21. The practice of removing identical components, blocks, streams, or sequentia
ID: 3849113 • Letter: 2
Question
21. The practice of removing identical components, blocks, streams, or sequential bits by substituting duplicate copies with a pointer to a single copy of the data is called:
a. Virtualization
b. Green Storage
c. Data Deduplication
d. Tiered storage
22. Which of the following RAID levels would you use if the primary concern was supporting a server requiring high performance with fault tolerance?
a. RAID-0
b. RAID-1
c. RAID-5
d. RAID-10
23. To ensure proper controls in the Wireless Local Area Network (WLAN) the auditor should check to ensure which preshared key (PSK) authentication mechanism is in place:
a. WEP
b. WAP
c. WAP2
d. WDS
Explanation / Answer
21. c)Data Duplication . Redundant blocks are replaced with pointers.
22 . b) RAID-1 . Raid 1 is requires a high performance with fault tolerance.
23. a) WAP2. In my opinion it is wrong mentioned. WPA2 is correct option. It provides most secure authentication mechanism. Please refer others also as I think options provided are mistaken . So that you can have more knowledge on it.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.