A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()A、The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B、There are too many users attempting to access the iSCSI presented disk.C、The other network traffic is causing packet delays in the iSCSI network.D、The SAN is nearing capacity and should be expanded

A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()

  • A、The server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.
  • B、There are too many users attempting to access the iSCSI presented disk.
  • C、The other network traffic is causing packet delays in the iSCSI network.
  • D、The SAN is nearing capacity and should be expanded

相关考题:

前S抗原(PreS1,PreS2)检测

Which of the following is a feature of a unit of work?() A.It applies to a single data server.B.It is a recoverable sequence of operations.C.Its value can be queried from the system catalog tables.D.It begins when the application connects to the data server.

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

A server connects to iSCSI presented SAN storage array through a dedicated NIC;however,the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance.  Which of the following is MOST likely the cause? ()A、 The servers power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B、 There are too many users attempting to access the iSCSI presented disk.C、 The other network traffic is causing packet delays in the iSCSI network.D、 The SAN is nearing capacity and should be expanded.

The TS7650G is a data deduplication server for open systems servers attached to storageenvironments over a().A、SAS connection B、SCSI connection C、iSCSI connection D、Fibre Channel (FC) connection

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.

Which of the following expansion cards should be installed into a server to provide iSCSI SAN connectivity? ()A、 HBAB、 PBXC、 VoIPD、 NIC

在SuSElinux 10 操作系统中,启动open-iscsi的方法有()A、open-iscsi startB、service open-iscsi startC、/etc/init.d/open-iscsi startD、start open-iscsi

An administrator is up grading the back up server from a single tape drive to a SCSI tape library. The library has been unpackaged, mounted, and the library drivers installed.  Which of the following items should the administrator have to connect the device to the backup server?()A、 SCSI cableB、 SCSI interface adapter on the tape libraryC、 SCSI termination card on the serverD、 iSCSI cable

Which of the following storage solutions attaches to a server either through a fiber channel connection or is presented to the server via iSCSI?()A、DASB、NASC、SAND、WORM

A BladeCenter H customer is asking for concurrent Keyboard/Video/Mouse. Select the items required to accomplish this. ()A、Advanced Management Module and cKVM Daughter CardB、HS21, LS21 or JS22 Blade Server and iSCSI Expansion CardC、Redundant Fibre Channel Switch Module and cKVM Daughter CardD、Advanced Management Module and iSCSI Expansion Card

A customer wants to boot from an iSCSI SAN with their IBM BladeCenter infrastructure running Microsoft Windows Server 2000.  What is required for the customer to be able to perform this?()A、Fibre Channel Expansion Card for each Blade ServerB、cKVM Card for each Blade ServerC、iSCSI Expansion Card for each Blade ServerD、4Gb Modular Flash Drive

Which of the following is a feature of a unit of work?()A、It applies to a single data server.B、It is a recoverable sequence of operations.C、Its value can be queried from the system catalog tables.D、It begins when the application connects to the data server.

You are designing a Hyper-V solution. You plan to virtualize an application server. The application server requires failover clustering that uses shared storage. You need to choose the correct storage solution. What should you choose?()A、two child partitions with VHDs stored on an iSCSI SANB、two child partitions with volumes mounted from an iSCSI SANC、two host servers with iSCSI-attached storage enabled for Cluster Shared Volumes (CSVs)D、two host servers with Fibre ChannelCattached storage enabled for Cluster Shared Volumes (CSVs)

Cer-tech .com hosts a single Active Directory domain. All servers have Windows Server 2008. You areinstructed to install an iSCSI storage area network (SAN) for a group of file servers. Corporate securitypolicy requires that all data communication to and from iSCSI SAN must be very secure. You are assignedthe task to implement the highest security available for communications to and from the iSCSI SAN. Whatshould you do to achieve this task?()A、Create a Group Policy Object (GPO) to enable System objectsB、Create a Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in iSCSIInitiator Properties.C、Open iSCSI Initiator Properties and implement IPSec security. Set up inbound and outbound rules byusing Windows FirewallD、Open iSCSI Initiator Properties and implement Secure Mode transition. Set outbound and inbound rulesby using Windows Defender

