Due to cost and implementation time pressures, a security architect has allowed a NAS to be used
instead of a SAN for a non-critical, low volume database. Which of the following would make a
NAS unsuitable for a business critical, high volume database application that required a high
degree of data confidentiality and data availability? (Select THREE).
A.
File level transfer of data
B.
Zoning and LUN security
C.
Block level transfer of data
D.
Multipath
E.
Broadcast storms
F.
File level encryption
G.
Latency