A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events . Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-based View Answer Answer: C...
Continue readingWhat is an accurate statement about VSAN trunking?
What is an accurate statement about VSAN trunking?A . Allows network traffic from multiple VSANs to traverse a single interswitch linkB . Enables an F_Port to transfer multiple VSAN traffic over a single port channelC . Provides VSAN IDs to F_Ports to include them in the VSANsD . Forwards FC frames between F_Ports that...
Continue readingWhat is an accurate statement about remote desktop services?
What is an accurate statement about remote desktop services?A . Operating system and applications hosted on a remote compute system are shared by multiple usersB . Users are provided dedicated virtual machines running operating system and applications, and hosted on a client systemC . Users have the flexibility to install applications and modify operating...
Continue readingIn a virtualized environment, which method enables a virtual machine to be rolled back in case of a logical corruption to the virtual machine?
In a virtualized environment, which method enables a virtual machine to be rolled back in case of a logical corruption to the virtual machine?A . Virtual volume replicationB . VM snapshotC . Storage array volume replicationD . VM clone View Answer Answer: B...
Continue readingWhat is the availability of Port 5 in that week?
A Fibre Channel switch has eight ports and all ports must be operational 24×7. However, a failure of Port 5 occurs on a particular week as follows: – Monday = 11 AM to 12 PM – Thursday = 7 AM to 11 AM – Saturday = 11 AM to 1 PM What is the...
Continue readingWhat is an advantage of implementing email archiving?
What is an advantage of implementing email archiving?A . Reduce the cost of managing the email archiving server and storageB . Reduce redundant emails in a mailbox to facilitate faster recoveryC . Provide high availability and continuous access to business emailsD . Increase the mailbox space by moving old emails to archive storage View...
Continue readingIn an FCoE environment, which functionality provides a framework for the allocation of bandwidth to different network traffic classes?
In an FCoE environment, which functionality provides a framework for the allocation of bandwidth to different network traffic classes?A . Enhanced transmission selectionB . Priority-based flow controlC . Congestion notificationD . Data center bridging exchange protocol View Answer Answer: A...
Continue readingWhat does the "X" represent in the exhibit?
What does the "X" represent in the exhibit? A . E_portB . F_portC . N_portD . NL_port View Answer Answer: B...
Continue readingWhat is an accurate statement about hypervisor-based continuous data protection (CDP)?
What is an accurate statement about hypervisor-based continuous data protection (CDP)?A . Write splitter is embedded in the hypervisorB . Journal is stored in a virtual machineC . Journal and replica use the same storage volumeD . Virtual appliance runs on a storage system View Answer Answer: A...
Continue readingWhat is the primary advantage of RAID 6 compared to RAID 5?
What is the primary advantage of RAID 6 compared to RAID 5?A . High available storage capacity.B . Low write penalty.C . High resiliency.D . Low rebuild time for data. View Answer Answer: A...
Continue reading