The storage team is discussing the implementation of shared storage to support a business critical, high volume database application. Which of the following techniques can be used to make some of the storage solution available to some hosts and unavailable to others?
A. multi-pathing
B. LUN masking
C. VLANs
D. port security
B
Explanation: LUN masking hides or makes unavailable storage devices or groups of storage devices from all but devices with approved access.
You might also like to view...
Briefly describe 6to4 tunneling.
What will be an ideal response?
Once you have created pages in your Web site, you should ____.
A. upload the site to a Web server or network server B. download the site to a Web server C. upload the site to your workstation D. download the site to your workstation
In the accompanying figure, the vertical alignment on the first phrase is set to ____.
A. super B. height C. top D. baseline
After a security incident, management is meeting with involved employees to document the incident and its aftermath.Which of the following BEST describes this phase of the incident response process?
A. Lessons learned B. Recovery C. Identification D. Preparation