Question 16

In an FC SAN environment, an administrator wants to ensure that a particular switch port cannot function as an E_Port and cannot be used to create an interswitch link. Which security mechanism should the administrator use?
  • Question 17

    A system has three components and all three components need to be operational for 24 hours; Monday through Friday. During a particular week, failure of component 1 occurred as follows:
    -Tuesday = 8 AM to 11 AM -Thursday = 8 PM to 10 PM -Friday = 5 AM to 9 AM What is the mean time between failures on component 1 for that week?
  • Question 18

    If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?

    Question 19

    A company wants to implement a Fibre Channel (FC) SAN topology. The implementation will involve deploying four switches for localized compute and storage system connectivity. In addition, to meet their applications' performance requirements, they need a maximum of one ISL and redundant connections for their compute to storage traffic.
    Which topology should be recommended?
  • Question 20

    What is an accurate statement about hypervisor-based continuous data protection (CDP)?