The storage team is discussing the implementation of shared storage to support a business critical, high volume database application. Which of the following techniques could cause a security issue if HBAs are moved?

A. multipathing
B. LUN masking
C. VLANs
D. port security


B
Explanation: LUN masking hides or makes unavailable storage devices or groups of storage devices from all but devices configured with approved access. It can be implemented at either HBA level or at the storage controller level. When implemented at the HBA level, moving the HBA may make the LUN available to the server to which the HBA has been moved.

Computer Science & Information Technology

You might also like to view...

The ________ is a U.S. Department of Labor agency that provides a Web site to help users analyze their computer workstation to avoid computer-related injury

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the context of this book, ____________________ wiring refers to installing cable that fans out in a horizontal star fashion from one or more centralized switches or routers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Trust Center is a tool for users to add ________ that the user knows are secure to minimize security breaches within an Access database

A) user names B) Web addresses C) locations D) network paths

Computer Science & Information Technology

What should be hidden when creating the print style for the page?

A. individual elements B. nav bar C. banners D. all of the above

Computer Science & Information Technology