What is an accurate statement about variable prefetching?
What is an accurate statement about variable prefetching? A. Many blocks that have recently been written to storage by the compute system are retrieved and placed in cache. B. Many non-contiguous blocks that are not currently required can be retrieved from cache in advance. C. Storage system prefetches data in multiples of the original I/O […]
Which layer of the OSI model provides the functional and procedural methods to transfer data between network e
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities? A. Data link B. Presentation C. Session D. Application Reference: https://en.wikibooks.org/wiki/Network_Plus_Certification/Management/OSI_Model
What is the availability of Port 5 in that week?
A Fibre Channel switch has eight ports and all ports must be operational 24×7. However, a failure of Port 5 occurs on a particular week as follows: • Monday = 11 AM to 12 PM • Thursday = 7 AM to 11 AM • Saturday = 11 AM to 1 PM What is the availability […]
Why is it important for organizations to store, protect, and manage their data?
Why is it important for organizations to store, protect, and manage their data? A. Reduce the amount of data to be replicated, migrated, and backed up. B. Rapidly develop and deploy modern applications for business improvement. C. Develop new business opportunities by leveraging existing data. D. Reduce the complexity in managing the data center environment.
In a compute-based storage area network (SAN), what is a function of the metadata manager?
In a compute-based storage area network (SAN), what is a function of the metadata manager? A. Holds cluster-wide mapping information and load balancing in a compute-based SAN. B. Performs the I/O operations on the local storage of a compute system as requested by a client. C. Provides an interface to the software-defined storage controller. D. […]
What is a benefit of link aggregation?
What is a benefit of link aggregation? A. Optimizes fabric performance by distributing network traffic across ISLs. B. Improves ISL utilization by increasing the network traffic on a specific ISL. C. Yields a higher throughput by combining two parallel ISLs into a single physical ISL. D. Saves bandwidth by restricting traffic to a specific potentially […]
In an archiving environment, how is a content address created in a content addressable storage (CAS) system to
In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object? A. From the metadata of an object. B. By using the logical address of the memory space. C. From the binary representation of an object. D. By using the physical address of the storage […]
Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns? A. Role-based B. Profile-based C. Signature-based D. Anomaly-based Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf
What is a key advantage of cloning a virtual machine (VM)?
What is a key advantage of cloning a virtual machine (VM)? A. Ability to run new VMs simultaneously with the same IP address. B. Reduces the time required to create multiple copies of a VM. C. Improves the performance of an existing VM and new VMs. D. Eliminates the need to create multiple snapshots for […]
What is the maximum number of disk drive failures against which data is protected by the configuration?
When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments. What is the maximum number of disk drive failures against which data is protected by the configuration? A. 3 B. 4 C. 8 D. 12