Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf
In an FCoE switch, which function is provided by the Fibre Channel Forwarder (FCF)?
In an FCoE switch, which function is provided by the Fibre Channel Forwarder (FCF)?A . Communication bridge between CEE and IP networksB . Communication bridge between FC and FCIP networksC . Communication bridge between CEE and FCIP networksD . Communication bridge between CEE and FC networksView AnswerAnswer: D
Which Dell EMC product is a hyper-scale storage infrastructure that provides universal accessibility with support for object and HDFS?
Which Dell EMC product is a hyper-scale storage infrastructure that provides universal accessibility with support for object and HDFS?A . ViPR ControllerB . PowerMaxC . IsilonD . Elastic Cloud StorageView AnswerAnswer: D Explanation: Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=2ahUKEwibs5yDjablAhVCzBoKHbc6AhgQFjAJegQIAxAC&url=https%3A%2F%2Fwww.dell.com%2Fcommunity%2Fs%2Fvjauj58549%2Fattachments%2Fvjauj58549%2Fsolutions-ch%2F516%2F1%2Fh13999-hadoop-ecs-data-services- wp.pdf&usg=AOvVaw1jTgO2qHQLxapR5zvgXWpH
In the event of a disk failure, which RAID level enables quick data reconstruction?
In the event of a disk failure, which RAID level enables quick data reconstruction?A . RAID 3B . RAID 5C . RAID 6D . RAID 10View AnswerAnswer: D
What is the availability of Port 5 in that week?
A Fibre Channel switch has eight ports and all ports must be operational 24×7. However, a failure of Port 5 occurs on a particular week as follows: • Monday = 11 AM to 12 PM • Thursday = 7 AM to 11 AM • Saturday = 11 AM to 1...
What accurately describes an Incident in a storage infrastructure?
What accurately describes an Incident in a storage infrastructure?A . Unknown root cause of one or more disruptions to service.B . Any event that may lead to the disruption of a service.C . Support request to help access an IT resource.D . Any event that may create a change in...
What accurately describes the scale-out storage architecture?
What accurately describes the scale-out storage architecture?A . Scales the capacity only within a single storage system.B . Provides a fixed capacity ceiling that limits scalability beyond a storage system.C . Provides the capability to maximize its capacity by adding nodes to the cluster.D . Restricts scalability to the limits...
Which technology decouples the OS, applications, and user state from a physical compute system?
Which technology decouples the OS, applications, and user state from a physical compute system?A . Application virtualizationB . Storage virtualizationC . Thin client virtualizationD . Desktop virtualizationView AnswerAnswer: D
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?
Which layer of the OSI model provides the functional and procedural methods to transfer data between network entities?A . Data linkB . PresentationC . SessionD . ApplicationView AnswerAnswer: A Explanation: Reference: https://en.wikibooks.org/wiki/Network_Plus_Certification/Management/OSI_Model
What does the "X", "Y", and "Z" represent in a NAS environment?
Based on the exhibit, What does the "X", "Y", and "Z" represent in a NAS environment?A . X = FC SAN, Y = IP Network, and Z = NAS GatewayB . X = IP Network, Y = FC SAN, and Z = NAS GatewayC . X = FC SAN, Y...