單項選擇題Which protocol would provide block access to remote storage over WAN links?()

A.iSCSI
B.FCIP
C.SCSI-FP
D.eSCSI


您可能感興趣的試卷

你可能感興趣的試題

3.單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers


4.多項選擇題Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()

A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.

5.多項選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network