单选题Which protocol would provide block access to remote storage over WAN links?()AiSCSIBFCIPCSCSI-FPDeSCSI

题目
单选题
Which protocol would provide block access to remote storage over WAN links?()
A

 iSCSI

B

 FCIP

C

 SCSI-FP

D

 eSCSI


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“Which protocol would provide block access to remote storage ”相关问题
  • 第1题:

    Which protocol would provide block access to remote storage over WAN links?()

    • A、 iSCSI
    • B、 FCIP
    • C、 SCSI-FP
    • D、 eSCSI

    正确答案:A

  • 第2题:

    A technician needs to configure a computer with an external storage drive. Which of the following interfaces would provide the FASTEST throughput?()

    • A、USB 2.0
    • B、eSATA
    • C、CAT5
    • D、FireWire

    正确答案:B

  • 第3题:

    During a planning session, the customer indicates the need to provide high availability between a  Node attached to an IBM TotalStorage Enterprise Storage Server and a remote node attached to a IBM TotalStorage FAStT server with automatic fallover in the event of a disaster.  Which of the following HACMP options will provide this functionality?()  

    • A、 GeoRM
    • B、 HACMP/XD://PPRC
    • C、 HACMP/XD://GPFS
    • D、 HACMP/XD://HAGEO

    正确答案:D

  • 第4题:

    Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service and the Microsoft Application Virtualization (App - V) 4.6 client on a server that runs Windows Server 200 8 R2. You publish applications to the RD Session Host server by using App - V. Partner companies require access to an internal application. You provide each partner company with a preconfigured Remote Desktop Protocol (.rdp) file that enables the company to access the application by using the Connect From Anywhere feature. You need to specify the protocol that each partner company must allow through its firewall to establish the connection. Which protocol should you specify?()

    • A、RDP
    • B、HTTPS
    • C、RTSP
    • D、RTSPS

    正确答案:B

  • 第5题:

    You are planning to move streaming media content to Windows Azure Storage.   You need to recommend an approach for providing worldwide users the fastest possible access to the content. Which two actions should you recommend?()

    • A、 Use a Shared Access Signature.
    • B、 Use Windows Azure page blob storage.
    • C、 Use Windows Azure block blob storage.
    • D、 Use the Windows Azure Content Delivery Network (CDN).

    正确答案:C,D

  • 第6题:

    单选题
    A technician needs to configure a computer with an external storage drive. Which of the following interfaces would provide the FASTEST throughput?()
    A

    USB 2.0

    B

    eSATA

    C

    CAT5

    D

    FireWire


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    A customer is currently using a Windows file server to share NFS storage (9 TB) to theirapplication server, and a small SAN to supply block I/O to their database servers (5 TB). As theircurrent hardware is aging they are looking for a new best of breed technology to combine file andblock I/O on a single storage unit. Which IBM solution would provide that capability at the lowestcost?()
    A

     IBM XIV Storage System 

    B

     IBM System Storage DS8700 

    C

     IBM System Storage N6070 

    D

     IBM System Storage N6210


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You are designing a Windows Azure application that will provide online backup storage for very large media files.  The application must be capable of storing an average of 1 GB of data for each user. The application must provide random read/write access. You need to recommend a durable data storage solution.  What should you recommend?()
    A

     Use a Windows Azure Drive.

    B

     Use Windows Azure page blob storage.

    C

     Use Windows Azure block blob storage.

    D

     Use local storage on a Windows Azure instance.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    A route-based VPN is required for which scenario? ()
    A

    when the remote VPN peer is behind a NAT device

    B

    when multiple networks need to be reached across the tunnel

    C

    when the remote VPN peer is a dialup or remote access client

    D

    when a dynamic routing protocol such as OSPF is required across the VPN


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()
    A

    table 

    B

    transactional trigger 

    C

    stored procedure 

    D

    FROM clause query


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following options would you choose to implement controlled access using remote authentication for your networks?()
    A

    OiD

    B

    RADIUS

    C

    Wallet Manager

    D

    Oracle Names Server


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A customer has a requirement for a storage solution that meets the following criteria:       (1)Heterogeneous hosts attached       (2)Support for block I/O       (3)High Speed       (4)Scalable  Which solution would satisfy the customer’s requirement?()
    A

    SAN

    B

    NAS

    C

    SCSI

    D

    iSCSI


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

    • A、Disable TELNET
    • B、Disable IGMP snooping
    • C、Enable TELNET but not SSL
    • D、Disable ICMP/ping on device

    正确答案:A

  • 第14题:

    Which of the following protocols would BEST grant the user secure access to a remote location?()

    • A、VPN
    • B、FTP
    • C、POP3
    • D、DNS

    正确答案:A

  • 第15题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第16题:

    You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()

    • A、MS-CHAP v2.
    • B、Internet Authentication service (IAS).
    • C、Multilink & Bandwidth Allocation Protocol (BAP).
    • D、Remote access policies on all servers running Routing & Remote Access.

    正确答案:B

  • 第17题:

    You are designing a Windows Azure application that will provide online backup storage for very large media files.  The application must be capable of storing an average of 1 GB of data for each user. The application must provide random read/write access. You need to recommend a durable data storage solution.  What should you recommend?()

    • A、 Use a Windows Azure Drive.
    • B、 Use Windows Azure page blob storage.
    • C、 Use Windows Azure block blob storage.
    • D、 Use local storage on a Windows Azure instance.

    正确答案:B

  • 第18题:

    单选题
    You are designing a remote access strategy to meet the business & technical requirements.  Which authentication mechanism should you use?()
    A

     MS-CHAP v2.

    B

     Internet Authentication service (IAS).

    C

     Multilink & Bandwidth Allocation Protocol (BAP).

    D

     Remote access policies on all servers running Routing & Remote Access.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements about FCIP and iSCSI are correct?()
    A

    The FCIP stack supports file-level storage for remote devices.

    B

    Both require high throughput with low latency and low jitter.

    C

    The purpose of FCIP is to provide connectivity between host and storage.

    D

    The iSCSI stack supports block-level storage for remote devices.

    E

    The purpose of iSCSI is to provide connectivity between separate wide-area SANs.


    正确答案: D,E
    解析: 暂无解析

  • 第20题:

    单选题
    Which protocol would provide block access to remote storage over WAN links?()
    A

     iSCSI

    B

     FCIP

    C

     SCSI-FP

    D

     eSCSI


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    A policy-based IPsec VPN is ideal for which scenario?()
    A

    when you want to conserve tunnel resources

    B

    when the remote peer is a dialup or remote access client

    C

    when you want to configure a tunnel policy with an action of deny

    D

    when a dynamic routing protocol such as OSPF must be sent across the VPN


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    You are designing a plan for migrating Virtual Hard Disks (VHDs) and video files to Windows Azure Storage.  The VHDs must be optimized for random read/write operation. The video files must be optimized for sequential access.  You need to recommend storage types for storing the VHDs and video files.   Which two storage types should you recommend?()
    A

    Store VHDs in Windows Azure page blob storage.

    B

    Store VHDs in Windows Azure block blob storage.

    C

    Store video files in Windows Azure page blob storage.

    D

    Store video files in Windows Azure block blob storage


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    单选题
    You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
    A

    MS-CHAP v2.

    B

    Internet Authentication service (IAS).

    C

    Multilink & Bandwidth Allocation Protocol (BAP).

    D

    Remote access policies on all servers running Routing & Remote Access.


    正确答案: C
    解析: 暂无解析