IBM(000-118)

单选题Why is ProtecTIER’s HyperFactor technology superior to Data Domain’s hash-based deduplicationalgorithms?()A it has only a single stage data inspection processB it utilizes industry standard SHA-1 and MD5 algorithmsC it looks for identical matches compa

题目
单选题
Why is ProtecTIER’s HyperFactor technology superior to Data Domain’s hash-based deduplicationalgorithms?()
A

it has only a single stage data inspection process

B

it utilizes industry standard SHA-1 and MD5 algorithms

C

it looks for identical matches comparing chunks of data

D

it first looks for similarity of data rather than exact matching

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
Facebook is mentioned to show that_____.

A.America needs a general data-protection law
B.online economy relies heavily on consumer data
C.online news can produce strong economic impact
D.America has benefited greatly from self-regulation

答案:A
解析:
[信息锁定]第三段首先指出,美国尚未通过任何一项包罗性的数据保护法,其自我监管方式的弱点正日益突显,公司几乎可以对用户数据为所欲为。最后指出,“将8700万用户的数据转给一家政治活动公司”的行为被报道之后,脸书陷入了危机。可见,文中提及脸书意在说明自我监管方法存在缺陷、美国需要一部全面的数据保护法,A.正确。[解题技巧]B.为第三段③句所述事实,但这是背景信息,并未触及核心观点,因此并非事例说明对象。且事例本身强调的是“脸书因转移用户数据而陷入危机”,并非“脸书对用户数据的依赖”。C.对事例信息“新闻披露(news)使得脸书陷入危机”过度推导,文中并非意在强调“新闻的影响”,更未指出这是“在线新闻”。D.对第四段首句the benefits of self-regulation断章取义,结合第三段③句可知,该句是在指出“自我监管方法的益处受到质疑”,选项内容与其相悖。

第2题:

A manufacturing company is using ProtecTIER TS7610 appliances in a spoke and hubconfiguration. ProtecTIER’s TS7610 replication technology at the hub will perform the followingaction on the replicated data being received:()

  • A、compress the incoming data stream as it is received
  • B、store the alreadydeduplicated data stream unprocessed
  • C、compare the incoming data to previously replicated data and store only the byte-level changes
  • D、compare the incoming data to previously replicated data and store only the block-level changes

正确答案:C

第3题:

Why is full-duplex Ethernet superior to its single-duplex counterpart? (Select two answer choices.)

A.It uses inexpensive hubs

B.It operates without collisions

C.It operates on switches

D.It provides faster data transfer

E.It utilizes fewer wiring pairs


正确答案:BD
解析:Explanation:
Full duplex Ethernet allows concurrent sending and receiving, which allows the full bandwidth to be used for both sending and receiving. The result is a collision free network with increased throughput.

Incorrect Answers:
A, C. These are incorrect because full duplex doesn't require hubs or switches. Full duplex operation can be used on switch and router ports, as well as PC hosts.

E. This is incorrect because full duplex actually uses more wiring pairs. In full duplex, both wire pairs are used. Half duplex uses only a single pair.

第4题:

Which component of VPN technology ensures that data can be read only by its intended recipient?()

  • A、data integrity
  • B、encryption
  • C、key exchange
  • D、authentication

正确答案:D

第5题:

A storage specialist is assessing a customer’s tape backup environment. Which of the following questions would be the most appropriate question to identify the customer’s environment?()

  • A、Has there been any recent loss of data?
  • B、How many tape drives are in the Library?
  • C、What tape technology is currently being used?
  • D、What software is being used for restoring the data?

正确答案:C

第6题:

