List of questions
Related questions
Question 286 - 350-601 discussion
An engineer configures a storage environment for a customer with high- security standards. The secure environment is configured in vsan 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Chose two.)
A.
Option A
B.
Option B
C.
Option C
D.
Option D
E.
Option E
Your answer:
0 comments
Sorted by
Leave a comment first