Upgrade to remove ads Show Only ₩37,125/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (29)You are in the process of configuring an iSCSI storage area network (SAN) for your network iSCSI initiator Arrange the Fibre Channel SAN implementation tasks in the order they should be performed. 1. Install two FC HBAs in each server that will access the shared storage on the SAN. Which of the following does not accurate describe an iSCSI SAN? Requires special hardware and knowledge to implement. You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used. NAS with clustering Which of the following are typical of a NAS device? One or more NICs. In a SAN implementation, the servers that connect to shared storage devices are called _______. initiators Which VoIP device helps establish the connection between two VoIP phones? VoIP server What are other names for a VoIP server? (Select two) VoIP PBX IP-PBX What is one benefit of placing VoIP gateways inn geographically separated branch offices that have an existing WAN connection? Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred. When would you consider changin the codec used in your VoIP system? (Select two) When sound quality is poor When VoIP data consumes too large a portion of your network bandwidth. How can QoS be configured so that large data transfers will not block VoIP calls by using too much network bandwidth? QoS can be configured on the network devices to give priotity to VoIP traffic. Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform.
Unified communication Which of the following protocols is an open source protocol used by most manufactures of VoIP systems? Session initiation protocol (SIP) Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call? SIP Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Jitter You are on a phone call using VoIP. You notice that it takes several second for the person on the other end to respond to questions you ask. Which type of problem is occurring? Latency What is a soft phone? A software application that runs on a computer or other device that access a VoIP sever to make real-time phone calls. Which features are typically used with VoIP? (Select two) PoE Which of the following features is used with digital IP phones to supply power through a switch port?
PoE In virtualization, what is the role of the hypervisor? A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. What type of virtualization completely simulates a real physical host? Full virtualization What component is most likely to allow physical and virtual machines to communicate with each other? Virtual Switch Which of the following are advantages of virtualization? (Select two) Easy system migration to different hardware Centralized administration You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual servers Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? SaaS Which of the following best describes the platform as a service (PaaS) cloud computing service model? PaaS delivers everything a developer needs to build an application onto the cloud infrastructure. Which of the following are true regarding cloud computing? (Select three) Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser. The term "cloud" is used as a synonym for the internet. Cloud computing is software, data access, computation, and storage services provided to clients through the internet. Match the description Public cloud- Provides cloud services to just about anyone You were recently hired by s small start-up company. the company is in a small office and has several remote employees. Yo have been asked to find a business service that would accommodate the current size of the company, but would also be able to scale as the company grows. The service needs to provide adequate storage as will as additional computing power. Which cloud service model should you use? IassS Recommended textbook solutionsIntroduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions C++ Programming: Program Design Including Data Structures7th EditionD. S. Malik 867 solutions
Java How to Program (early objects)10th EditionHarvey M. Deitel, Paul J. Deitel 356 solutions Sets with similar termsChapter 935 terms Twhitman85PLUS SYS401 Quiz 450 terms david_severns Sets found in the same folder9.4.6 practice questions9 terms cclinci15 10.4.9 practice questions11 terms cclinci15 7.3.610 terms alec_vosika 10.1.5 practice questions5 terms cclinci15 Other sets by this creatorCH. 1159 terms Esvheiryalvarez CH. 1059 terms Esvheiryalvarez CH.11 LABS2 terms Esvheiryalvarez CH. 10 LABS5 terms Esvheiryalvarez Verified questions
COMPUTER SCIENCE Which of the following is not a valid rule of Boolean algebra? a) (True or x) == True b) (False and x) == False c) not(a and b) == not(a) and not(b) d) (True or False) == True Verified answer COMPUTER SCIENCE Look at the following code. union Values { int ivalue; double dvalue; } ; Values v; Assuming that an int uses four bytes and a double uses eight bytes, how much memory does the variable v use? Verified answer
COMPUTER SCIENCE This widget is a container that can hold other widgets. a. Grouper b. Composer c. Fence d. Frame Verified answer
COMPUTER SCIENCE Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of these users to be able to access one file. a. How would you specify this protection scheme in UNIX? b. Can you suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX? Verified answer Other Quizlet setsChapter 20 DSM29 terms zeynaral Endoscopic and MIS14 terms CTrnavsky Speech to the Virginia Convention by Patrick Henry33 terms troberts53 DRT Sophomore Year 201525 terms Normands17 Related questionsQUESTION True/False: A switch uses the port number that a frame comes in on to add entries to its switch table 2 answers QUESTION She has no reason to expect a file from this person. The most effective security strategy for ---- to follow would be: 2 answers QUESTION Suppose someone gained unauthorized access to a company's network with the intent of stealing sensitive information. That person would best be described as a 4 answers QUESTION What is a device that measures the acceleration of an item and is used to track truck speeds or taxi cab speeds? 4 answers How do I connect to a SAN storage server?Connect every device of the pool with the switch using a fiber cable. Connect every server with a fiber switch using fiber cable. Attach a Host Bus Adapter card (HBA) on each server and pool to communicate. This is the easy set up of SAN.
Which network based storage technology is being used?Which network-based storage technology is being used? NAS with Clustering. In a SAN implementation, the servers that connect to shared storage devices are called___________________.
What does Iscsi stand for?ISCSI, which stands for Internet Small Computer System Interface, works on top of the Transport Control Protocol (TCP) and allows the SCSI command to be sent end-to-end over local-area networks (LANs), wide-area networks (WANs) or the internet.
What kinds of services and roles would call for an iscsi SAN?These include:. Internet service providers.. Storage service providers.. Organizations that need remote data replication and disaster recovery. For example, a high-tech company in San Jose is susceptible to earthquake disaster. ... . Small office/home office businesses with limited IT resources, infrastructure and budget.. |