Prev Question
Next Question

Your network contains servers that run Windows Server 2012 R2.
The network contains a large number of iSCSI storage locations and iSCSI clients.
You need to deploy a central repository that can discover and list iSCSI resources on the network automatically.
Which feature should you deploy?

A. the Windows Standards-Based Storage Management feature

B. the iSCSI Target Server role service

C. the iSCSI Target Storage Provider feature

D. the iSNS Server service feature

D. The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS servers and iSNS clients. iSNS clients are computers, also known as
initiators, that are attempting to discover storage devices, also known as targets, on an Ethernet network.

Which feature should you deploy? 1

Incorrect Answers:
A: Windows Server 2012 R2 enables storage management that is comprehensive and fully scriptable, and administrators can manage it remotely. A WMI-based
interface provides a single mechanism through which to manage all storage, including non-Microsoft intelligent storage subsystems and virtualized local storage
(known as Storage Spaces). Additionally, management applications can use a single Windows API to manage different storage types by using standards-based
protocols such as Storage Management Initiative Specification (SMI-S).
B: Targets are created in order to manage the connections between an iSCSI device and the servers that need to access it. A target defines the portals (IP
addresses) that can be used to connect to the iSCSI device, as well as the security settings (if any) that the iSCSI device requires in order to authenticate the
servers that are requesting access to its resources.
C: iSCSI Target Storage Provider enables applications on a server that is connected to an iSCSI target to perform volume shadow copies of data on iSCSI virtual
disks. It also enables you to manage iSCSI virtual disks by using older applications that require a Virtual Disk Service (VDS) hardware provider, such as the
Diskraid command.

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *