DRAG DROP
Match the types of attack with their respective description.
Select and Place:
What accurately describes an iSCSI HBA?
A. Performs both iSCSI and TCP/IP processing
B. Requires CPU cycles for TCP/IP processing
C. Requires a software adapter with built-in functionality
D. Enables transmission of data through iSCSI tunneling
Based on the exhibit, what does the "X", "Y", and "Z" represent in a NAS environment?
A. X = FC SAN, Y = IP Network, and Z = NAS Gateway
B. X = IP Network, Y = FC SAN, and Z = NAS Gateway
C. X = FC SAN, Y = NAS Gateway, and Z= IP Network
D. X = IP Network, Y = NAS Gateway, and Z = FC SAN
Which functionality does a Control layer provide in a software-defined networking architecture?
A. Defining the network behavior through various policies.
B. Making decisions on how the packets should be forwarded.
C. Establishing communications between the Infrastructure and Interface layers.
D. Forwarding data packets based on the requirements from the Application layer.
Which technology is used in the media and entertainment industry to enable content-based search activity and to create video subtitles using natural language processing?
A. Machine learning
B. Social networking
C. Cloud computing
D. Internet of Things
When implementing a full mesh topology in a Fibre Channel (FC) SAN environment, what is the effect when there is an increase in the number of switches?
A. Reduces the available node ports for ISL connectivity.
B. Increases the load on the ISLs due to traffic aggregation.
C. Increases the hop count for compute to storage traffic.
D. Reduces the available switch ports for node connectivity.
A company is planning to perform a cloud-based backup. They want to send their data over a public network to a cloud backup device. Which security control mechanism helps to protect the data from an attacker?
A. Multi-factor authentication
B. Demilitarized zone
C. Data shredding
D. Encryption
Which state change notifications (SCNs) are issued by an iSNS server to the registered devices?
A. CPU events
B. Output events
C. Input events
D. Network events
In a RAID 6 array with four disks, what is the total usable data storage capacity on the array if the disk size is 200 GB?
A. 200 GB
B. 400 GB
C. 600 GB
D. 800 GB
What is the primary advantage of RAID 6 compared to RAID 5?
A. High available storage capacity
B. Low write penalty
C. High resiliency
D. Low rebuild time for data