单选题Which of the following is most accurate in describing the required types of FCP zoningconsiderations when implementing a SAN Volume Controller (SVC)?()Azoning is typically limited to controlling access to physical storageBzoning is focused on access control between SVC nodes and host systemsCzoning is focused on access to physical storage arrays, SVC clusters, and hostsDzoning is focused on the access relationship between SVC nodes and the physical storagearrays

单选题
Which of the following is most accurate in describing the required types of FCP zoningconsiderations when implementing a SAN Volume Controller (SVC)?()
A

zoning is typically limited to controlling access to physical storage

B

zoning is focused on access control between SVC nodes and host systems

C

zoning is focused on access to physical storage arrays, SVC clusters, and hosts

D

zoning is focused on the access relationship between SVC nodes and the physical storagearrays


参考解析

解析: 暂无解析

相关考题:

In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?() A. VIP is not required when using only agentless access for all endpoint platforms.B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

Which two statements about zoning are correct? () A. Zoning increases security.B. DNS queries are used for software zoning.C. Software zoning is more secure than hardware zoning.D. When using zones and VSANs together, the zone is created first.E. Zoning requires that VSANs be established before it becomes operational.

Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()A、Clients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.B、Multiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.C、Clients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.D、Each controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()A、clients connected to the rogue access point must be able to connect to the containment controller-based access point.B、multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.C、clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.D、each controller-based access point can handle only a limited amount of clients connected to the rogue access points.

Moving data is one of the most common causes of planned downtime. For which of the followingpurposes might the data migration function of the SAN Volume Controller be used?()A、when replacing an SVC node due to a failureB、when migrating from a Windows OS to a Linux OSC、when replacing older storage with newer storageD、when performing a firmware upgrade on the SVC console

Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()A、Multiple controller-based access points will load-balance the containment task using fewer resources than a single access point.B、Clients connected to the rogue access point may be out of the range of the controller-based access point providing containment.C、Each controller-based access point can handle only a limited amount of clients connected to the rogue access points.D、Clients connected to the rogue access point must be able to connect to the containment controller-based access point.

Which two statements about zoning are correct? ()A、Zoning increases security.B、DNS queries are used for software zoning.C、Software zoning is more secure than hardware zoning.D、When using zones and VSANs together, the zone is created first.E、Zoning requires that VSANs be established before it becomes operational.

Which of the following is the MOST important concern when deciding on the servers locations?()A、Form factorB、Inadequate air flowC、Too high from ground levelD、Difficulty of physical access

Which of the following is most accurate in describing the required types of FCP zoningconsiderations when implementing a SAN Volume Controller (SVC)?()A、zoning is typically limited to controlling access to physical storageB、zoning is focused on access control between SVC nodes and host systemsC、zoning is focused on access to physical storage arrays, SVC clusters, and hostsD、zoning is focused on the access relationship between SVC nodes and the physical storagearrays

Which of the following explains the relationship between a physical and logical partition?()A、A physical partition is hosted on one or more logical partitions. A logical partition is used when describing storage.B、A logical partition is hosted on one or more physical partitions. A physical partition is used when describing storage.C、A physical partition is used when describing only a SCSI or SAS disk. A logical partition is used when describing a SAN LUN.D、A logical partition is used when describing only a SATA or SAS disk. A physical partition is used when describing RAID or mirrored arrays.

When defining resources for a concurrent resource group, which of the following is NOT  supported?()   A、 Application Servers using diskB、 Definition of Multiple IP aliasesC、 Volume Groups using raw logical volumesD、 Volume Groups supporting concurrent access

The following are new enhancements announced with SAN Volume Controller Version 6 EXCEPT()A、 Easy Tier B、 SVC for XIV C、 deduplication D、 completely redesigned user interface

Which of the following hardware components is necessary for a server to access data directly on afiber channel based SAN?()A、Gigabit NICB、RAID controller cardC、SATA controller cardD、Host bus adapter

单选题Which of the following is the MOST important concern when deciding on the servers locations?()AForm factorBInadequate air flowCToo high from ground levelDDifficulty of physical access

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题Which of the following is the MOST important factor when considering environmental factors?()AServer room access should be limited to authorized personnel.BServers should be kept in a warm and dark environment.CRemove the floppy drives from the system.DThe server administrator should ensure adequate levels of cooling.

单选题The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()AThe SAN is offlineBFiber channel switchCMultiple failed drives in the SANDHBA

单选题The following are new enhancements announced with SAN Volume Controller Version 6 EXCEPT()A Easy Tier B SVC for XIV C deduplication D completely redesigned user interface

单选题Which of the following statements explains why it is normally best to have more than onecontroller-based access point participate in the containment of one rogue access point?()AClients connected to the rogue access point must be able to connect to the containmentcontroller-based access point.BMultiple controller-based access points will load-balance the containment task using fewerresourcesthan a single access point.CClients connected to the rogue access point may be out of the range of the controller-basedaccess point providing containment.DEach controller-based access point can handle only a limited amount of clients connected tothe rogue access points.

单选题Which of the following explains the relationship between a physical and logical partition?()AA physical partition is hosted on one or more logical partitions. A logical partition is used when describing storage.BA logical partition is hosted on one or more physical partitions. A physical partition is used when describing storage.CA physical partition is used when describing only a SCSI or SAS disk. A logical partition is used when describing a SAN LUN.DA logical partition is used when describing only a SATA or SAS disk. A physical partition is used when describing RAID or mirrored arrays.

单选题If it is properly deployed, a controller-based access point is capable of monitoring all vlans on a network when you select which of the following modes from the ap mode drop-down menu on the controller?()AmirrorBrogue detectorCsnifferDmonitor

单选题When defining resources for a concurrent resource group, which of the following is NOT  supported?()A Application Servers using diskB Definition of Multiple IP aliasesC Volume Groups using raw logical volumesD Volume Groups supporting concurrent access

单选题Which of the following statements explains why it is normally best to have more than one controller-basedaccess point participate in the containment of one rogue access point?()AMultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.BClients connected to the rogue access point may be out of the range of the controller-based access point providing containment.CEach controller-based access point can handle only a limited amount of clients connected to the rogue access points.DClients connected to the rogue access point must be able to connect to the containment controller-based access point.

单选题Which of the following hardware components is necessary for a server to access data directly on afiber channel based SAN?()AGigabit NICBRAID controller cardCSATA controller cardDHost bus adapter

单选题Which of the following is most accurate in describing the required types of FCP zoningconsiderations when implementing a SAN Volume Controller (SVC)?()Azoning is typically limited to controlling access to physical storageBzoning is focused on access control between SVC nodes and host systemsCzoning is focused on access to physical storage arrays, SVC clusters, and hostsDzoning is focused on the access relationship between SVC nodes and the physical storagearrays

单选题Moving data is one of the most common causes of planned downtime. For which of the followingpurposes might the data migration function of the SAN Volume Controller be used?()Awhen replacing an SVC node due to a failureBwhen migrating from a Windows OS to a Linux OSCwhen replacing older storage with newer storageDwhen performing a firmware upgrade on the SVC console

单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()AVIP is not required when using only agentless access for all endpoint platforms.BVIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.CVIP is not required when using Junos Pulse and agentless access for all endpoint platforms.DVIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

单选题If it is properly deployed, a controller-based access point is capable of monitoring all VLANs on anetwork when you select which of the following modes from the AP Mode drop-down menu onthe controller?()AMonitorBRogue DetectorCSnifferDMirror