Which exhibit represents a Type 1 hypervisor?

Which exhibit represents a Type 1 hypervisor? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

March 4, 2020 No Comments READ MORE +

Which IDPS technique uses a database that contains known attack patterns?

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C Explanation: Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf

March 2, 2020 No Comments READ MORE +

What is primary consideration the institution should keep in mind when deciding whether to agree to this request?

An institution has made the decision to exit a client relationship due to anti-money laundering concerns. Prior to starting the close out process, the institution receives a written request from a law enforcement agency to keep the account open. The client is the subject of an ongoing investigation and law...

March 2, 2020 No Comments READ MORE +

In a backup operation, what are the correct sequence of steps after the backup server initiates the scheduled backup process?

DRAG DROP In a backup operation, what are the correct sequence of steps after the backup server initiates the scheduled backup process? View AnswerAnswer:

February 29, 2020 No Comments READ MORE +

Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?

Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?A . Data linkB . PresentationC . SessionD . ApplicationView AnswerAnswer: A Explanation: Reference: https://en.wikibooks.org/wiki/Network_Plus_Certification/Management/OSI_Model

February 26, 2020 No Comments READ MORE +

What is the availability of Port 5 in that week?

A Fibre Channel switch has eight ports and all ports must be operational 24x7. However, a failure of Port 5 occurs on a particular week as follows: • Monday = 11 AM to 12 PM • Thursday = 7 AM to 11 AM • Saturday = 11 AM to 1...

February 22, 2020 No Comments READ MORE +

What is an accurate statement about variable prefetching?

What is an accurate statement about variable prefetching?A . Many blocks that have recently been written to storage by the compute system are retrieved and placed in cache.B . Many non-contiguous blocks that are not currently required can be retrieved from cache in advance.C . Storage system prefetches data in...

February 20, 2020 No Comments READ MORE +

Why is it important for organizations to store, protect, and manage their data?

Why is it important for organizations to store, protect, and manage their data?A . Reduce the amount of data to be replicated, migrated, and backed up.B . Rapidly develop and deploy modern applications for business improvement.C . Develop new business opportunities by leveraging existing data.D . Reduce the complexity in...

February 19, 2020 No Comments READ MORE +

What is the maximum number of disk drive failures against which data is protected by the configuration?

When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration?A . 3B . 4C . 8D . 12View AnswerAnswer: A

February 18, 2020 No Comments READ MORE +

In a compute-based storage area network (SAN), what is a function of the metadata manager?

In a compute-based storage area network (SAN), what is a function of the metadata manager?A . Holds cluster-wide mapping information and load balancing in a compute-based SAC . Performs the I/O operations on the local storage of a compute system as requested by a client.D . Provides an interface to...

February 18, 2020 No Comments READ MORE +