Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are two scenarios where using disk replication is a valid risk mitigation strategy? (Choose two.)

A.

a primary storage array non-recoverable hardware failure

B.

B. an extended power failure at the primary site

C.

C. information destruction due to a security breach

D.

system instability due to a bad OS update

You explain to a customer that storage data compression can be used on most data types. However, there are exceptions.

Which file type is an exception?

A.

*.txt

B.

*.bat

C.

*.jpg

D.

*.ora

Which entity is responsible for making cloud services available for cloud consumers?

A.

cloud provider

B.

cloud auditor

C.

cloud storage

D.

cloud infrastructure

What is an implementation of a secure, multi-tenant cloud environment that is externally available to all users?

A.

private

B.

public

C.

secure

D.

hybrid

Software Defined Storage (SDS) uses which type of technology to function?

A.

Application

B.

replication

C.

virtualization

D.

authentication

What is Software Defined Storage?

A.

virtualized storage with a Fibre Channel interface

B.

virtualized storage with an Ethernet interface

C.

physical storage with a service management interface

D.

virtualized storage with a service management interface

Which two statements about jumbo Ethernet frames are correct? (Choose two.)

A.

A jumbo frame is an Ethernet frame with a payload greater than 1500 bytes.

B.

B. Jumbo frames are always a fixed standard length of 9000 bytes.

C.

C. Jumbo frames can increase the latency on a network due to the transmission of larger frames

D.

Jumbo frames enable the transmission of iSCSI packets on the IP network.

Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)

A.

internet Protocol Security (IPsec)

B.

B. ACLs

C.

B. encryption at rest

D.

Challenge Handshake Authentication Protocol (CHAP)

Your customer has a Fibre Channel SAN environment and has properly zoned servers for storage with front end controller ports. When an administrator goes to initialize a provisioned volume, it is not seen on the server.

What would cause this problem1?

A.

an unplugged cable

B.

a multi-path I/O failure

C.

a corrupted volume

D.

improper LUN masking

What are two requirements of a server cluster with regards to storage technologies? (Choose two.)

A.

a switch fabric

B.

B. a file locking mechanism

C.

C. a back-end storage database

D.

shared storage