Question

5. (20 points) If you had 8 of these disks in a Raid 1 configuration, would that provide more, less or the same immunity to m

0 0
Add a comment Improve this question Transcribed image text
Answer #1

if we have 8 disk in raid configuration we will have available 4 disk storage volume and other 4 disks for mirroring as in raid 1 data gets written in both disks as write request is done. so if malware file gets written easily to both disks in RAID 1 so more vunerable compared to

disks encrypted with secret password will provide read and write access only when malware have security key so more secure in compared to RAID 1 disks

Add a comment
Know the answer?
Add Answer to:
5. (20 points) If you had 8 of these disks in a Raid 1 configuration, would...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please Help with these Operating Systems questions thank you! 1. How is X-RAID or Hybrid RAID...

    Please Help with these Operating Systems questions thank you! 1. How is X-RAID or Hybrid RAID different than regular RAID levels? 2.Make a list of six security concerns for a bank’s computer system. Foreach item on your list, state whether this concern relates to physical,human, or operating-system security. 3. How would you protect against a port scan? 4. Calculate the total head movements for the following queues using: FCFS SSTF SCAN C-SCAN LOOK C-LOOK a. 76, 95, 73, 12, 150,...

  • (2) Vigenère cipher 1. Choose a password that is 5-8 letters, and write it down. 2....

    (2) Vigenère cipher 1. Choose a password that is 5-8 letters, and write it down. 2. Write down a sentence that is about 4-6 times the length of your password. 3. Use the polyalphabetic substitution table to encode the sentence using your password. 4. Type the encrypted sentence and the password directly into your wiki page (does not need to be an attachment). 5. You'll get full credit for this portion only if I can make sense of your sentence...

  • For the following questions, describe in detail what happens in a RAID-5 system when one disk fai...

    For the following questions, describe in detail what happens in a RAID-5 system when one disk fails. You may assume a system with 6 disks. ( 1 point) What happens when reading a piece of data from which the parity is stored on the failed disk? (1 point) What happens when reading a piece of data for which the actual data is stored on the failed disk? (1 point) If we replace the failed disk with a new disk, how...

  • 1. Consider a demand-paging system with the following time-measured utilizations: CPU utilization 20% Paging disk 5%...

    1. Consider a demand-paging system with the following time-measured utilizations: CPU utilization 20% Paging disk 5% Other I/O devices 97% Indicate which will improve system utilization and explain your answer.    a. Install a faster CPU . b. Install a bigger paging disk. c. Increase the degree of multiprogramming. d. Decrease the degree of multiprogramming. e. Install more main memory. f. Install a faster hard disk or multiple controllers with multiple hard disks. g. Add prepaging to the page-fetch algorithms....

  • QUESTION 5 When planning your migration from a physical environment to a virtual environment, which server...

    QUESTION 5 When planning your migration from a physical environment to a virtual environment, which server would be a good candidate to migrate first? Highly utilized database server Development server Application server Primary file server QUESTION 6 Which of the following RAID configurations keeps an exact copy of the data on two disks and requires a minimum of two disks? RAID 5 RAID 6 RAID 0 RAID 1 QUESTION 7 Which type of hypervisor is created and deployed on a...

  • Towers of Hanoi (15 points) Given: n disks, all of different sizes the size of the...

    Towers of Hanoi (15 points) Given: n disks, all of different sizes the size of the ith disk is į .3 pegs - A, B, C the number of pegs might change in a future version of the game Inally, all the disks are stacked on peg A Requirement: Never place a larger disk on top of a smaller disk (disk 5 is larger than disk 4, etc.) Objective: Move the disks from peg A to peg C Input: n,...

  • Raid Gauloises. Raid Gauloises is a rapidly growing French sporting goods and adventure racing outfitter. The...

    Raid Gauloises. Raid Gauloises is a rapidly growing French sporting goods and adventure racing outfitter. The company has decided to borrow euro €21,000,000 via a euro-euro floating rate loan for four years. Raid must decide between two competing loan offers from two of its banks. Banque de Paris has offered the four-year debt at euro-LIBOR + 2% with an up-front initiation fee of 1.800%. Banque de Sorbonne, however, has offered euro-LIBOR + 2.5% a higher spread, but with no loan...

  • 2. (20 points) For each of the following pairs of goods, identify which one you would...

    2. (20 points) For each of the following pairs of goods, identify which one you would expect to have more own-price elastic demand. Please explain your reasoning. (a) (5 points) Computers (generally) vs. Apple MacBook Pro laptops. (b) (5 points) Stereo headphones (generally) vs. hearing aids. For each of the following goods, identify whether you would expect demand to be more (own- price) elastic in the short run or the long run. As above, please briefly explain your reasoning. (c)...

  • Can someone help with 5-8? Please thanks 1. Your little sister wants a ride on her...

    Can someone help with 5-8? Please thanks 1. Your little sister wants a ride on her sled. You agreed and moved the sled-sister combination by pulling it across a level ground with a force of F, at constant velocity of 0.5 m/s at an angle of 50 degrees with the horizontal. Assume that the sled-sister combination has a weight of 350 N and the coefficient of kinetic friction is 0.15. A) Draw a neat free-body diagram B) Calculate your force...

  • After reading about malware in chapter 5, pick and discuss one type of malware you consider...

    After reading about malware in chapter 5, pick and discuss one type of malware you consider the most dangerous and why? If you have one not in the textbook, describe it and why you think it is more dangerous. Provide and describe a real world example of this type of malware that has been used in an attack. Post your response to this forum. Add at least one (1) reference properly formatted in APA style and cited where used.  Also post...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT