A systems administrator is setting up a new SAN. Which of the following protocols should be used to access and manage the system?
A. WWN
B. NTP
C. DNS
D. SSH
Answer: D. SSH
Computer Science & Information Technology
You might also like to view...
Explain how a fence register is used for relocation of a user's program
What will be an ideal response?
Computer Science & Information Technology
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
A. Disable any unused physical ports until needed B. Implement a BIOS password on all the servers C. Install chassis locks on all the servers D. Restrict usage of flash drives in company policy
Computer Science & Information Technology