Which of the following has correct RAID level mapping(s)?
Which of the following has correct RAID level mapping(s)?
Which of the following has incorrect RAID level mappings?
Which of the following has incorrect RAID level mappings?
i.0 – Data striped over several drives. No redundancy or parity is involved
ii. 1 – Mirroring of drives
iii. 2 – Data striping over all drives at the bit level.
iv. 3 – Data striping over all drives and parity data held on one drive
_____________are instructions that tell a RAID system how to rebuild the lost data on the new hard drive.
_____________are instructions that tell a RAID system how to rebuild the lost data on the new hard drive.
_________________is useful when a processing device requests access to data more quickly than a storage device
_________________is useful when a processing device requests access to data more quickly than a storage devices can provide access.
Which of the following does not properly describe these types of technologies?
Nancy is a new network administrator and has been faced with decision of implementing either direct access backup systems or sequential access backup storage devices. Which of the following does not properly describe these types of technologies?
Which of the following best describes the output of this type of situation?
A network engineer just informed Bob that the parity data for their RAID system has been corrupted. Which of the following best describes the output of this type of situation?
Why would the engineer suggest this?
John is a new network administrator. One of his engineers has put in a request to implement an ISDN line, but the company already has an established WAN link. Why would the engineer suggest this?
Which of the following controls would not be associated with personnel hiring?
Hiring new employees requires strict security controls that must be constantly reviewed and audited. Which of the following controls would not be associated with personnel hiring?
Which of the following is not one of them?
The removal of data remanence from media devices is a standard security measure in computing environments. This removal process has many names. Which of the following is not one of them?
Grouping disks or servers together to provide mutual support is called _________.
Grouping disks or servers together to provide mutual support is called _________.