You have been asked to secure your FC switches in the data center. Unsecure protocols have already been disabled but you also need to restrict access to the switches only from specific IP addresses located on the production network.
What should be used?
A new FC switch has been installed into the data center. You want to disable any unsecure protocols used to access the management ports.
Which two protocols should be disabled? (Choose two.)
A data center has an existing three tiered storage solution consisting of enterprise, nearline, and tape. Each storage tier has available expansion capacity. A new mission-critical application is being developed that will require 4TBs of extremely low latency enterprise storage. The new application will be hosted on clustered servers. Cost is not a factor.
Which solution will meet the requirements?
Your organization operates in a regulated environment and contracts with a service provider to manage tape backup media for highly confidential, secure data.
Using SNIA Storage Security Best Practices, which two statements are correct? (Choose two.)
You have completed installing your FC SAN. When everything is powered on, numerous devices are not available. You need to verify that the devices appear within the FC fabric by accessing the appropriate FC service that provides a list of devices and their respective function.
Which server within the Fibre Channel fabric would be used to do this?
You are using asynchronous storage replication to protect your critical database server. There are no replication agents installed on the database server. After a disaster, you are unable to bring up the database at the DR site.
What is the cause?