Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

21. The practice of removing identical components, blocks, streams, or sequentia

ID: 3849113 • Letter: 2

Question

21. The practice of removing identical components, blocks, streams, or sequential bits by substituting duplicate copies with a pointer to a single copy of the data is called:

a. Virtualization

b. Green Storage

c. Data Deduplication

d. Tiered storage

22. Which of the following RAID levels would you use if the primary concern was supporting a server requiring high performance with fault tolerance?

a. RAID-0

b. RAID-1

c. RAID-5

d. RAID-10

23. To ensure proper controls in the Wireless Local Area Network (WLAN) the auditor should check to ensure which preshared key (PSK) authentication mechanism is in place:

a. WEP

b. WAP

c. WAP2

d. WDS

Explanation / Answer

21. c)Data Duplication . Redundant blocks are replaced with pointers.

22 . b) RAID-1 . Raid 1 is requires a high performance with fault tolerance.

23. a) WAP2. In my opinion it is wrong mentioned. WPA2 is correct option. It provides most secure authentication mechanism. Please refer others also as I think options provided are mistaken . So that you can have more knowledge on it.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote