a computing device (combination of hardware, firmware, and system software) that runs business applications
What is Compute System?
What is RAID Level 5?
A hardware adapter with built-in iSCSI functionality
What is iSCSI HBA?
A write is committed to the source and immediately acknowledged to the compute system
What is Asynchronous Replication?
________ is a social engineering attack that is used to deceive users. ________ attacks are typically carried out by spoofing email – an email with a fake but genuine-appearing address, which provides a link to a website that masquerades as a legitimate website.
Phishing
Delivers microservices by providing portable, isolated virtual environments
for applications to run without interference from other running applications
What is Containers?
A client/server protocol for file sharing that is commonly used on UNIX systems
What is Network File System (NFS)?
____ is a FC SAN topology where each switch is connected to every other switch.
What is Full Mesh Topology?
A service that enables consumers to procure backup services on-demand
What is Back up as a Service (BaaS)?
In Governance, Risk, and Compliance, there are three key approaches that begin with "A". Of the three, which key approach refers to the process of determining whether and in which manner, a user, device, application, or process is allowed to access only the particular service or resource
What is Authorization?
High-performance non-volatile storage that addresses the performance needs to support digital transformation
What is Storage Class Memory (SCM)?
The ________ describes the time that is taken to position the R/W heads across the platter with a radial movement. In other words, it is the time that is taken to position and settle the arm and the head over the correct track.
What is Seek Time?
Type of login that assigns an FC address to a node in an FC SAN environment?
List the three key continuous data protection components
What is Journal Volume, CDP Appliance, Write Splitter?
_____ refers to the various entry points that an attacker can use to launch an attack, which includes people, process, and technology
What is Attack Surface?
The physical components that connect ________ to ________ are: Host bus adapter, port, switches, and cable.
What is "compute" to "storage"?
A Storage system that uses a non-hierarchical, flat address space that enables storing large number of objects without having to maintain an absolute path to each object.
What is Object-Based Storage Device (OSD)?
The ____ storage I/O protocol uses the labels Initiator and Target to identify
devices that connect and communicate with each other through the ______
protocol.
What is SCSI?
_____ backup is used for restoring an entire VM if there is any hardware failure or human error
What is Image-Based?
This data shredding technique refers to the process of decreasing or eliminating the magnetic field of a media device.
What is Degaussing?
A technique of decoupling an application from the underlying computing platform (operating system and hardware) to enable the application to be used on a compute system without installation.
What is Application Virtualization?
The ________ allows access to
objects without specifying the storage location
What is Object ID?
The Software-Defined Data Center (SDDC) plane that provides the programming logic and policies that the data plane follows to perform its operations.
What is Control Plane?
_____ scans primary storage to find files that meet the archiving policy
What is Archiving Agent?
_____ are low-observable characteristics (LOC) attacks that avoids detection by most security solutions
What is Fileless Attacks?