You want to manage systems and devices on a network with traps that signal the occurrence of an event
In this scenario, which protocol would you use?
TLS
CDMI
SMTP
SNMP
Software Defined Storage (SDS) uses which type of technology to function?
Application
replication
virtualization
authentication
Which storage technology uses optics for connectivity?
LTO tape
SAS
SATA
Fibre Channel
iSCSI
What should a valid iSCSI qualified name include?
the iSCSI string
date code, in yyyy-mm format
the WWN string
initials of company name
What are two characteristics of Challenge-Handshake Authentication Protocol (CHAP)? (Choose two.)
CHAP uses a hash mechanism so the clear text authentication piece is never sent.
B. CHAP uses a parity algorithm to jumble the credentials for security.
C. CHAP uses a Point-to-Point Protocol (PPP) method.
CHAP is required for iSCSI initiator authentication
At which point in the communication chain is multi-pathing initiated?
the operating system device driver level
the switch level
the storage array level
the physical cable interface level