What is true about an OSD storage system?
A. Numerous objects can be stored in a single le system folder of OSD.
B. Objects are created based on the name and location of the le.
C. One object can be placed inside another object to save storage space.
D. Objects contain user data, related metadata, and user de ned attributes of data.
Refer to the Exhibit: Which functions align with each layer of the FC Protocol Stack using the following order: FC-4, FC-2, FC-1, and FC-0?
A. Physical Encode and decode Routing and ow control Mapping interface
B. Physical Encode and decode Common services Mapping interface
C. Mapping interface Routing and ow control Encode and decode Physical
D. Mapping interface Common services Encode and decode Physical
What is an accurate statement about data shredding?
A. A process to encrypt data
B. A process to decrypt data
C. A process to delete data
D. A process to reorganize data
What type of backup method allows a client to be installed in a VM that sends the data to the backup device?
A. Local replication
B. Image-based
C. Agent-based
D. Synchronous replication
What occurs during a Shared Technology Vulnerability threat?
A. An attacker gains access to an administrator's, user's or system account.
B. An attacker avoids applications that are already approved by an IT organization.
C. An attacker exploits the weaknesses of tools used to enable multi-tenancy.
D. An attacker exhausts network bandwidth or CPU cycles.
What is a bene t of using a Scale-Out NAS system vs. general purpose le servers?
A. For high performance and security NAS supports only NFS protocol
B. File system grows dynamically as nodes are added to the NAS cluster
C. For high performance and security NAS supports only CIFS protocol
D. NAS servers are pooled into a cluster of independent NAS nodes
Which standard provides lossless transport to an FCoE Ethernet network?
A. Data Center Bridging Capability Exchange
B. Priority-based Flow Control
C. Remote Direct Memory Access
D. Data Center Bridging
What method does FCIP use to transport Fibre Channel SAN data?
A. FCIP encapsulates and tunnels FC SAN data over Ethernet networks.
B. FCIP encapsulates and tunnels FC SAN data over IP networks.
C. FCIP splits LAN and FC SAN data and tunnels FC SAN data over Ethernet networks.
D. FCIP separates LAN and FC SAN data and tunnels FC SAN data over IP networks.
What is a bene t of implementing a big data ecosystem?
A. Applies new processing and management methods to derive better business value from unstructured data
B. Implements new technical and analytical methods to derive business value from large object data
C. Applies new processing and management methods to improve large relational database response performance
D. Implements new technical and analytical methods to derive business value from large datasets
An organization wants to prevent incidents which share common symptoms or root causes from reoccurring. They also want to minimize the adverse impact of incidents that cannot be prevented. Which management function addresses the organization's requirements?
A. Incident management
B. Security management
C. Problem management
D. Availability management