Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Which of the following storage provisioning methods is implemented at the hardware level of a SAN and can be completed in either a soft or hard basis?
a) LUN masking |
c) Zoning |
|
For which of the following protocols will an administrator configure a trap to collect system state data?
a) SNMP |
a) SNMP |
|
Which of the following commands provides measurements of round-trip network latency?
a) ping |
a) ping |
|
Compared to Type II hypervisors, Type I hypervisors generally have lower:
a) numbers of VMs per host |
b) requirements for host overhead |
|
Which of the following methods can an Administrator use to force an array to allow data to be distributed one node at a time in a private cloud implementation?
a) Least connections |
d) Round robin
|
|
Which of the following should an administrator use when marking VLAN traffic?
a) Virtual Local Area Network tagging |
a) Virtual Local Area Network tagging |
|
Which of the following will allow an administrator to quickly revert a VM back to a previous state?
a) Metadata |
b) Snapshots |
|
Which of the following is the meaning of IaaS?
a) IT as a Service |
c) Infrastructure as a Service |
|
Which of the following is the meaning of Paas?
a) Ping as a Service |
d) Platform as a Service
|
|
Which of the following is the meaning of SaaS?
a) Solutions as a Service |
b) Software as a Service |
|
A community name is used by:
a) WMI |
c) SNMP |
|
Which of the following high availability solutions would a cloud service provider use when deploying Software as a Service?
a) Virtual switches |
d) Clustering servers
|
|
Which of the following hypervisor types requires the least overhead?
a) Type II |
c) Type I |
|
In a RAID 6 environment a technician is trying to calculate how many read operations would be made. How many read operations would be required in RAID 6?
a) One |
d) Three
|
|
Which of the following allows authentication based on something you are? (Select TWO)
a) Passwords |
c) Retina scan |