DRAG DROP
If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?
Select and Place:
What is an accurate statement about Governance?
A. Restrict access to certain users
B. Ensure removal of security risks
C. Authorize policy-making decisions
D. Demonstrate adherence to polices
In the event of a disk failure, which RAID level enables quick data reconstruction?
A. RAID 3
B. RAID 5
C. RAID 6
D. RAID 10
When implementing a full mesh topology in a Fibre Channel (FC) SAN environment, what is the effect when there is an increase in the number of switches?
A. Reduces the available node ports for ISL connectivity.
B. Increases the load on the ISLs due to traffic aggregation.
C. Increases the hop count for compute to storage traffic.
D. Reduces the available switch ports for node connectivity.
What is a characteristic of the Orchestration layer in a modern data center architecture?
A. Interacts directly with physical components across layers to begin provisioning tasks
B. Enables automatic updates of offerings listed in the service catalog with pre-defined workflows
C. Allows centralized, automated, and policy-driven management of heterogeneous resources
D. Enables automated arrangement, coordination, and management of resource provisioning tasks
A company has virtualized their data center and wants to deploy a recovery-in-place backup approach. What is the advantage of this type of approach?
A. Acquires backup services through a self-service portal
B. Eliminates the backup impact on the application servers
C. Reduces the recovery point objective to restore the data to any previous point-in-time using backed up VMs
D. Eliminates the need to transfer the image from the backup device to the primary storage before it is restarted
What is a benefit of using an existing IP-based network infrastructure for storage connectivity?
A. Provide a dedicated network for storage
B. Provide the ability to extend the network over long distances
C. Ensure lossless transmission of FC traffic over Ethernet
D. Ensure security by allowing only localized data movement
Which security mechanism ensures secure access to internal assets while enabling Internet-based access to selected resources?
A. Virtual local area network
B. Demilitarized zone
C. Virtual private network
D. Discovery domain
In an SDS environment, which protocol supports the resource-oriented architecture for the development of scalable and lightweight web applications while adhering to a set of constraints?
A. FTP
B. NFS
C. CIFS
D. REST
A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday. However, a failure of Port 2 occurs on a particular week as follows: Monday = 10 AM to 12 PM
Wednesday = 4 PM to 9 PM
Thursday = 4 PM to 7 PM
Friday = 3 PM to 6 PM
Saturday = 9 AM to 1 PM
What is the availability of Port 2 in that week?
A. 70%
B. 71.6%
C. 78.3%
D. 80%