Which of the following BEST describes how the server administrator can accomplish this task?
A server administrator needs to create a new folder on a file server that only specific users can access . Which of the following BEST describes how the server administrator can accomplish this task?A . Create a group that includes all users and assign it to an ACC . Assign...
Which of the following server installation methods would BEST meet this requirement?
A technician needs to deploy an operating system that would optimize server resources . Which of the following server installation methods would BEST meet this requirement?A . FullB . Bare metalC . CoreD . GUIView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/windows-server/administration/performance-tuning/hardware/
Which of the following types of data replication is required?
A company uses a hot-site, disaster-recovery model . Which of the following types of data replication is required?A . AsynchronousB . IncrementalC . Application consistentD . ConstantView AnswerAnswer: B
Which of the following actions should the technician take to complete this task as efficiently as possible?
A technician needs to provide a VM with high availability . Which of the following actions should the technician take to complete this task as efficiently as possible?A . Take a snapshot of the original VMB . Clone the original VMC . Convert the original VM to use dynamic disksD...
Which of the following backup types only records changes to the data blocks on a virtual machine?
Which of the following backup types only records changes to the data blocks on a virtual machine?A . DifferentialB . SnapshotC . IncrementalD . Synthetic fullView AnswerAnswer: C Explanation: Reference: https://searchdatabackup.techtarget.com/definition/incremental-backup
Which of the following best describes the NEXT step that should be completed to restore the volume?
A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume . Which of the following best describes the NEXT step that should be completed to restore the volume?A ....
Which of the following open ports should be closed to secure the server properly? (Choose two.)
Which of the following open ports should be closed to secure the server properly? (Choose two.)A . 21B . 22C . 23D . 53E . 443F . 636View AnswerAnswer: A,C Explanation: Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html
Which of the following should the company also perform as a data loss prevention method?
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy . Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the...
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)A . Perform a root cause analysisB . Develop a plan of actionC . Document the findingsD . Escalate the issueE . Scope the issueF . Notify the usersView AnswerAnswer: C,F
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....