Which of the following is an example of two-factor authentication when accessing a virtual server?

Which of the following is an example of two-factor authentication when accessing a virtual server?A . Multiple usernames/passwords for all websitesB . Username/password, fingerprint scanner, and key fobC . Username/password and PIND . Username/password and fingerprintsView AnswerAnswer: D

June 19, 2021 No Comments READ MORE +

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?

Which of the following will explain why only some of the CPU cycles are available to a virtualized server using two virtualized processors?A . Extra processing is needed to store encryption keys used for secure transmission between the server and the network.B . Additional processing is used to run ports...

June 19, 2021 No Comments READ MORE +

Which of the following access control types allows users to assign security attributes to objects such as files and directories?

Which of the following access control types allows users to assign security attributes to objects such as files and directories?A . Role basedB . MandatoryC . DiscretionaryD . Rule set basedView AnswerAnswer: C

June 19, 2021 No Comments READ MORE +

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?

Which of the following can be done after an administrator deploys a virtual server to ensure that the server vNIC can communicate to the physical network?A . Bridge the vNICB . Set the vNIC speed to half-duplexC . Add an addition vNICD . Set the vNIC speed to full-duplexView AnswerAnswer:...

June 19, 2021 No Comments READ MORE +

Which of the following should be implemented?

A company has multiple guest operating systems running in a virtual environment. An administrator would like to ensure all servers consistently receive the same IP addresses . Which of the following should be implemented?A . Soft limit quotasB . ReservationsC . Resource poolingD . Entitlement allocationsView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following could cause this connectivity issue?

Some of the VMs in an environment are experiencing network connectivity loss. The VM management network has no connectivity issues . Which of the following could cause this connectivity issue?A . NIC teaming is disabledB . Faulty host NIC portC . Wrong NIC load balancing modeD . Slow NICView AnswerAnswer:...

June 18, 2021 No Comments READ MORE +

Which of the following cloud characteristics should be in place to handle the possible spike in demand?

A small startup wins a contest giving them advertising time during a major sporting event . Which of the following cloud characteristics should be in place to handle the possible spike in demand?A . Shared disk spaceB . ElasticityC . ScalabilityD . Shared memoryView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?

Which of the following solutions primarily relies on private cloud resources but may use public cloud resources based on capacity requirements?A . Rapid deploymentB . Cloud burstingC . Multi-tenancyD . Pay-as-you-growView AnswerAnswer: B

June 18, 2021 No Comments READ MORE +

Which of the following should the technician configure?

A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational . Which of the following should the technician configure?A . RAID 0B . RAID 1C . RAID 5D . RAID 6View AnswerAnswer: D

June 18, 2021 No Comments READ MORE +

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?

Which of the following should an administrator perform to harden a VM that has been provisioned in a public cloud environment before deploying the system?A . Defrag systemB . Update driversC . Disable firewallD . Patch systemView AnswerAnswer: D

June 18, 2021 No Comments READ MORE +