Why is it important to document network architecture, hardware, protocols, naming standards, and upgrades?
Why is it important to document network architecture, hardware, protocols, naming standards, and
upgrades?
Which two (2) are advantages of ISL over-subscription?
Which two (2) are advantages of ISL over-subscription? (Choose two.)
Which of the following fault tolerant RAID levels would allow the maximum amount of data to be stored?
A server has six drives of equal size attached to a RAID controller. Which of the following fault
tolerant RAID levels would allow the maximum amount of data to be stored?
what a challenge-response session is?
Which definition best defines what a challenge-response session is?
Which action should be taken after the application is installed and fully functional?
A new application is installed on a company server. Which action should be taken after the
application is installed and fully functional?
Which three (3) benefits result from migrating to dual fabrics with full mesh topologies?
The SAN audit reports that there is a single fabric in a full mesh topology. Which three (3) benefits
result from migrating to dual fabrics with full mesh topologies? (Choose three.)
Which of the following RAID levels can withstand the simultaneous loss of two physical drives in an array?
Which of the following RAID levels can withstand the simultaneous loss of two physical drives in
an array?
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
Which of the following describes a type of algorithm that cannot be reversed in order to decode the
data?
How can the telnet client in Windows 2000 Server be started?
How can the telnet client in Windows 2000 Server be started?
What two (2) benefits does SCSI Command Tag Queueing provide?
What two (2) benefits does SCSI Command Tag Queueing provide? (Choose two.)