A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
您可能感興趣的試卷
你可能感興趣的試題
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. Central Gateway
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D. all ISLs contained within a single chassis
E. higher latency and throughput than a core-edge design switch
A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap
A. It operates much like TCP.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
E. N_Port to N_Port connections use logical node connection points.
最新試題
Which two statements about an interface configured with the asr-group command are correct? ()
Which two statements about FCIP and iSCSI are correct?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which path selection protocol is used by Fibre Channel fabrics?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What is the traditional mode for a firewall?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()