E10-001 Question 30
What is a security implementation in NAS environments?
A. Kerberos
B. Port binding
C. S_ID Lockdown
D. FC-SP
Answer: A
download E10-001 questions
Wednesday, 26 June 2013
E10-001 Question 29
E10-001 Question 29
In the Fibre Channel protocol, what are functions of the FC-1 layer?
A. Encoding and decoding
B. Routing and flow control
C. Interface mapping and flow control
D. Transmission of raw bits and encoding
Answer: A
In the Fibre Channel protocol, what are functions of the FC-1 layer?
A. Encoding and decoding
B. Routing and flow control
C. Interface mapping and flow control
D. Transmission of raw bits and encoding
Answer: A
E10-001 Question 28
E10-001 Question 28
What is a purpose for distributing Switch Registered State Change Notifications (SW-RSCNs) in a fabric?
A. Updates the name server on all switches in the fabric
B. Stops or slows down transmissions from other switches in the fabric
C. Distributes configuration values and congestion notifications across the fabric
D. Exchanges requests for change notifications among distributed management servers
Answer: A
What is a purpose for distributing Switch Registered State Change Notifications (SW-RSCNs) in a fabric?
A. Updates the name server on all switches in the fabric
B. Stops or slows down transmissions from other switches in the fabric
C. Distributes configuration values and congestion notifications across the fabric
D. Exchanges requests for change notifications among distributed management servers
Answer: A
E10-001 Question 27
E10-001 Question 27
Which cloud computing characteristic enables consumers to request resources using a service catalog through a web-based user interface?
A. On-demand self-service
B. Broad network access
C. Metered services
D. Catalog management
Answer: A
Which cloud computing characteristic enables consumers to request resources using a service catalog through a web-based user interface?
A. On-demand self-service
B. Broad network access
C. Metered services
D. Catalog management
Answer: A
E10-001 Question 26
E10-001 Question 26
What are the three elements of the risk triad from an information security perspective?
A. Assets, threats, and vulnerabilities
B. Actions, threats, and vulnerabilities
C. Assets, threats, and countermeasures
D. Assets, countermeasures, and vulnerabilities
Answer: A
What are the three elements of the risk triad from an information security perspective?
A. Assets, threats, and vulnerabilities
B. Actions, threats, and vulnerabilities
C. Assets, threats, and countermeasures
D. Assets, countermeasures, and vulnerabilities
Answer: A
E10-001 Question 25
E10-001 Question 25
Which process minimizes the exposure to a loss of uncommitted cached data when there is a power failure?
A. Cache vaulting
B. Cache mirroring
C. Low watermarking
D. Prefetching
Answer: A
Which process minimizes the exposure to a loss of uncommitted cached data when there is a power failure?
A. Cache vaulting
B. Cache mirroring
C. Low watermarking
D. Prefetching
Answer: A
E10-001 Question 24
E10-001 Question 24
What is prevented using RAID technology?
A. Data loss
B. Host Bus Adapter failures
C. Security breach
D. Switch failure
Answer: A
What is prevented using RAID technology?
A. Data loss
B. Host Bus Adapter failures
C. Security breach
D. Switch failure
Answer: A
Subscribe to:
Posts (Atom)