What is the primary advantage of RAID 6 compared to RAID 5?
What is the primary advantage of RAID 6 compared to RAID 5?A . High available storage capacity.B . Low write penalty.C . High resiliency.D . Low rebuild time for data.View AnswerAnswer: A
When using a bridged iSCSI connection, which components facilitate communication between gateways?
When using a bridged iSCSI connection, which components facilitate communication between gateways?A . Compute system with iSCSI ports and the storage system with Ethernet ports.B . Compute system with iSCSI ports and the storage system with only FC ports.C . Compute system with FC HBA ports and the storage system...
What is a benefit when a node is added to a scale-out NAS cluster?
What is a benefit when a node is added to a scale-out NAS cluster?A . Increased cluster performanceB . Reduced capital expenditureC . Simplified cluster managementD . Decreased data duplicationView AnswerAnswer: A
Which type of login assigns an FC address to a node in an FC SAN environment?
Which type of login assigns an FC address to a node in an FC SAN environment?A . PRLIB . FLOGIC . WWNND . PLOGIView AnswerAnswer: B
What is used to track where objects and metadata are stored in an OSD system?
What is used to track where objects and metadata are stored in an OSD system?A . Object storage databaseB . Object ID algorithmC . Object fingerprintingD . Globally unique identifierView AnswerAnswer: A
Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events?
Which method does an intrusion detection and prevention system (IDPS) use to identify intrusions by scanning and analyzing events to detect if they are statistically different from normal events?A . Anomaly-basedB . Signature-basedC . Profile-basedD . Device-basedView AnswerAnswer: A
Why do organizations need a malware protection software?
Why do organizations need a malware protection software?A . Secure critical applications by using strong credentialsB . Prevent authorized modification of OS-sensitive areasC . Protect applications and the OS against trojan horse programsD . Prevent eavesdropping and tampering of application dataView AnswerAnswer: C
Which benefit does the measured service characteristic provide to a cloud service provider?
Which benefit does the measured service characteristic provide to a cloud service provider?A . Enables control and optimization of resource useB . Enables cloud services to communicate with each otherC . Enables availability of specific resources depending on policyD . Enables the reduction and/or elimination of upfront IT expenditureView AnswerAnswer:...
What is a function of the metadata service in an object-based storage device (OSD)?
What is a function of the metadata service in an object-based storage device (OSD)?A . Generates the file system namespace from the file contents.B . Manages both physical and logical disks on which the user data is stored.C . Manages the storage space for all remote clients.D . Maintains the...
What is a benefit of N_Port virtualization (NPV)?
What is a benefit of N_Port virtualization (NPV)?A . Reduces the number of domain IDs in a fabricB . Eliminates the overhead of fabric services in an FC SANC . Enables online expansion of virtual volumesD . Allows an N_Port to transfer multiple VSAN trafficView AnswerAnswer: A