网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which protocol would provide block access to remote storage over WAN links?()
A
iSCSI
B
FCIP
C
SCSI-FP
D
eSCSI
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which protocol would provide block access to remote storage over WAN links?()A iSCSIB FCIPC SCSI-FPD eSCSI” 相关考题
考题
A route-based VPN is required for which scenario? ()
A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
考题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device
考题
Which two statements about FCIP and iSCSI are correct?()A、 The FCIP stack supports file-level storage for remote devices.B、 Both require high throughput with low latency and low jitter.C、 The purpose of FCIP is to provide connectivity between host and storage.D、 The iSCSI stack supports block-level storage for remote devices.E、 The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
考题
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()A、Remote DebuggingB、System SnapshotC、User Access logsD、Policy Tracing
考题
Which protocol would provide block access to remote storage over WAN links?()A、 iSCSIB、 FCIPC、 SCSI-FPD、 eSCSI
考题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device
考题
A technician needs to configure a computer with an external storage drive. Which of the following interfaces would provide the FASTEST throughput?()A、USB 2.0B、eSATAC、CAT5D、FireWire
考题
Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS
考题
During a planning session, the customer indicates the need to provide high availability between a Node attached to an IBM TotalStorage Enterprise Storage Server and a remote node attached to a IBM TotalStorage FAStT server with automatic fallover in the event of a disaster. Which of the following HACMP options will provide this functionality?() A、 GeoRMB、 HACMP/XD://PPRCC、 HACMP/XD://GPFSD、 HACMP/XD://HAGEO
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service and the Microsoft Application Virtualization (App - V) 4.6 client on a server that runs Windows Server 200 8 R2. You publish applications to the RD Session Host server by using App - V. Partner companies require access to an internal application. You provide each partner company with a preconfigured Remote Desktop Protocol (.rdp) file that enables the company to access the application by using the Connect From Anywhere feature. You need to specify the protocol that each partner company must allow through its firewall to establish the connection. Which protocol should you specify?()A、RDPB、HTTPSC、RTSPD、RTSPS
考题
You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A、MS-CHAP v2.B、Internet Authentication service (IAS).C、Multilink Bandwidth Allocation Protocol (BAP).D、Remote access policies on all servers running Routing Remote Access.
考题
You are planning to move streaming media content to Windows Azure Storage. You need to recommend an approach for providing worldwide users the fastest possible access to the content. Which two actions should you recommend?()A、 Use a Shared Access Signature.B、 Use Windows Azure page blob storage.C、 Use Windows Azure block blob storage.D、 Use the Windows Azure Content Delivery Network (CDN).
考题
You are designing a Windows Azure application that will provide online backup storage for very large media files. The application must be capable of storing an average of 1 GB of data for each user. The application must provide random read/write access. You need to recommend a durable data storage solution. What should you recommend?()A、 Use a Windows Azure Drive.B、 Use Windows Azure page blob storage.C、 Use Windows Azure block blob storage.D、 Use local storage on a Windows Azure instance.
考题
单选题A technician needs to configure a computer with an external storage drive. Which of the following interfaces would provide the FASTEST throughput?()A
USB 2.0B
eSATAC
CAT5D
FireWire
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题A customer is currently using a Windows file server to share NFS storage (9 TB) to theirapplication server, and a small SAN to supply block I/O to their database servers (5 TB). As theircurrent hardware is aging they are looking for a new best of breed technology to combine file andblock I/O on a single storage unit. Which IBM solution would provide that capability at the lowestcost?()A
IBM XIV Storage System B
IBM System Storage DS8700 C
IBM System Storage N6070 D
IBM System Storage N6210
考题
多选题Which two statements about FCIP and iSCSI are correct?()AThe FCIP stack supports file-level storage for remote devices.BBoth require high throughput with low latency and low jitter.CThe purpose of FCIP is to provide connectivity between host and storage.DThe iSCSI stack supports block-level storage for remote devices.EThe purpose of iSCSI is to provide connectivity between separate wide-area SANs.
考题
单选题You are designing a Windows Azure application that will provide online backup storage for very large media files. The application must be capable of storing an average of 1 GB of data for each user. The application must provide random read/write access. You need to recommend a durable data storage solution. What should you recommend?()A
Use a Windows Azure Drive.B
Use Windows Azure page blob storage.C
Use Windows Azure block blob storage.D
Use local storage on a Windows Azure instance.
考题
单选题A route-based VPN is required for which scenario? ()A
when the remote VPN peer is behind a NAT deviceB
when multiple networks need to be reached across the tunnelC
when the remote VPN peer is a dialup or remote access clientD
when a dynamic routing protocol such as OSPF is required across the VPN
考题
单选题A policy-based IPsec VPN is ideal for which scenario?()A
when you want to conserve tunnel resourcesB
when the remote peer is a dialup or remote access clientC
when you want to configure a tunnel policy with an action of denyD
when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
单选题You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()A
table B
transactional trigger C
stored procedure D
FROM clause query
考题
多选题You are designing a plan for migrating Virtual Hard Disks (VHDs) and video files to Windows Azure Storage. The VHDs must be optimized for random read/write operation. The video files must be optimized for sequential access. You need to recommend storage types for storing the VHDs and video files. Which two storage types should you recommend?()AStore VHDs in Windows Azure page blob storage.BStore VHDs in Windows Azure block blob storage.CStore video files in Windows Azure page blob storage.DStore video files in Windows Azure block blob storage
考题
单选题Which of the following options would you choose to implement controlled access using remote authentication for your networks?()A
OiDB
RADIUSC
Wallet ManagerD
Oracle Names Server
考题
单选题You are designing a remote access strategy to meet the business technical requirements. Which authentication mechanism should you use?()A
MS-CHAP v2.B
Internet Authentication service (IAS).C
Multilink Bandwidth Allocation Protocol (BAP).D
Remote access policies on all servers running Routing Remote Access.
考题
单选题A customer has a requirement for a storage solution that meets the following criteria: (1)Heterogeneous hosts attached (2)Support for block I/O (3)High Speed (4)Scalable Which solution would satisfy the customer’s requirement?()A
SANB
NASC
SCSID
iSCSI
热门标签
最新试卷