Which of the following would MOST likely help the analyst determine if the applications are running?
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server . Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A...
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....
Which of the following policies would be BEST to deter a brute-force login attack?
Which of the following policies would be BEST to deter a brute-force login attack?A . Password complexityB . Password reuseC . Account age thresholdD . Account lockout thresholdView AnswerAnswer: A Explanation: Reference: https://sucuri.net/guides/what-is-brute-force-attack/
Which of the following actions should the technician take to complete this task as efficiently as possible?
A technician needs to provide a VM with high availability . Which of the following actions should the technician take to complete this task as efficiently as possible?A . Take a snapshot of the original VMB . Clone the original VMC . Convert the original VM to use dynamic disksD...
Which of the following BEST describes what is happening?
A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163<UP, BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1 Which of the following BEST describes what is happening?A . The server is configured...
Which of the following would be the BEST way to complete this request?
A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server . Which of the following would be the BEST way to complete...
Which of the following server installation methods would BEST meet this requirement?
A technician needs to deploy an operating system that would optimize server resources . Which of the following server installation methods would BEST meet this requirement?A . FullB . Bare metalC . CoreD . GUIView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/windows-server/administration/performance-tuning/hardware/
Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following: dr-xr-xr-- /home/Ann Which of the following commands should the administrator use to resolve the issue...
Which of the following should the technician do NEXT to install the firmware?
A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS . Which of the following should the technician do NEXT to install the firmware?A . Press F8 to enter safe modeB . Boot...
Which of the following best describes the NEXT step that should be completed to restore the volume?
A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume . Which of the following best describes the NEXT step that should be completed to restore the volume?A ....