多項選擇題Which two statements about FCIP and iSCSI are correct?()

A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. TheiSCSI stack supports block-level storage for remote devices.
E. The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director()

A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D.allI S Lscontained with inasingle chass is
E.higher latency and through put than acore-edged esign switch

2.單項選擇題Which path selection protocol is used by Fibre Channel fabrics?()

A.IVR
B.VoQ
C.FSPF
D.VSANs
E.SANTap

4.單項選擇題Which statement about Fibre Channel communications is correct?()

A. It operates much like TCP.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
E. N_Port to N_Port connections use logical node connection points.

5.多項選擇題Which two of these correctly describe Fibre Channel? ()

A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to100 km before needing extenders

最新試題

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

題型:單項選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:單項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:單項選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項選擇題