Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

11.in some instances, the raid controller functionality might be performed by the software. describe the one downside and the one upside of using this approach,

11.in some instances, the raid controller functionality might be performed by the software. describe the one downside and the one upside of using this approach, as opposed to using raid controller hardware. 12. in what sense is a "private cloud" considered private? 15. _____ provides a VM where the customer specifies the ammount of hardware performance/capacity to allocate to the VM and the operating system and includes a number of customized development tools with which the customer will have full control. PaaS SaaS none of the other choices are correct IaaS 18. which of the following is correct about hardware RAID controllers? dedicated cache memory decreases server write performance. parity calculation by the server and cache memory in the RAID controller increases read and write performance. volume management is performed by the controller card volume management is performed by the server. 19. iSCSi names are? local to the setup globally unique and permanent local to the setup and temporary globablly unique and temporary 20. examine all four statements shown: 1. iaas allows you to rent hardware and have control over the operating system (OS) 2. paas allows you to manage applications without controlling the underlying OS. 3. SaaS allows you to subscrube to software. 4. with CapEx, your costs are fixed. specify whether each statement is true or false. you need to respond to 4 seprate questions as listed with true or false answer. 21. you need to separate your companys windows server storage from the linux server storage on the same SAN. you need to ensure that neither storage is visible, nor accessible, to the other operating system. describe what should you do to accomplish this? 23. A company is planning on using Microsoft Azure for hosting their application resources. which of the following types of expense would the company need to primarily incorporate in their costing plan for azure-based resources? electricity costs captial expenditure operational expenditure data center expenditure 24. in a traditional centralized network management scheme, one host in the configuration has the role of a network management station. there may be one or two other management stations in a backup role. the remainder of the devices on the network contain ______ and a ________. 25. an SNMP manager issues the Get command to an agent. the GetNext command exploits the fact that objects in a MIB are arranged in a _____ structure. 26. name four of the functionalities of SNMP manager. 27. when either SNMPv1 or SNMPv2 are employed, a threat actor could sniff network traffic to determine the community string. this compromise could enable what? 29. examine the following cisco IOS command and then explain two things that this command enables or provides? switch(config)# snmp-server enable traps snmp 30. describe the difference between reverse proxy and forward proxy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Mobile Communications

Authors: Jochen Schiller

2nd edition

978-0321123817, 321123816, 978-8131724262

More Books

Students also viewed these Programming questions

Question

Describe three information technology trends.

Answered: 1 week ago