Module 18 - Storage Security - Q&A Flashcards

1
Q
Which of the following is a storage protocol used to connect network-based storage solutions to an IP network?
A. FCoE
B. USB
C. iSCSI
D. eSATA
A

C. iSCSI is a storage protocol used to connect network-based storage solutions to an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is an Ethernet-based storage protocol?
A. PoE
B. FCoE
C. NBT
D. iSCSI
A

B. FCoE is an Ethernet-based storage protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are valid options for encrypting particular individual files on a host? (Choose two.)
A. Use of encrypted folders or containers
B. Use of a TPM to encrypt files
C. Individual file encryption
D. Encrypting the entire hard drive

A

A, C. Use of encrypted folders or containers, and encrypting individual files are both valid options for encrypting particular individual files on a host. TPMs are not normally used to encrypt individual files, and encrypting the entire hard drive will encrypt more files than the user desires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is a chip installed on the main board of the device and is used to store and generate encryption keys?
A. TPM
B. HSM
C. EFS
D. NAS
A

A. A Trusted Platform Module (TPM) is a chip installed on the main board of the device, and is used to store and generate encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following types of hardware encryption devices are most likely found as an appliance or add-in card for servers?
A. TPM
B. HSM
C. SAN
D. NAS
A

B. A Hardware Security Module (HSM) is usually implemented as a hardware appliance or even as an add-in card for workstations or servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
You need to implement a storage solution on your enterprise network that presents data to individual hosts as if it were on their own native file system. Which of the following storage solutions would meet this requirement?
A. iSCSI
B. Fibre channel over Ethernet
C. Network attached storage
D. Storage area network
A

D. A storage area network (SAN) uses block-level storage, which abstracts data from any file system, so that individual hosts access data as if it used their native file systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All of the following are characteristics of network attached storage (NAS), except:
A. Device that is attached to a central server
B. Works on the file system level
C. Uses block-level storage
D. Usually seen on the client is a file share or mapped drive letter

A

C. Network attached storage does not use block-level storage; it works on a file system level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is used more for data analytics than data storage and access?
A. SAN
B. NAS
C. Big data
D. Enterprise database
A

C. Big data is a concept used more for data analytics than data storage and access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
All of the following are characteristics of fault tolerance, except:
A. Redundant hardware
B. Load balancing
C. Immediate failover
D. Single point of failure
A

D. A single point of failure is not a characteristic of fault tolerance; this is actually what fault tolerance seeks to avoid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following describes several identically configured servers running at one time, which appear as one logical server to the network, capable of continual operation in the event one server fails?
A. Clustering
B. RAID
C. NAS
D. Load balancing
A

A. Clustering describes several identically configured servers running at one time, which appear as one logical server to the network, capable of continual operation in the event one server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly