Which of the following types of virtualization would be used to meet this requirement?

An employee is asked to run an instance of a Linux OS while booted up in a Windows OS . Which of the following types of virtualization would be used to meet this requirement?A . Type IB . Type IIC . Bare MetalD . NativeView AnswerAnswer: B

June 16, 2021 No Comments READ MORE +

Which of the following factors yields cost savings in cloud computing? (Select TWO).

Which of the following factors yields cost savings in cloud computing? (Select TWO).A . Shared resourcesB . AvailabilityC . Ubiquitous accessD . Multi-tenancyE . On premisesView AnswerAnswer: A,D

June 16, 2021 No Comments READ MORE +

Which of the following MOST likely contributed to the issue?

A web hosting company received reports of slow performance from four out of the five clients. Upon investigation, it was determined that a hosted virtual machine was using more RAM and CPU than the others . Which of the following MOST likely contributed to the issue?A . Hard quota limitsB...

June 16, 2021 No Comments READ MORE +

Which of the following should the lab administrator implement to allow students to upload files?

Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops . Which of the following should the lab administrator implement to allow students to upload files?A . Resource poolingB . Secure FTPC . Storage quotasD . Port...

June 16, 2021 No Comments READ MORE +

Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?

Although the SAN appears to be running without any problems, the technician is unable to reach the SAN’s web enabled management interface . Which of the following tools can the technician use to QUICKLY find where the communication failure occurred?A . arpB . tracerouteC . pingD . ipconfigView AnswerAnswer: B

June 16, 2021 No Comments READ MORE +

Which of the following networking components would be used to connect two subnets in a virtual environment?

Which of the following networking components would be used to connect two subnets in a virtual environment?A . Virtual switchB . Virtual disksC . Virtual routerD . Virtual HBAView AnswerAnswer: C

June 16, 2021 No Comments READ MORE +

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?

Which of the following allows a network device to process storage traffic without significant delays, even if the amount of other network traffic has saturated the link?A . CachingB . Jumbo framesC . Load balancingD . QoSView AnswerAnswer: D

June 16, 2021 No Comments READ MORE +

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?

Which of the following would create an efficient means of accessing and organizing data in a cloud environment, as well as provide a list of useful, relevant data?A . Blob dataB . Object IDC . ReplicasD . MetadataView AnswerAnswer: D

June 16, 2021 No Comments READ MORE +

Which of the following only uses Fibre Channel to implement a storage infrastructure?

Which of the following only uses Fibre Channel to implement a storage infrastructure?A . NFSB . SANC . NASD . SMBView AnswerAnswer: B

June 15, 2021 No Comments READ MORE +

Which of the following describes the access control method where data owners authorize who is granted access to their files?

Which of the following describes the access control method where data owners authorize who is granted access to their files?A . Mandatory access controlB . Role-based access controlC . Access control listD . Discretionary access controlView AnswerAnswer: D

June 15, 2021 No Comments READ MORE +