Text 2 America rarely looks to Brussels for guidance.Commercial freedom appeals more than governmental control.But when it comes to data privacy,the case for copying the best bits of the European Union's approach is compelling.The General Data Protection Regulation(GDPR)is due to come into force next month.It is rules-heavy and has its flaws,but its premise that consumers should be in charge of their personal data is the right one.The law lets users gain access to,and to correct,information that firms hold on them.It gives consumers the right to transfer their data to another organisation.It requires companies to define how they keep data secure.And it lets regulators levy big fines if firms break the rules.America has enacted privacy rules in areas such as health care.But it has never passed an overarching data-protection law.The failings of America's self-regulatory approach are becoming clearer by the week.Large parts of the online economy are fuelled by data that consumers spray around without thought.Companies'mysterious privacy policies obscure what they do with their users'information,which often amounts to pretty much anything they please.Facebook is embroiled in crisis after news that data on 87m users had been passed to a political-campaign firm.These are changing the calculus about the benefits of self-regulation.Opponents of privacy legislation have long argued that the imposition of rules would keep technology companies from innovating.Yet as trust leaks out of the system,innovation is likely to suffer.If consumers worry about what smartphone apps may do with their data,fewer new offerings will take off.It is striking that many of the firms preparing for the GDPR's arrival in Europe are excited that the law has forced them to put their data house in order.The need to minimise legal fragmentation only adds to the case for America to adopt bits of the GDPR.One reason behind the new rules in the EU was to harmonise data-protection laws so that firms can do business across Europe more easily.America is moving in the opposite direction.States that have detected a need for greater privacy are drafting their own laws.California has pending legislation that would establish a data-protection authority to regulate how the state's big tech firms use Californians'personal data.The GDPR is far from perfect.At nearly 100 articles long,it is too complex and tries to achieve too many things.The compliance costs for smaller firms,in particular,look burdensome.But these are arguments for using it as a template,not for ignoring the issue of data protection.If America continues on today's path,it will fail to protect the privacy of its citizens and long-term health of its firms.America's data economy has thrived so far with hardly any rules.That era is over.
The most suitable title for this text would be____

A.American firms in Europe will have to comply with the GDPR
B.America should protect its citizens'privacy and its firms'health
C.America should borrow from Europe's data-privacy law
D.America's data economy is evolving into a new era

答案:C
解析:
[信息锁定]文章前两段提出观点“就数据隐私,美国应借鉴欧盟方法(即《通用数据保护条例》)”。第三至五段从保护个人隐私,促进公司健康发展、保障技术创新、减少立法碎片等方面论证说明理由。末段总结发出呼吁“GDPR虽远非完美,但依然可用作数据保护的法律模版;美国应改变以前的自我监管方式、指定隐私保护法”。可见全文核心在于“美国应借鉴欧盟的隐私法GDPR”.C.为恰当标题。[解题技巧]A.未抓住本文主要面向对象:文章面向的是“美国(Amercica)”,而非“美国公司。B.符合作者总体观点,但未体现本文立足点“美国应通过借鉴欧洲的GDPR来保护其公民隐私及公司健康”。D.偏离本文关注对象:作者重点关注的是“数据隐私的保护”,而非“数据经济的发展”。

第7题:

Why is full-duplex Ethernet superior to its single-duplex counterpart?()

  • A、It uses inexpensive hubs
  • B、It operates without collisions
  • C、It operates on switches
  • D、It provides faster data transfer
  • E、It utilizes fewer wiring pairs

正确答案:B,D

第8题:

Compare a typical Distributed Replicated Block Device (DRBD) with MySQL Standard Replication using master-slave replication. Which two statements are correct?()

A.Both technologies guarantee an identical copy of data on the secondary node

B.Only MySQL can maintain a time-delayed copy of data on the secondary node

C.Both technologies use the TCP/IP stack as their primary transmission medium

D.DRBD uses shared-disk technology


参考答案:B, C

第9题:

You need to deliver the three reports that detail the previous days transaction activity. What should you do?()

  • A、Create a new report that has three embedded subreports. Create one standard subscription.
  • B、Create three new reports based on the same dataset. Create one data-driven subscription.
  • C、Create three data-driven subscriptions on a single shared schedule. Ensure that the e-mail recipient list is identical across all three subscriptions.
  • D、Create three standard subscriptions on a single shared schedule. Ensure that the mail recipient list and subject are identical across all three subscriptions.

正确答案:A

第10题:

A technician manages a server that contains sensitive data. The server currently has two hard drives, one hosting the operating system and other generic files and the second hosting sensitive data. The technician needs to implement a technology that would guard against data loss for only the sensitive data, while adding only one additional hard drive. Which of the following should the technician implement to avoid reformatting any drives?()

  • A、RAID 0
  • B、RAID 1
  • C、RAID 3
  • D、RAID 5

正确答案:B

更多相关问题