which of the following?
An administrator has just archived 50 percent of a file share’s data to tape. The administrator then
proceeds to clear the unused space so that it is available for use by the server and array. On the
array, the original LUN was provisioned in a way that allows such an operation. This process is
called which of the following?
Which of the following attacks is taking place?
A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to
connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?
CAT6 Ethernet cabling has a rated maximum transmission capability of:
CAT6 Ethernet cabling has a rated maximum transmission capability of:
Which of the following is required if ports from VLANs on two separate switches need to broadcast to each othe
Which of the following is required if ports from VLANs on two separate switches need to
broadcast to each other?
Which of the following is the HIGHEST throughput the administrator can expect?
An environment includes an active/passive array and 2Gbps ports for the array controllers,
switches, and host HBAs. The SAN is fully redundant and highly available. A new host is attached
and LUNs are assigned to benchmark throughput. Which of the following is the HIGHEST
throughput the administrator can expect?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following should be completed to allow these new employees access to the wireless network?
A new department is formed and a new section of the building is being built out for them. All
50 new employees will need access to the wireless network. Which of the following should
be completed to allow these new employees access to the wireless network?
how many tapes are required to recover the server?
The backup regimen for a file server is to run a full backup every Sunday and cumulative
incremental backups Monday thru Saturday evenings. On Wednesday morning, the server and
storage are lost in a catastrophic event. Assuming a different backup tape is used every day, how
many tapes are required to recover the server?
Which of the following is an example of OSI model layer 4?
Which of the following is an example of OSI model layer 4?
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and it
Which of the following provides dedicated hardware-based cryptographic functions to an operating
system and its applications running on laptops and desktops?