Performance management 203. Which technique is used in Kerberos to authenticate a client-server application across an insecure network? Secret-key cryptography 204. Which technique prevents compute systems from gaining unauthorized access to storage volumes in a shared storage environment? LUN masking 205. Which technique protects the data in cache from power failures? Vaulting 206. Which type of digital data consists of textual data with inconsistent formats but can be formatted with the use of software tools? Quasi- structured data 207. Which type of digital data has no defined format but has a self-describing structure that enables its analysis? Semi- structured data 208. Which type of login assigns an FC address to a node in an FC SAN environment? FLOGI 209. Which type of login is performed between an N_Port and an F_Port in a Fibre Channel SAN environment? FLOGI 210. Which type of LUN provides full control for precise data placement and allows an administrator to create LUNs on different RAID sets if there is workload contention? Traditional 211. Which type of storage system is built specifically for storing fixed content? Content addressed storage 212. Which VMware product provides a network virtualization platform for a software-defined data center? NSX 213. Which VMware product provides a virtual desktop infrastructure solution? Horizon 214. Why is it important for organizations to maintain a copy of data at a remote site? Ensure disaster recovery 215. Why should a replica be consistent with its source? Ensure the usability of the replica 216. X is a virtual storage pool and Y is a physical storage system An organization plans to deploy a deduplication solution by retaining their legacy backup application. They are concerned about the application servers performance and a long backup window during backups. Which deduplication solution(s) should be recommended to the organization? Post- process
You've reached the end of your free preview.
Want to read the whole page?
- Fall '09