Modern Data Center Infrastructure
Storage System
Storage Networking
Backup Archive and Replication
Security and Management
100

a computing device (combination of hardware, firmware, and system software) that runs business applications

What is Compute System?

100
RAID Level that has a write penalty of 4

What is RAID Level 5?

100

A hardware adapter with built-in iSCSI functionality

What is iSCSI HBA?

100

A write is committed to the source and immediately acknowledged to the compute system

What is Asynchronous Replication?

100

________ is a social engineering attack that is used to deceive users. ________ attacks are typically carried out by spoofing email – an email with a fake but genuine-appearing address, which provides a link to a website that masquerades as a legitimate website.

Phishing

200

Delivers microservices by providing portable, isolated virtual environments
for applications to run without interference from other running applications

What is Containers?

200

A client/server protocol for file sharing that is commonly used on UNIX systems

What is Network File System (NFS)?

200

____  is a FC SAN topology where each switch is connected to every other switch.

What is Full Mesh Topology?

200

A service that enables consumers to procure backup services on-demand

What is Back up as a Service (BaaS)?

200

In Governance, Risk, and Compliance, there are three key approaches that begin with "A". Of the three, which key approach refers to the process of determining whether and in which manner, a user, device, application, or process is allowed to access only the particular service or resource

What is Authorization?

300

High-performance non-volatile storage that addresses the performance needs to support digital transformation

What is Storage Class Memory (SCM)?

300

The ________ describes the time that is taken to position the R/W heads across the platter with a radial movement. In other words, it is the time that is taken to position and settle the arm and the head over the correct track.

What is Seek Time?

300

Type of login that assigns an FC address to a node in an FC SAN environment?

What is FLOGI?
300

List the three key continuous data protection components

What is Journal Volume, CDP Appliance, Write Splitter?

300

_____ refers to the various entry points that an attacker can use to launch an attack, which includes people, process, and technology 

What is Attack Surface?

400

The physical components that connect ________ to ________ are: Host bus adapter, port, switches, and cable.

What is "compute" to "storage"?

400

A Storage system that uses a non-hierarchical, flat address space that enables storing large number of objects without having to maintain an absolute path to each object.

What is Object-Based Storage Device (OSD)?

400

The ____ storage I/O protocol uses the labels Initiator and Target to identify
devices that connect and communicate with each other through the ______
protocol.

What is SCSI?

400

_____ backup is used for restoring an entire VM if there is any hardware failure or human error

What is Image-Based?

400

This data shredding technique refers to the process of decreasing or eliminating the magnetic field of a media device.

What is Degaussing?

500

A technique of decoupling an application from the underlying computing platform (operating system and hardware) to enable the application to be used on a compute system without installation.

What is Application Virtualization?

500

The ________ allows access to
objects without specifying the storage location

What is Object ID?

500

The Software-Defined Data Center (SDDC) plane that provides the programming logic and policies that the data plane follows to perform its operations. 

What is Control Plane?

500

_____ scans primary storage to find files that meet the archiving policy

What is Archiving Agent?

500

_____ are low-observable characteristics (LOC) attacks that avoids detection by most security solutions

What is Fileless Attacks?

M
e
n
u