Which type of interface connects SSD drives to the storage array controller?
Which type of interface connects SSD drives to the storage array controller?A . NVMe B. NVMe/IB C. NVMe-oF D. NVMe/TCPView AnswerAnswer: D
What is a function of a continuous data protection (CDP) appliance?
What is a function of a continuous data protection (CDP) appliance?A . Migrates deduplicated data from the source volume to the target volume during replication B. Manages both local and remote replications within and across data centers C. Stores all data that has changed from the time the replication session...
Which standard provides FCoE with a lossless Ethernet network?
Which standard provides FCoE with a lossless Ethernet network?A . SCSI Remote Direct Memory Access B. Data Center Bridging C. Data Center Bridging Exchange Protocol D. InfiniBandView AnswerAnswer: B
What is the MTBF of Port 5?
An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 5 occurs as follows: Tuesday = 6 AM to 7 AM Thursday = 5 PM to 9 PM Friday = 8 AM to 9 AM What...
What triggers an appropriate workflow upon receiving a service provisioning or management request?
What triggers an appropriate workflow upon receiving a service provisioning or management request?A . Alerts B. Orchestrated operations C. Recovery time objective D. Infrastructure discoveryView AnswerAnswer: B
Match the functionality of a security goal with its description
DRAG DROP Match the functionality of a security goal with its description. View AnswerAnswer:
What is a goal of cyber recovery?
What is a goal of cyber recovery?A . Evaluate systems, networks, and applications to find vulnerabilities B. Determine persistence access of system, networks, and applications C. Abstract the physical compute hardware from the operating system and applications D. lsolate copies of critical data to ensure that an uncompromised copy always...
Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Intrusion-based B. Policy-based C. Anomaly- Based D. Signature-basedView AnswerAnswer: D
Which network file sharing protocol provides cloud-based file sharing through a REST API interface?
Which network file sharing protocol provides cloud-based file sharing through a REST API interface?A . S3 B. HDFS C. ZFS D. FTPView AnswerAnswer: A
Which FC SAN topology should be recommended?
An IT organization wants to deploy four FC switches for compute and storage system connectivity. To meet performance requirements, a maximum of one active ISL and redundant ISLs for their compute to storage traffic. Which FC SAN topology should be recommended?A . Single switch B. Partial mesh C. Multi-switch D....