You have a two-node Hyper-V failover cluster that uses SAN storage. You are designing storage for a new virtualization environment by using Windows Server 2008 R2.  You plan to deploy five virtual machines (VMs) per logical unit number (LUN). You need to be able to perform a live migration of a single VM while the other VMs continue to run on the host server.  What should you do?()A、Use Cluster Shared Volumes (CSVs)B、Use fixed disks on the SAN storageC、Boot the virtual machines from iSCSI LUNsD、Use dynamically expanding disks on an iSCSI LUN

单选题A server connects to iSCSI presented SAN storage array through a dedicated NIC;however,the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance.  Which of the following is MOST likely the cause? ()A The servers power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.B There are too many users attempting to access the iSCSI presented disk.C The other network traffic is causing packet delays in the iSCSI network.D The SAN is nearing capacity and should be expanded.

多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

问答题前S抗原(PreS1,PreS2)检测

多选题You install Windows Server 2008 R2 (Server Core Installation) on a server. The server will store virtual machines (VMs) on a volume that is attached to the server by means of an iSCSI connection. You need to configure the server so that VMs can be stored on the iSCSI volume.  Which two commands should you run?()Aiscsicli listTargetBiscsicli qaddTargetCiscsicli qloginTargetDiscsicli AddConnection

多选题在SuSElinux 10 操作系统中,启动open-iscsi的方法有()Aopen-iscsi startBservice open-iscsi startC/etc/init.d/open-iscsi startDstart open-iscsi

单选题Which of the following is a feature of a unit of work?()AIt applies to a single data server.BIt is a recoverable sequence of operations.CIts value can be queried from the system catalog tables.DIt begins when the application connects to the data server.

单选题Your company has a main office and one branch office. Your network consists of an Active Directory domain. You have a remote access server in the main office named Server1. You have a remote access server in the branch office named Server2. Server2 has a demand-dial interface that connects to Server1. The demand-dial interface connects by using a domain account named Ras1. You need to prevent Server2 from establishing new demand-dial connections to the main office between 18:00 and 08:00.  What should you do?()AModify the dial-in properties of the Ras1 account.BModify the dial-out hours on the demand-dial interface.CModify the IP demand-dial filters on the demand-dial interface.DEnable Bandwidth Allocation Protocol (BAP) on Server2.

单选题Which of the following expansion cards should be installed into a server to provide iSCSI SAN connectivity? ()A HBAB PBXC VoIPD NIC

单选题A server connects to iSCSI presented SAN storage array through a dedicated NIC; however, the SAN traffic is passed on the same switches as the Ethernet network and VoIP traffic. The size of the presented drive is 700GB. The administrator has noticed a decrease in storage performance. Which of the following is MOST likely the cause?()AThe server power supply is starting to fail and causing the iSCSI NIC to intermittently lose power.BThere are too many users attempting to access the iSCSI presented disk.CThe other network traffic is causing packet delays in the iSCSI network.DThe SAN is nearing capacity and should be expanded

单选题Your company has a main office and one branch office. Your network consists of an Active Directory domain. You have a remote access server in the main office named Server1. You have a remote access server in Server2 has a demand-dial interface that connects to Server1.  The demand-dial interface connects by using a domain account named Ras1. You need to prevent Server2 from establishing new demand-dial connections to the main office between 18:00 and 08:00.  What should you do?()AModify the dial-in properties of the Ras1 account.BModify the dial-out hours on the demand-dial interface.CModify the IP demand-dial filters on the demand-dial interface.DEnable Bandwidth Allocation Protocol (BAP) on Server2.

单选题Which of the following expansion cards should be installed into a server to provide iSCSI SANconnectivity?()AHBABPBXCVoIPDNIC