Which security control provides logical isolation of devices on Ethernet?

Which security control provides logical isolation of devices on Ethernet?A . VPNB . FirewallC . VSAND . VLANView AnswerAnswer: A Explanation: Reference: https://www.techtarget.com/searchnetworking/definition/virtual-private-network

November 28, 2021 No Comments READ MORE +

How does a synthetic full backup enable a full backup copy to be created?

How does a synthetic full backup enable a full backup copy to be created?A . offline without disrupting the I/O operation on the production volumeB . offline with less I/O operation to create index pointers using fast copyC . online with throttled I/O operation on the production volumeD . online...

November 27, 2021 No Comments READ MORE +

What is the maximum number of drive failures that can be withstood without losing the data in this configuration?

A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives. What is the maximum number of drive failures that can be withstood without losing the data in this configuration?A . 6B . 4C . 3D...

November 26, 2021 No Comments READ MORE +

Which type of virtual machine clone is created from a snapshot of a parent VM?

Which type of virtual machine clone is created from a snapshot of a parent VM?A . Mirrored CloneB . Full CloneC . Linked CloneD . Snap CloneView AnswerAnswer: C Explanation: Reference: https://www.vmware.com/support/ws5/doc/ws_clone_typeofclone.html

November 26, 2021 No Comments READ MORE +

What are the considerations when designing a disaster recovery plan based on RTO and RPO?

What are the considerations when designing a disaster recovery plan based on RTO and RPO?A . Lower RTO and RPO have no effect on costB . Lower RTO and RPO simplify the solutionC . Lower RTO and RPO decrease the costD . Lower RTO and RPO increase the costView AnswerAnswer:...

November 26, 2021 No Comments READ MORE +

At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?

At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?A . Protection ApplicationB . Management DomainC . Data SourceD . Database ApplicationView AnswerAnswer: C

November 25, 2021 No Comments READ MORE +

What makes services visible and accessible to the users?

What makes services visible and accessible to the users?A . Service CatalogB . Operational DatabaseC . Cloud native applicationD . Unified storage systemView AnswerAnswer: A Explanation: Reference: https://www.manageengine.com/products/service-desk/itil/what-is-service-catalog.html

November 25, 2021 No Comments READ MORE +

How is a hash created on file Apr.Txt in an object-level deduplication?

Refer to the exhibit. How is a hash created on file Apr.Txt in an object-level deduplication?A . from content with variable-lengthB . from the metadata of the fileC . from the content of the fileD . from content with fixed-lengthView AnswerAnswer: B Explanation: Reference: https://www.delltechnologies.com/asset/he-il/products/storage/industry-market/h17072-data-reduction-with-dell-emc-powermax.pdf

November 23, 2021 No Comments READ MORE +

Which recovery mode involves rolling back a system to a previous recovery point instead of finding the cause of a fault?

Which recovery mode involves rolling back a system to a previous recovery point instead of finding the cause of a fault?A . Forward recoveryB . Complete functional recoveryC . Backward recoveryD . Degraded functional recoveryView AnswerAnswer: B

November 23, 2021 1 Comment READ MORE +

Which security control detects and blocks unusual network behavior?

Which security control detects and blocks unusual network behavior?A . IDPAB . VPNC . IDPSD . ZoningView AnswerAnswer: C Explanation: Reference: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901146

November 22, 2021 No Comments READ MORE +