3 Months Free Update
3 Months Free Update
3 Months Free Update
Which two security methods will protect iSCSI traffic from unauthorized tampering or spoofing? (Choose two.)
A customer is considering mixing disk technologies in the same storage array to provide additional capabilities that they require.
In this scenario, what would be a benefit of doing this?
You want to use a light-weight communication API for cloud access. What would you use in this situation?
What is a SNIA standard that defines an interface used by applications to create, retrieve, update and delete elements from the cloud?
Your customer has a Fibre Channel SAN environment and has properly zoned servers for storage with front end controller ports. When an administrator goes to initialize a provisioned volume, it is not seen on the server.
What would cause this problem1?
You want to replace multiple copies of data, at variable levels of granularity, with references to a shared copy to save storage space and/or bandwidth.
Which data reduction method would satisfy the requirement?
You have a RAID 5 set with five disks at 400 GB each. Approximately how much usable space would this configuration yield?
When presenting a single volume to multiple hosts, which type of service needs to be running on the hosts?
What is the name of the process by which a SAN dynamically extends volumes depending on server and application needs?