ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 286 - 350-601 discussion

Report
Export

An engineer configures a storage environment for a customer with high- security standards. The secure environment is configured in vsan 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Chose two.)

A.

Option A

Answers
A.

Option A

B.

Option B

Answers
B.

Option B

C.

Option C

Answers
C.

Option C

D.

Option D

Answers
D.

Option D

E.

Option E

Answers
E.

Option E

Suggested answer: A, C

Explanation:

To meet the high-security standards, the engineer should configure port security and fabric binding on VSAN 50. Port security prevents unauthorized devices from logging into the fabric by automatically learning and securing the World Wide Port Names (WWPNs) of devices connected to the switch ports. Fabric binding allows only authorized switches to join the fabric by creating a list of switch WWNs that are permitted to join a specific VSAN.

asked 10/10/2024
William Macy
55 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first