Wednesday 26 June 2013

E10-001 Question 30

E10-001 Question 30
What is a security implementation in NAS environments?


A. Kerberos
B. Port binding
C. S_ID Lockdown
D. FC-SP
 

Answer: A

E10-001 Question 29

E10-001 Question 29
In the Fibre Channel protocol, what are functions of the FC-1 layer?

A. Encoding and decoding
B. Routing and flow control
C. Interface mapping and flow control
D. Transmission of raw bits and encoding
 

Answer: A

E10-001 Question 28

E10-001 Question 28
What is a purpose for distributing Switch Registered State Change Notifications (SW-RSCNs) in a fabric?

A. Updates the name server on all switches in the fabric
B. Stops or slows down transmissions from other switches in the fabric
C. Distributes configuration values and congestion notifications across the fabric
D. Exchanges requests for change notifications among distributed management servers
 

Answer: A

E10-001 Question 27

E10-001 Question 27
Which cloud computing characteristic enables consumers to request resources using a service catalog through a web-based user interface?

A. On-demand self-service
B. Broad network access
C. Metered services
D. Catalog management
 

Answer: A

E10-001 Question 26

E10-001 Question 26
What are the three elements of the risk triad from an information security perspective?

A. Assets, threats, and vulnerabilities
B. Actions, threats, and vulnerabilities
C. Assets, threats, and countermeasures
D. Assets, countermeasures, and vulnerabilities
 

Answer: A

E10-001 Question 25

E10-001 Question 25
Which process minimizes the exposure to a loss of uncommitted cached data when there is a power failure?

A. Cache vaulting
B. Cache mirroring
C. Low watermarking
D. Prefetching
 

Answer: A

E10-001 Question 24

E10-001 Question 24
What is prevented using RAID technology?

A. Data loss
B. Host Bus Adapter failures
C. Security breach
D. Switch failure
 

Answer: A