The storage team is discussing the implementation of shared storage to support a business critical, high volume database application. Which of the following techniques can be used to make some of the storage solution available to some hosts and unavailable to others?
A. multi-pathing
B. LUN masking
C. VLANs
D. port security
B
Explanation: LUN masking hides or makes unavailable storage devices or groups of storage devices from all but devices with approved access.
Computer Science & Information Technology
You might also like to view...
What is an accessor method?
What will be an ideal response?
Computer Science & Information Technology
Write a function called riddle that returns a two line string, with a riddle and its answer. Modify makeHomePage to insert the riddle at the end of the page rather than the tagline.
Note: This simply involves changing the tagline method on page 368 to be about riddles instead.
Computer Science & Information Technology