The storage team is discussing the implementation of shared storage to support a business critical, high volume database application. Which of the following techniques could cause a security issue if HBAs are moved?

A. multipathing
B. LUN masking
C. VLANs
D. port security

B
Explanation: LUN masking hides or makes unavailable storage devices or groups of storage devices from all but devices configured with approved access. It can be implemented at either HBA level or at the storage controller level. When implemented at the HBA level, moving the HBA may make the LUN available to the server to which the HBA has been moved.

Computer Science & Information Technology

You might also like to view...

Users in several departments are reporting connectivity problems. The technician examines the computer and finds the following settings. The IP address is 10.0.1.0 with a subnet mask of 255.255.252.0. The default gateway is 10.0.1.1 and the DNS server is 10.0.0.15. A user can connect to the internet but not servers on other internal subnets. The technician is not able to connect with a server with an IP of 10.0.2.25. Which of the following is MOST likely the problem?

A. Default gateway B. Duplicate IP address C. Wrong DNS D. Subnet mask

Computer Science & Information Technology

The main advantage of using Linux is its General Public License (GPL), which makes the OS free to install and use.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology