A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses. Which of the following should be implemented?
A hypervisor host that has two fibre-channel ports needs to be connected to a storage array that has four fibre-channel ports. How many zones should be created for maximum redundancy?
The ____________________ boundary represents the physical perimeter that surrounds a set of IT resources owned by a specific organization. The ___________________ boundary establishes a logical perimeter wherein IT resources are trusted from a security perspective. To use cloud-based IT resources, the cloud consumer will generally need to trust them with the result that the cloud consumer's ___________________ boundary is expanded beyond its ___________________ boundary to encompass the cloud-based IT resources. Select the correct answer.