Which of the following reduces the risk of known attacks from being successful?

Which of the following reduces the risk of known attacks from being successful?A . DLP techniquesB . Patching frequencyC . Mandatory access controlsD . Encryption methodsView AnswerAnswer: B

June 10, 2021 No Comments READ MORE +

Which of the following should be used to ensure access is controlled appropriately between devices?

Several servers are connected to a SAN using three storage devices and FCoE for transmissions. These servers only need to access one SAN device. All servers, the SAN, and the HBA are virtualized . Which of the following should be used to ensure access is controlled appropriately between devices? (Select...

June 10, 2021 No Comments READ MORE +

Monitoring alarms should be set based on:

Monitoring alarms should be set based on:A . A high point for every performance counter in the system.B . The point of application installation.C . Acceptable application performance criteria.D . Support availability.View AnswerAnswer: C

June 10, 2021 No Comments READ MORE +

Which of the following can be the root cause of this slow performing server?

Users have been reporting slow response times on a database server. The administrator noticed the server at any given time has between 30 to 50 users connected to various databases. Additional research shows disk metrics such as disk queuing and disk access rates are both around 10% to 15% ....

June 10, 2021 No Comments READ MORE +

Which of the following BEST defines this cloud delivery model?

A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company . Which of the following BEST defines this cloud delivery model?A...

June 10, 2021 No Comments READ MORE +

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?

Which of the following can be used to protect data integrity when information is being written to a SAN from multiple clients?A . Port ZoningB . SAN ZoningC . LUN MaskingD . MultipathingView AnswerAnswer: C

June 10, 2021 No Comments READ MORE +

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?

Which of the following should an administrator implement when connecting the company’s existing network to a public cloud environment to ensure confidentiality of data that is being transmitted?A . A proxy serverB . A load balancing solutionC . An IPSec tunnelD . A server clustering solutionView AnswerAnswer: C

June 10, 2021 No Comments READ MORE +

Ubiquitous access to cloud computing means:

Ubiquitous access to cloud computing means:A . access by any personB . access by any device through any network connectionC . access by authorized personnel onlyD . international access across country bordersView AnswerAnswer: B

June 9, 2021 No Comments READ MORE +

Which of the following should the administrator perform to accomplish this goal?

A company has decided to reduce their datacenter size. An administrator for the company has been tasked to virtualize many of the company’s servers . Which of the following should the administrator perform to accomplish this goal?A . P2VB . P2PC . V2PD . V2VView AnswerAnswer: A

June 9, 2021 No Comments READ MORE +

Which of the following is MOST important when working in highly available virtual environments?

Which of the following is MOST important when working in highly available virtual environments?A . Storage VLANB . Virtual networkC . Wide area networkD . Heartbeat VLANView AnswerAnswer: D

June 9, 2021 No Comments READ MORE +