A systems administrator is setting up a new SAN. Which of the following protocols should be used to access and manage the system?

A. WWN
B. NTP
C. DNS
D. SSH

Answer: D. SSH

Computer Science & Information Technology

You might also like to view...

Explain how a fence register is used for relocation of a user's program

What will be an ideal response?

Computer Science & Information Technology

A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?

A. Disable any unused physical ports until needed B. Implement a BIOS password on all the servers C. Install chassis locks on all the servers D. Restrict usage of flash drives in company policy

Computer Science & Information Technology