommended installation locations for rack-mount IT equipment. The location selection is based on available power, cooling, space capacity, and network ports
True
T/F: One should require as a best practice that cabling and electrical contractors provide as-builts of the DC room.
True
T/F: Operating procedures are needed to standardize operational aspects of installations, configurations, task management, backups and restores, and other Data Center activities.
True
T/F: The use of a central authentication service such as the use of Kerberos or RADIUS is a valid example of good network security.
True
The simplest Nagios setup is a central server running a Nagios daemon that runs local check scripts - which report the status of services on that and remote hosts.
True
Which of the following is NOT considered a best practice when implementing network security?
Use easy to remember and unencrypted passwords for network devices
Which of the following choices are examples of physical security?
Use of mantraps, camera surveillance, and security guards
Select one or more of the following items that are valid cleaning materials and equipment.
Vacuums equipped with HEPA filters Canned air Lint-free mops, anti-static wipes and towels
Select the following area(s) that are valid forms of network virtualization in the Data Center.
Virtual LAN (VLAN) Virtual Private Network (VPN) Out-of-band Network
According to the textbook when discussing the Digital Realty Trust data center, which of the following categories are used as part of the Leadership in Energy and Environmental Design (LEED)? Select all that are applicable.
Water efficiency Energy and atmosphere Materials and Resources Indoor environmental quality and innovation and design
Select one or more choices below for valid questions that Data Center Analytics tools can answer
What do I have installed in the Data Center By what date will the Data Center run out of power and cooling? When will firmware have to be updated? How can I predict the need for future infrastructure, investments, and rollouts?
Which access control method is the least secure?
What you have
Select one or more choices below that can be addressed via modern DC planning software.
Where do I place my next server? How will a new server impact the existing branch circuit? Does the existing power and cooling equipment have the capacity to accommodate new devices? Do I need to spread out my blade servers to get reliable operations?
An adequate budget and an abundant pool of qualified employees
Which of the following is not considered a data center project constraint?
Select one ore more of the following as valid services that DC cleaning vendors perform.
Wiping down servers and networking devices Removing marks from raised floor services Vacuuming the room and above ceiling cleaning and inspection Testing for potentially hazardous particles
Excessive humidity in the air increases the _____ potential of gases and should be avoided in the data center environment.
corrosive
Which one of the following is not a commonly deployed application that fits the Software as a Service (SaaS) service model?
According to the textbook in chapter 6, the Cisco data center in Allen, Texas uses an active-passive mirror with a link to a second data center 15 miles away - requiring manual failover to one another in a matter of hours.
false
Cloud Computing, although currently popular, is more of a fad than a lasting service model.
false
Nagios is an enterprise-class monitoring solution for hosts, services, and networks - and is a proprietary software package.
false
Choose the two types of failures in biometric identification from the choices below
false rejection false acceptance
The _______ of a data center row layout is the distance from one mid-cold-aisle to the next-cold-aisle.
pitch
A person who uses "ordinary guile and deceit" (friendly talking and lying) to gain access to a facility or system is using ________.
social engineering
According to textbook in chapter 12, the IBM data center in Raleigh, NC has tens of thousands of sensors within the Data Center to monitor conditions and energy efficiency - as well as continuously generate CFD (computational fluid dynamics) models of the Data Center to further optimize performance.
true
According to the textbook in chapter 11, the Green House Data DC in Wyoming heavily leverages wind power and uses a variety of efficient elements including virtualization, high-efficiency air conditioning units, air economization, and enclosed hot aisles.
true
According to the textbook in chapter 4, The Barcelona Supercomputing Center was one of the first computer rooms becoming a hot computer room instead of a cold computer room - with no cold aisles anymore per se.
true
According to the textbook in chapter 5, the uniqueness of the Calcul Quebec data center is its arrangement of hardware in a circular space- with hot area being blown down and cold air circular upward in a single hot aisle and cold aisle.
true
Cooling is the component in the Data Center which typically consumes the most power proportionally.
true
For situations where columns are unavoidable in the DC, but boundaries are flexible, the floor plan should be laid out as if no columns existed - based on the standardized dimensions of the room and the pitches required. Columns should then be located directly over any one particular rack location, preferably at a row end.
true
Of the four potential outcomes from a preventative maintenance visit, the most prevalent outcome is that a potential issue is identified and immediate actions are taken to prevent a future failure.
true
T/F An accurate floor plan map shows physical clearances, cabinet locations, the placement of major infrastructure, and the numbering scheme. More detailed plans could also include cabling paths, electrical conduits, data ports, and electrical receptacles.
true
T/F: IT and business executives have realized that hundreds of thousands of dollars in energy and operational costs can be saved by improved physical infrastructure planning, by minor system reconfiguration, and by small process changes.
true
The UPS (Uninterruptible Power Supply) should be continually online, even when there is no failure in the power grid.
true
To maintain the integrity of the supply air plenum, poor fitting files and perimeter penetrations should be avoided.
true