Module 18 - Storage Security - Q&A Flashcards
Which of the following is a storage protocol used to connect network-based storage solutions to an IP network? A. FCoE B. USB C. iSCSI D. eSATA
C. iSCSI is a storage protocol used to connect network-based storage solutions to an IP network.
Which of the following is an Ethernet-based storage protocol? A. PoE B. FCoE C. NBT D. iSCSI
B. FCoE is an Ethernet-based storage protocol.
Which of the following are valid options for encrypting particular individual files on a host? (Choose two.)
A. Use of encrypted folders or containers
B. Use of a TPM to encrypt files
C. Individual file encryption
D. Encrypting the entire hard drive
A, C. Use of encrypted folders or containers, and encrypting individual files are both valid options for encrypting particular individual files on a host. TPMs are not normally used to encrypt individual files, and encrypting the entire hard drive will encrypt more files than the user desires.
Which of the following is a chip installed on the main board of the device and is used to store and generate encryption keys? A. TPM B. HSM C. EFS D. NAS
A. A Trusted Platform Module (TPM) is a chip installed on the main board of the device, and is used to store and generate encryption keys.
Which of the following types of hardware encryption devices are most likely found as an appliance or add-in card for servers? A. TPM B. HSM C. SAN D. NAS
B. A Hardware Security Module (HSM) is usually implemented as a hardware appliance or even as an add-in card for workstations or servers.
You need to implement a storage solution on your enterprise network that presents data to individual hosts as if it were on their own native file system. Which of the following storage solutions would meet this requirement? A. iSCSI B. Fibre channel over Ethernet C. Network attached storage D. Storage area network
D. A storage area network (SAN) uses block-level storage, which abstracts data from any file system, so that individual hosts access data as if it used their native file systems.
All of the following are characteristics of network attached storage (NAS), except:
A. Device that is attached to a central server
B. Works on the file system level
C. Uses block-level storage
D. Usually seen on the client is a file share or mapped drive letter
C. Network attached storage does not use block-level storage; it works on a file system level.
Which of the following is used more for data analytics than data storage and access? A. SAN B. NAS C. Big data D. Enterprise database
C. Big data is a concept used more for data analytics than data storage and access.
All of the following are characteristics of fault tolerance, except: A. Redundant hardware B. Load balancing C. Immediate failover D. Single point of failure
D. A single point of failure is not a characteristic of fault tolerance; this is actually what fault tolerance seeks to avoid.
Which of the following describes several identically configured servers running at one time, which appear as one logical server to the network, capable of continual operation in the event one server fails? A. Clustering B. RAID C. NAS D. Load balancing
A. Clustering describes several identically configured servers running at one time, which appear as one logical server to the network, capable of continual operation in the event one server fails.