Which of the following storage technologies is file-based?
A. WAN
B. DAS
C. SAN
D. NAS
Students in a virtual lab must be able to upload and download homework assignments from personal external storage devices to their virtual desktops. Which of the following should the lab administrator implement to allow students to upload files?
A. Resource pooling
B. Secure FTP
C. Storage quotas
D. Port mapping
A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?
A. Replication consistency
B. Penetration test
C. Bandwidth assessment
D. Application delivery
A storage administrator has 100 terabytes of physical storage space within the SAN. Which of the following is used to enable access to the storage space?
A. Drive mirroring
B. LUN creation
C. Drive striping
D. RAID configuration
Which of the following will provide the MOST network address information possible for a system that belongs to a tenant in a private cloud?
A. ipconfig
B. telnet
C. traceroute
D. nslookup
Which of the following cloud models would be used when implementing a company's email system in the cloud?
A. PaaS
B. IaaS
C. SaaS
D. XaaS
Elasticity is closely related to which of the following cloud characteristics?
A. On-demand
B. Pay-as-you-grow
C. Chargeback
D. On-premise hosting
An administrator is responsible for maintenance and support of servers in the cloud environment. There are over 500 virtual servers spanning across ten physical hosts. The administrator deploys a new application server. The administrator allocated the appropriate virtual resources for the application. Users report slow response after the new server was deployed. Which of the following is the cause of this issue?
A. Storage allocation on the guest OS
B. Resource pooling mis-configuration
C. Application licensing expiration
D. Data segregation on the host OS
Which of the following may be used to provide certificate management within an organization?
A. SSH
B. IPSec
C. Kerberos
D. PKI
Which of the following BEST describes the process of mapping storage initiators to targets?
A. Access control lists
B. Zoning
C. LUN masking
D. Obfuscation
Which of the following services can an administrator disable to prevent remote access to a system?
A. SMTP
B. DHCP
C. SMS
D. Telnet
A storage administrator has just partitioned storage to several of the servers. Another layer of security has been added to the storage access to complement the fabric zoning. Which of the following layers of security did the administrator implement on the storage array?
A. Disk encryption
B. CHAP authentication
C. LUN masking
D. End-to-end encryption
A new network engineer logs into a router and discovers multiple and separate routing tables configured. This router MOST likely has which of the following items configured?
A. Supernetting
B. VPN
C. RIP
D. VLAN
An administrator has provisioned a LUN on a SAN and wants to be able to connect a VM to the new storage using SCSI commands sent across the LAN. Which of the following should be configured on the VM?
A. Virtual NIC
B. Virtual HBA
C. Virtual SAN
D. LUN masking
An administrator is planning to implement multipathing for iSCSI-connected storage. Which of the following is required for this configuration?
A. Multiple gateways configured on the subnet
B. At least one HBA on the server
C. Multiple HBAs on the server
D. Multiple IP addresses on the storage device