What form of storage or file-transfer technology was originally designed to be operated over an optical network but was adapted to run over a copper network as well?

a. iSCSI
b. FTP
c. Fibre Channel
d. SATA


Answer: c. Fibre Channel

Computer Science & Information Technology

You might also like to view...

Consider the database shown in Table 7.14. What are the support and confidence values for the following negative association rules involving regular and diet soda?

The original association rule mining framework considers only presence of items together in the same transaction. There are situations in which itemsets that are infrequent may also be informative. For instance, the itemset TV, DVD, ¬ VCR suggests that many customers who buy TVs and DVDs do not buy VCRs. In this problem, you are asked to extend the association rule framework to negative itemsets (i.e., itemsets that contain both presence and absence of items). We will use the negation symbol (¬) to refer to absence of items. i. ¬Regular ?? Diet. ii. Regular ?? ¬Diet. ii. Regular ?? ¬Diet. iv. Diet ?? ¬Regular.

Computer Science & Information Technology

The src attribute of the HTML img element _________________.

a) specifies the type of the image b) specifies the location of the image file c) specifies the text displayed if the browser cannot render the image d) specifies the size of the image

Computer Science & Information Technology

________ allow you to create Word documents with the slides and notes

Fill in the blank(s) with correct word

Computer Science & Information Technology

Log User Access

Another important type of log relates to user access. Having records of user logins is crucial for trou- bleshooting and traffic analysis. Cisco IOS supports Authentication, Authorization and Accounting (AAA). With AAA, it is possible not only to delegate the user validation task to an external server but also to log activities. TACACS+ is a protocol designed to allow remote authentication through a centralized server. Packet Tracer offers basic AAA and TACACS+ support. R2 is also configured as a TACACS+ server. R2 will ask the server if that user is valid by verifying username and password, and grant or deny access based on the response. The server stores user credentials and is also able to log user login transactions. Follow the steps below to log in to R2 and display the log entries related to that login:

Computer Science & Information Technology