ISM Steps

What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Write I/O is transmitted to the cache of the target storage
Write I/O is received from the production compute system into cache of the source and placed in the queue
Receipt acknowledgment is provided by the source storage back to the production compute system
Target sends an acknowledgment back to the source
Match the types of attack with their respective description.
Sends a spoofing email containing a link(s) to a fraudulent website
Installs a rogue hypervisor that takes control of a compute system
Prevents legitimate users from accessing resources or services
Eavesdrops on the network to capture credentials
What is the correct sequence of steps to authenticate an initiator and a target using one-way Challenge Handshake Authentication Protocol (CHAP) after the initiator performs a login to the target?
Initiator takes the shared secret and calculates the value using a one-way hash function and returns a hash value to the target
Authentication is acknowledgment and access is granted if the hash value matches
Target sends a CHAP challenge to the initiator
Target computes the expected hash value from the shared secret nd compares the value received from the initiator
Match the virtual machine (VM) file with its description.
Keeps a record of the VM's activity and is used in troubleshooting
Stores information such as VM name, BIOS information, guest OS type, and memory size
Stores the VM settings and the virtual disk of a VM
Stores the contents of the VM's disk drive
In a recovery operation, what is the correct sequence of steps after the backup client sends a restore request to the backup server?
Storage node sends the restored metadata to the backup server
Data is read and then sent to the backup client
Backup server scans the backup catalog to identify the data to be restored and the client that will receive the data
Backup server updates the backup catalog
Backup server instructs the storage node to load the backup media in the backup device
If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?
Client requests an access token by authenticating with the authorization server and presents the authorization grant
Client requests the protected resource from the resource server and authenticates by presenting the access token
Client receives an authorization grant used by the client to obtain an access token
Resource server validates the access token and, if valid, serves the request
Authorization server authenticates the client and validates the authorization grant
In a backup operation, what are the correct sequence of steps after the backup server initiates the scheduled backup process?
Storage node sends data to the backup device
Backup server instructs the storage node to load the backup media in the backup device
Backup server updates the backup catalog
Backup clients send the data to the storage node and updates the backup atalog on the backup server
Storage node sends metadata and media information to the backup server
To authenticate a user using OpenID authentication control, what are the correct sequence of steps?
User provides consent to profile sharing
User sends a login requests using OpenID
Authentication response is redirected to the organization providing the services
Authentication request is redirected to an OpenID provider
Match the functionality of a security goal with its description.
Authorization
Authentication
Accountability
Auditing
Match the Fibre Channel (FC) layers with their respective functions.
Routing
Mapping Interface
Encode/Decore
Common Services
Match the characteristics of big data with their respective descriptions.
Variety
Variability
Veracity
Velocity
Match the software-defined storage (SDS) attributes with their respective description.
Unified management
Storage abstraction
Open and extensible
Automated storage provisioning
Match the object-based storage device (OSD) features with their descriptions.
Flexible data access method
Metadata-driven policy
Data protection
Global namespace
Match the Fibre Channel (FC) layers with their respective features.
FC-0
FC-1
FC-2
FC-4
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Write I/O is transmitted to the cache of the target storage
Write I/O is received from the production compute system into cache of the source and placed in the queue
Source storage system sends an acknowledgment back to the production compute system
Acknowledgment receipts is provided by the target storage back to the cache of the source
{"name":"ISM Steps", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?, Write I\/O is transmitted to the cache of the target storage","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.