Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is true about an OSD storage system?

A.

Numerous objects can be stored in a single file system folder of OSD.

B.

Objects are created based on the name and location of the file.

C.

One object can be placed inside another object to save storage space.

D.

Objects contain user data, related metadata, and user defined attributes of data.

What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?

A.

Utilizes preconfigured preinstalled and prepackaged vendor ready solutions

B.

Combines the datacenter components into a single standalone computing platform managed by software

C.

Utilizes products and services from the vendors that provide specific functions with more configuration options

D.

Combines datacenter components into a distributed infrastructure platform managed by software

What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?

A.

Enables initiators and targets to authenticate each other by using a shared secret code

B.

Provides strong authentication for client-server applications by using secret-key cryptography

C.

Allows a client to access protected resources from a resource server on behalf of a resource owner

D.

Enables an organization to use authentication services from an identity provider

What information is available in a capacity planning report for storage infrastructure?

A.

number of units of storage available, used and the cost

B.

current and historic information about the utilization of storage, file systems, and ports

C.

equipment purchase dates, licenses, lease status, and maintenance records

D.

current and historical performance information about IT components and operations

Which file system provides a streaming interface using the MapReduce framework?

A.

CIFS

B.

HDFS

C.

NFS

D.

NTFS

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

A.

Intrusion-based

B.

Policy-based

C.

Anomaly- Based

D.

Signature-based

What is a benefit of performing local replication?

A.

Enables operational recovery in the event of a site-level disaster

B.

Enables operational recovery in the event of data loss

C.

Provides disaster recovery as a service offering

D.

Reduces the time to perform data backups

Which security mechanism ensures secure access to internal assets while enabling Internet-based access to selected resources?

A.

Virtual local area network

B.

Demilitarized zone

C.

Virtual private network

D.

Discovery domain

An organization has two data centers separated by a distance of 1600 km. They want to replicate between these data centers for disaster recovery purposes. They are concerned that this will impact application response time.

Which solution will address this concern?

A.

Asynchronous remote replication

B.

Storage-based COFW snapshot replication

C.

Synchronous remote replication

D.

Storage-based ROW snapshot replication

Match the software-defined storage (SDS) attributes with their respective description.