Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?
Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment?A . Fabric bindingB . ZoningC . Concatenating metaLUNsD . LUN maskingView AnswerAnswer: D
What is an advantage of performing capacity monitoring in a storage infrastructure environment?
What is an advantage of performing capacity monitoring in a storage infrastructure environment?A . Automatically identifying configuration changes to the storage infrastructure elementsB . Rapidly identifying component failures that may lead to storage unavailabilityC . Efficiently tracking unauthorized access to the storage infrastructure elementsD . Proactively preventing service outages due...
What is an accurate statement about three-way NDMP backup in a NAS environment?
What is an accurate statement about three-way NDMP backup in a NAS environment?A . Backup device can be shared among multiple NAS headsB . Each NAS head should have a dedicated backup deviceC . Backup data traverses at least three NAS heads before reaching the backup deviceD . Backup is...
What information is available in a capacity planning report for storage infrastructure?
What information is available in a capacity planning report for storage infrastructure?A . number of units of storage available, used and the costB . current and historic information about the utilization of storage, file systems, and portsC . equipment purchase dates, licenses, lease status, and maintenance recordsD . current and...
Which storage management function ensures that the services and service levels are delivered per SLAs?
Which storage management function ensures that the services and service levels are delivered per SLAs?A . Infrastructure discovery managementB . Portfolio managementC . Financial managementD . Operation managementView AnswerAnswer: D
What is a characteristic of an FC-AL implementation?
What is a characteristic of an FC-AL implementation?A . Devices can be added and removed dynamically without any impactB . Supports connectivity up to 15 million nodesC . Requires at least one connectivity deviceD . Reserves one address for connecting an FC-SW portView AnswerAnswer: D
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?
Which product provides an organization with the power to search and analyze vast amounts of data in one place and helps administrators to discover suspicious event trends?A . Dell InTrustB . Dell Change AuditorC . VMware AppDefenseD . VMware AirWatchView AnswerAnswer: A
What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?
What is an accurate statement about VLANs and VSANs in an FCoE environment with an existing FC SAN?A . A dedicated VLAN must be configured for each VSANB . VLANs configured for VSANs must carry regular LAN trafficC . Default VLAN must map to all VSANs defined in the FCoE...
Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C
In which scenarios is FCIP most beneficial? (Choose two)
In which scenarios is FCIP most beneficial? (Choose two)A . Connecting isolated SANs over long distancesB . High-performance, low-latency environmentsC . Local data center connectivityD . Connecting SANs over an IP networkView AnswerAnswer: AD