Which security control provides logical isolation of devices on Ethernet?
Which security control provides logical isolation of devices on Ethernet?A . VPNB . FirewallC . VSAND . VLANView AnswerAnswer: A Explanation: Reference: https://www.techtarget.com/searchnetworking/definition/virtual-private-network
How does a synthetic full backup enable a full backup copy to be created?
How does a synthetic full backup enable a full backup copy to be created?A . offline without disrupting the I/O operation on the production volumeB . offline with less I/O operation to create index pointers using fast copyC . online with throttled I/O operation on the production volumeD . online...
What is the maximum number of drive failures that can be withstood without losing the data in this configuration?
A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives. What is the maximum number of drive failures that can be withstood without losing the data in this configuration?A . 6B . 4C . 3D...
Which type of virtual machine clone is created from a snapshot of a parent VM?
Which type of virtual machine clone is created from a snapshot of a parent VM?A . Mirrored CloneB . Full CloneC . Linked CloneD . Snap CloneView AnswerAnswer: C Explanation: Reference: https://www.vmware.com/support/ws5/doc/ws_clone_typeofclone.html
What are the considerations when designing a disaster recovery plan based on RTO and RPO?
What are the considerations when designing a disaster recovery plan based on RTO and RPO?A . Lower RTO and RPO have no effect on costB . Lower RTO and RPO simplify the solutionC . Lower RTO and RPO decrease the costD . Lower RTO and RPO increase the costView AnswerAnswer:...
At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?
At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?A . Protection ApplicationB . Management DomainC . Data SourceD . Database ApplicationView AnswerAnswer: C
What makes services visible and accessible to the users?
What makes services visible and accessible to the users?A . Service CatalogB . Operational DatabaseC . Cloud native applicationD . Unified storage systemView AnswerAnswer: A Explanation: Reference: https://www.manageengine.com/products/service-desk/itil/what-is-service-catalog.html
How is a hash created on file Apr.Txt in an object-level deduplication?
Refer to the exhibit. How is a hash created on file Apr.Txt in an object-level deduplication?A . from content with variable-lengthB . from the metadata of the fileC . from the content of the fileD . from content with fixed-lengthView AnswerAnswer: B Explanation: Reference: https://www.delltechnologies.com/asset/he-il/products/storage/industry-market/h17072-data-reduction-with-dell-emc-powermax.pdf
Which recovery mode involves rolling back a system to a previous recovery point instead of finding the cause of a fault?
Which recovery mode involves rolling back a system to a previous recovery point instead of finding the cause of a fault?A . Forward recoveryB . Complete functional recoveryC . Backward recoveryD . Degraded functional recoveryView AnswerAnswer: B
Which security control detects and blocks unusual network behavior?
Which security control detects and blocks unusual network behavior?A . IDPAB . VPNC . IDPSD . ZoningView AnswerAnswer: C Explanation: Reference: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901146