A solution architect needs to know how your switches enforce zoning. The enforcement method and identification type being used in your current FC switches must provide the highest level of security.Which zoning enforcement should you use?
Which type of storage replication is required, at a minimum, for a non-critical application?
Only one of many servers is suffering poor performance with a nearline (Tier 2) storage system. The server administrator has not discovered any obvious root cause. The server has multiple paths to the storage system but only one path is active. Routine monitoring by the storage administrator has determined that a single storage port has received a high number of bad frames.What should the SAN administrator do?
The system administrator has received complaints about the decreased performance of two LUNs. When you investigate the port being used to connect to theLUNs, you discover that the port has achieved its maximum throughput. You also discover that there are other ports available on the storage array that are not oversubscribed.Which specific driver is needed to balance workloads between the host and storage?
Which two cloud deployment models address data privacy issues? (Choose two.)
You need to add an iSCSI host and storage array to your environment. Your manager wants at least two options that allow all iSCSI initiators to query a central management server to locate the address of all iSCSI resources (e.g., iSCSI initiators, targets, switches, and management stations).Which two protocol methods would be used? (Choose two.)