Which of the following should be implemented to give the STRONGEST level of protection?
In a switched fabric environment there is a need for security control of the FC switching
infrastructure. Which of the following should be implemented to give the STRONGEST level of
protection?
Which of the following is the MOST likely cause of the issue?
Node A is a member of SAN Zone 1 and SAN Zone 2. Node B is a member of SAN Zone 2. Node
B has just been replaced and the storage administrator is troubleshooting connectivity issues
between Node A and Node B. Which of the following is the MOST likely cause of the issue?
which of the following is the HIGHEST level of abstraction?
In logical volume management, which of the following is the HIGHEST level of abstraction?
which of the following replication approaches is required?
In a highly available SAN configuration that guarantees no data loss, which of the following
replication approaches is required?
Which of the following measurements should be used when benchmarking performance between SAN vendors?
Which of the following measurements should be used when benchmarking performance between
SAN vendors?
Which of the following describes the automatic moving of data between high-cost and low-cost storage devices?
Which of the following describes the automatic moving of data between high-cost and low-cost
storage devices?
Which of the following is the MOST likely cause?
SNMP logs on a storage device show a duplex mismatch alert. Which of the following is the MOST
likely cause?
Which of the following attributes can be applied to storage data to save disk space?
Which of the following attributes can be applied to storage data to save disk space? (Select TWO).
Which of the following backup methods only backs up data that has changed since the last backup of any type?
Which of the following backup methods only backs up data that has changed since the last backup
of any type?
Which of the following BEST prevents unauthorized access to storage data via a username/password?
Which of the following BEST prevents unauthorized access to storage data via a
username/password?