Which type of interface connects SSD drives to the storage array controller?

Which type of interface connects SSD drives to the storage array controller?A . NVMe B. NVMe/IB C. NVMe-oF D. NVMe/TCPView AnswerAnswer: D

December 30, 2022 No Comments READ MORE +

What is a function of a continuous data protection (CDP) appliance?

What is a function of a continuous data protection (CDP) appliance?A . Migrates deduplicated data from the source volume to the target volume during replication B. Manages both local and remote replications within and across data centers C. Stores all data that has changed from the time the replication session...

December 29, 2022 No Comments READ MORE +

Which standard provides FCoE with a lossless Ethernet network?

Which standard provides FCoE with a lossless Ethernet network?A . SCSI Remote Direct Memory Access B. Data Center Bridging C. Data Center Bridging Exchange Protocol D. InfiniBandView AnswerAnswer: B

December 29, 2022 No Comments READ MORE +

What is the MTBF of Port 5?

An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 5 occurs as follows: Tuesday = 6 AM to 7 AM Thursday = 5 PM to 9 PM Friday = 8 AM to 9 AM What...

December 29, 2022 No Comments READ MORE +

What triggers an appropriate workflow upon receiving a service provisioning or management request?

What triggers an appropriate workflow upon receiving a service provisioning or management request?A . Alerts B. Orchestrated operations C. Recovery time objective D. Infrastructure discoveryView AnswerAnswer: B

December 29, 2022 No Comments READ MORE +

Match the functionality of a security goal with its description

DRAG DROP Match the functionality of a security goal with its description. View AnswerAnswer:

December 29, 2022 No Comments READ MORE +

What is a goal of cyber recovery?

What is a goal of cyber recovery?A . Evaluate systems, networks, and applications to find vulnerabilities B. Determine persistence access of system, networks, and applications C. Abstract the physical compute hardware from the operating system and applications D. lsolate copies of critical data to ensure that an uncompromised copy always...

December 28, 2022 No Comments READ MORE +

Which IDPS technique uses a database that contains known attack patterns?

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Intrusion-based B. Policy-based C. Anomaly- Based D. Signature-basedView AnswerAnswer: D

December 28, 2022 No Comments READ MORE +

Which network file sharing protocol provides cloud-based file sharing through a REST API interface?

Which network file sharing protocol provides cloud-based file sharing through a REST API interface?A . S3 B. HDFS C. ZFS D. FTPView AnswerAnswer: A

December 28, 2022 No Comments READ MORE +

Which FC SAN topology should be recommended?

An IT organization wants to deploy four FC switches for compute and storage system connectivity. To meet performance requirements, a maximum of one active ISL and redundant ISLs for their compute to storage traffic. Which FC SAN topology should be recommended?A . Single switch B. Partial mesh C. Multi-switch D....

December 28, 2022 No Comments READ MORE +