Which cloud deployment model does the exhibit represent?
A service provider is offering cloud services to Enterprise P and Enterprise Q. Which cloud deployment model does the exhibit represent?A . Externally-hosted private cloudB . On-premise community cloudC . Public cloudD . Externally-hosted community cloudView AnswerAnswer: A
Which security control mechanism will help organization to achieve the desired security?
An organization is planning to secure the connection between the data center and cloud while performing data backup and replication. Which security control mechanism will help organization to achieve the desired security?A . ldentity and Access managementB . Intrusion Detection and PreventionC . FirewallD . Virtual Private NetworkView AnswerAnswer: D
What is determined based on the recovery point objective in an asynchronous remote replication?
What is determined based on the recovery point objective in an asynchronous remote replication?A . Size of the bufferB . Size of the replicaC . Response timeD . Location of the sourceView AnswerAnswer: A
What is an accurate statement about three-way NDMP backup in a NAS environment?
What is an accurate statement about three-way NDMP backup in a NAS environment?A . Backup data is sent directly from NAS to the backup deviceB . Backup data is sent to the backup device through the application serversC . A dedicated backup device is required for each NASD . All...
What is the availability of Port 2 in that week?
A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday. However, a failure of Port 2 occurs on a particular week as follows: - Monday = 10 AM to 12 PM - Wednesday = 4 PM to 9...
What are the essential components of an object in an object-based storage system?
What are the essential components of an object in an object-based storage system?A . File path, object ID, data, and filenameB . Object ID, metadata, file path, and LUN IDC . Data, user-defined attributes, metadata, and object IDD . LUN ID, data, object ID, and user-defined attributesView AnswerAnswer: C
Which of the following are key fault tolerance techniques? (Choose two)
Which of the following are key fault tolerance techniques? (Choose two)A . RAIDB . Data deduplicationC . Load balancingD . Data archivingView AnswerAnswer: AC
In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?
In a NAS environment, which file system provides a public or open variation of the Server Message Block (SMB) protocol and uses the TCP/IP protocol?A . Hadoop Distributed File System (HDFS)B . New Technology File System (NTFS)C . Common Internet File System (CIFS)D . Network File System (NFS)View AnswerAnswer: C
What triggers an appropriate workflow upon receiving a service provisioning or management request?
What triggers an appropriate workflow upon receiving a service provisioning or management request?A . AlertsB . Orchestrated operationsC . Recovery time objectiveD . Infrastructure discoveryView AnswerAnswer: B
What is the availability of Port 5 in that week?
A Fibre Channel switch has eight ports and all ports must be operational 24x7. However, a failure of Port 5 occurs on a particular week as follows: - Monday = 11 AM to 12 PM - Thursday = 7 AM to 11 AM - Saturday = 11 AM to 1...