Performance
management
203.
Which technique is used in Kerberos to
authenticate a client-server application
across an insecure network?
Secret-key
cryptography
204.
Which technique prevents compute
systems from gaining unauthorized access
to storage volumes in a shared storage
environment?
LUN masking
205.
Which technique protects the data in
cache from power failures?
Vaulting
206.
Which type of digital data consists of
textual data with inconsistent formats but
can be formatted with the use of software
tools?
Quasi-
structured
data
207.
Which type of digital data has no defined
format but has a self-describing structure
that enables its analysis?
Semi-
structured
data
208.
Which type of login assigns an FC address
to a node in an FC SAN environment?
FLOGI
209.
Which type of login is performed
between an N_Port and an F_Port in a
Fibre Channel SAN environment?
FLOGI
210.
Which type of LUN provides full control for
precise data placement and allows an
administrator to create LUNs on different
RAID sets if there is workload contention?
Traditional
211.
Which type of storage system is built
specifically for storing fixed content?
Content
addressed
storage
212.
Which VMware product provides a network
virtualization platform for a software-defined
data center?
NSX
213.
Which VMware product provides a virtual
desktop infrastructure solution?
Horizon
214.
Why is it important for organizations to
maintain a copy of data at a remote site?
Ensure
disaster
recovery
215.
Why should a replica be consistent with its
source?
Ensure the
usability
of the
replica
216.
X is a virtual storage pool and Y is a physical
storage system An organization plans to
deploy a deduplication solution by retaining
their legacy backup application. They are
concerned about the application servers
performance and a long backup window
during backups.
Which deduplication solution(s) should be
recommended to the organization?
Post-
process

You've reached the end of your free preview.
Want to read the whole page?
- Fall '09
- CHIN
- RAID