Which of the following is the MINIMUM number of disks needed to implement RAID 5?
Which of the following is the MINIMUM number of disks needed to implement RAID 5?
which of the following?
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the following?
Which of the following software allows a network administrator to inspect the protocol header in order to trou
Which of the following software allows a network administrator to inspect the protocol header in
order to troubleshoot network issues?
How many paths does the host have to its LUN?
An administrator has assigned a LUN to a host with two WWPNs. The WWPNs are attached to
separate fabrics on the SAN. In a zone on each fabric the WWPN is assigned to two targets,
associated to the LUN. How many paths does the host have to its LUN?
Which of the following does this procedure prevent?
Pete’s corporation has outsourced help desk services to a large provider. Management has
published a procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing
the technician to work on their PC. Which of the following does this procedure prevent?
Which of the following deduplication methods will minimize host CPU utilization?
Which of the following deduplication methods will minimize host CPU utilization? (Select TWO)
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websi
Which of the following ports would be blocked if Pete, a security administrator, wants to deny
access to websites?
Which of the following wireless attacks would this address?
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port. Which of
the following wireless attacks would this address?
Which of the following would be the MOST appropriate process to address storage planning?
A new storage network is being designed. Which of the following would be the MOST appropriate
process to address storage planning?
Which of the following can be implemented with multiple bit strength?
Which of the following can be implemented with multiple bit strength?