Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You want to manage systems and devices on a network with traps that signal the occurrence of an event

In this scenario, which protocol would you use?

A.

TLS

B.

CDMI

C.

SMTP

D.

SNMP

Full Access
Question # 5

Software Defined Storage (SDS) uses which type of technology to function?

A.

Application

B.

replication

C.

virtualization

D.

authentication

Full Access
Question # 6

Which storage technology uses optics for connectivity?

A.

LTO tape

B.

SAS

C.

SATA

D.

Fibre Channel

E.

iSCSI

Full Access
Question # 7

What should a valid iSCSI qualified name include?

A.

the iSCSI string

B.

date code, in yyyy-mm format

C.

the WWN string

D.

initials of company name

Full Access
Question # 8

What are two characteristics of Challenge-Handshake Authentication Protocol (CHAP)? (Choose two.)

A.

CHAP uses a hash mechanism so the clear text authentication piece is never sent.

B.

B. CHAP uses a parity algorithm to jumble the credentials for security.

C.

C. CHAP uses a Point-to-Point Protocol (PPP) method.

D.

CHAP is required for iSCSI initiator authentication

Full Access
Question # 9

At which point in the communication chain is multi-pathing initiated?

A.

the operating system device driver level

B.

the switch level

C.

the storage array level

D.

the physical cable interface level

Full Access