Which of the following tools should the technician use to ensure the Linux server can reach the backup location?
A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the...
Which of the following provides two-factor authentication?
Which of the following provides two-factor authentication?A . Bank card and PIC . Username and password.D . Fingerprint and iris scan.E . Key and proximity badge.View AnswerAnswer: A
What is the logical encapsulation of an IP packet when attempting to hide its contents?
What is the logical encapsulation of an IP packet when attempting to hide its contents?A . packageB . tunnelC . protocolD . messageView AnswerAnswer: B
Which certificate or certificates should you use?
DRAG DROP You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly...
Which model within TOGAF is intended to assist with the release management of the TOGAF specification?
Which model within TOGAF is intended to assist with the release management of the TOGAF specification?A . The Capability Maturity ModelB . The Document Categorization ModelC . The Integrated Infrastructure Information ModelD . The Organizational Model for Enterprise ArchitectureE . The Technical Reference ModelView AnswerAnswer: B
Which two options are limitations of NetFlow Version 5? (Choose two.)
Which two options are limitations of NetFlow Version 5? (Choose two.)A . no support for IPv6, Layer 2, or MPLS fieldsB . fixed field specificationsC . excessive network utilizationD . analyzes all packets on the interfaceView AnswerAnswer: A, B
What should you configure in the GPO?
HOTSPOT Your network contains an Active Directory domain named adatum.com. All domain controllers run Windows Server 2012 R2. All client computers run Windows 7. The computer accounts for all of the client computers are located in an organizational unit (OU) named OU1. An administrator links a Group Policy object (GPO)...
Which user role profile should you select for Group2?
You are planning the delegation for the virtualization environment. The delegation must meet the virtualization requirements. Which user role profile should you select for Group2?A . AdministratorsB . Read-Only AdministratorC . Self-Service UserD . Delegated AdministratorView AnswerAnswer: A
Which of the following is the QUICKEST method for getting a standard configuration to the PCs?
A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?A . Prebuilt image using PXEB . Single solid state/flash drive with answer fileC . Hot swappable image driveD . Internal hard drive partition...
Which of the following is not a logical control when implementing logical access security?
Which of the following is not a logical control when implementing logical access security?A . access profiles.B . userids.C . employee badges.D . passwords.View AnswerAnswer: C Explanation: Employee badges are considered Physical so would not be a logical control. The following answers are incorrect: userids. Is incorrect because userids are a...