Which IDPS technique uses a database that contains known attack patterns?

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C

September 18, 2024No CommentsREAD MORE +

What is an accurate statement about three-way NDMP backup in a NAS environment?

What is an accurate statement about three-way NDMP backup in a NAS environment?A . Backup device can be shared among multiple NAS headsB . Each NAS head should have a dedicated backup deviceC . Backup data traverses at least three NAS heads before reaching the backup deviceD . Backup is...

September 18, 2024No CommentsREAD MORE +

What is a benefit of source-based deduplication over target-based deduplication?

What is a benefit of source-based deduplication over target-based deduplication?A . Backup data can be retained longerB . Only unique data is sent over the network to be backed upC . Backup processing is offloaded from the backup clientD . Less backup data is stored on the backup serverView AnswerAnswer:...

September 18, 2024No CommentsREAD MORE +

What triggers an appropriate workflow upon receiving a service provisioning or management request?

What triggers an appropriate workflow upon receiving a service provisioning or management request?A . AlertsB . Orchestrated operationsC . Recovery time objectiveD . Infrastructure discoveryView AnswerAnswer: B

September 18, 2024No CommentsREAD MORE +

Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?

Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?A . Data linkB . PresentationC . SessionD . ApplicationView AnswerAnswer: A

September 18, 2024No CommentsREAD MORE +

Which recommended cloud service model will meet their requirement?

An organization wants to use an application for their business communication. However, they do not have the skills or the time to deploy and manage an application in-house. Which recommended cloud service model will meet their requirement?A . Infrastructure as a ServiceB . Database as a ServiceC . Software as...

September 17, 2024No CommentsREAD MORE +

In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?

In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?A . Hadoop Distributed File System (HDFS)B . New Technology File System (NTFS)C . Common Internet File System (CIFS)D . Network File System (NFS)View AnswerAnswer: C

September 17, 2024No CommentsREAD MORE +

What are the components of an intelligent storage system? (Choose two)

What are the components of an intelligent storage system? (Choose two)A . RAID ControllersB . HTTP ProtocolsC . Cache MemoryD . Wireless AdaptersView AnswerAnswer: AC

September 16, 2024No CommentsREAD MORE +

In a Fibre Channel SAN environment, what does the term "N_Port" refer to?

In a Fibre Channel SAN environment, what does the term "N_Port" refer to?A . A node port that connects an end device to a switchB . A switch port that connects to another switchC . A port on a storage deviceD . A port on a host bus adapterView AnswerAnswer:...

September 16, 2024No CommentsREAD MORE +

Which operation is performed by a scale-out NAS cluster when clients send data to the cluster?

Which operation is performed by a scale-out NAS cluster when clients send data to the cluster?A . Data is divided and stored on multiple nodes in parallelB . Data is consolidated into a block and then stored on the NAS headC . Data is evenly distributed to every file system...

September 16, 2024No CommentsREAD MORE +