单选题 Which file system uses only UNIX systems for a client-server application protocol and Remote Procedure Call (RPC) for file sharing?

A、 New Technology File System (NTFS)
B、 Common Internet File System (CIFS)
C、 Hadoop Distributed File System (HDFS)
D、 Network File System (NFS)
下载APP答题
由4l***aq提供 分享 举报 纠错

相关试题

单选题 When using the erasure coding technique in an object-based storage system, data is divided into 12 data segments and 4 coding segments.
What is the maximum number of disk drive failures against which data is protected by the configuration?

A、3
B、4
C、8
D、12

单选题 An Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port4 occurs as follows:
•Monday = 8 PM to 9 PM
•Wednesday 7 PM to 9 PM
•Thursday = 6 AM to 9 AM
•Saturday = 4 PM to 7 PM What is the MTTR of Port 4?

A、2 hours
B、3 hours
C、28 hours
D、38 hours

单选题 A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?

A、Role-based
B、Profile-based
C、Signature-based
D、Anomaly-based

单选题 What is a key advantage of cloning a virtual machine (VM)?

A、Ability to run new VMs simultaneously with the same IP address.
B、Reduces the time required to create multiple copies of a VM.
C、Improves the performance of an existing VM and new VMs.
D、Eliminates the need to create multiple snapshots for a VM.

单选题 What accurately describes an iSCSI HBA?

A、Performs both iSCSI and TCP/IP processing
B、Requires CPU cycles for TCP/IP processing
C、Requires a software adapter with built-in functionality
D、Enables transmission of data through iSCSI tunneling

单选题 In an archiving environment, how is a content address created in a content addressable storage (CAS) system to store an object?

A、From the metadata of an object.
B、By using the logical address of the memory space.
C、From the binary representation of an object.
D、By using the physical address of the storage device.

单选题 Which exhibit represents a Type 1 hypervisor?

A、

B、

C、

D、

单选题 What is an accurate statement about Governance?

A、Restrict access to certain users
B、Ensure removal of security risks
C、Authorize policy-making decisions
D、Demonstrate adherence to polices