Which of the following hides or makes unavailable storage devices or groups of storage devices from all but devices with approved access?

A. RAID
B. SAN
C. NAS
D. LUN masking


D
Explanation: Use LUN masking to restrict access and visibility when indicated. LUN masking hides or makes unavailable storage devices or groups of storage devices from all but devices with approved access.

Computer Science & Information Technology

You might also like to view...

Implement this physical design for DreamHome created in 18.7.

What will be an ideal response?

Computer Science & Information Technology

The Processing language was developed to make programming more accessible to ________

A) creative and artistic people B) engineers and architects C) students and teachers D) doctors and medical personnel

Computer Science & Information Technology

A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.

A. exploits B. marks C. command points D. vulnerabilities

Computer Science & Information Technology

____ involves choosing between alternative courses of action based on some value within a program.

A. An equivalency operator B. A sequence structure C. Pseudocode D. A decision structure

Computer Science & Information Technology