ISM Steps
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Write I/O is transmitted to the cache of the target storage | |
Write I/O is received from the production compute system into cache of the source and placed in the queue | |
Receipt acknowledgment is provided by the source storage back to the production compute system | |
Target sends an acknowledgment back to the source |
Match the types of attack with their respective description.
Sends a spoofing email containing a link(s) to a fraudulent website | |
Installs a rogue hypervisor that takes control of a compute system | |
Prevents legitimate users from accessing resources or services | |
Eavesdrops on the network to capture credentials |
What is the correct sequence of steps to authenticate an initiator and a target using one-way Challenge Handshake Authentication Protocol (CHAP) after the initiator performs a login to the target?
Initiator takes the shared secret and calculates the value using a one-way hash fun | |
Authentication is acknowledgment and access is granted if the hash value matches | |
Target sends a CHAP challenge to the initiator | |
Target computes the expected hash value from the shared secret nd compares the value received from the initiator |
Match the virtual machine (VM) file with its description.
Keeps a record of the VM's activity and is used in troubleshooting | |
Stores information such as VM name, BIOS information, guest OS type, and memory size | |
Stores the VM settings and the virtual disk of a VM | |
Stores the contents of the VM's disk drive |
In a recovery operation, what is the correct sequence of steps after the backup client sends a restore request to the backup server?
Storage node sends the restored metadata to the backup server | |
Data is read and then sent to the backup client | |
Backup server scans the backup catalog to identify the data to be restored and the client that will receive the data | |
Backup server updates the backup catalog | |
Backup server instructs the storage node to load the backup media in the backup device |
If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?
Client requests an access token by authenticating with the authorization server and presents the authorization grant | |
Client requests the protected resource from the resource server and authenticates by presenting the access token | |
Client receives an authorization grant used by the client to obtain an access token | |
Resource server validates the access token and, if valid, serves the request | |
Authorization server authenticates the client and validates the authorization grant |
In a backup operation, what are the correct sequence of steps after the backup server initiates the scheduled backup process?
Storage node sends data to the backup device | |
Backup server instructs the storage node to load the backup media in the backup device | |
Backup server updates the backup catalog | |
Backup clients send the data to the storage node and updates the backup atalog on the backup server | |
Storage node sends metadata and media information to the backup server |
To authenticate a user using OpenID authentication control, what are the correct sequence of steps?
User provides consent to profile sharing | |
User sends a login requests using OpenID | |
Authentication response is redirected to the organization providing the services | |
Authentication request is redirected to an OpenID provider |
Match the functionality of a security goal with its description.
Authorization | |
Authentication | |
Accountability | |
Auditing |
Match the Fibre Channel (FC) layers with their respective functions.
Routing | |
Mapping Interface | |
Encode/Decore | |
Common Services |
Match the characteristics of big data with their respective descriptions.
Variety | |
Variability | |
Veracity | |
Velocity |
Match the software-defined storage (SDS) attributes with their respective description.
Unified management | |
Storage abstraction | |
Open and extensible | |
Automated storage provisioning |
Match the object-based storage device (OSD) features with their descriptions.
Flexible data access method | |
Metadata-driven policy | |
Data protection | |
Global namespace |
What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?
Write I/O is transmitted to the cache of the target storage | |
Write I/O is received from the production compute system into cache of the source and placed in the queue | |
Source storage system sends an acknowledgment back to the production compute system | |
Acknowledgment receipts is provided by the target storage back to the cache of the source |
{"name":"ISM Steps", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the correct sequence of steps that need to be performed in storage system-based synchronous remote replication?, Write I\/O is transmitted to the cache of the target storage","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Surveys
Make your own Survey
- it's free to start.
- it's free to start.