單項(xiàng)選擇題Which protocol would provide block access to remote storage over WAN links?()

A. iSCSI
B. FCIP
C. SCSI-FP
D. eSCSI


您可能感興趣的試卷

你可能感興趣的試題

4.多項(xiàng)選擇題Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()

A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.

5.多項(xiàng)選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network

最新試題

Which two statements about Cisco Security Management Suite are correct? ()

題型:多項(xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項(xiàng)選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()

題型:多項(xiàng)選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項(xiàng)選擇題