Which of the following should be performed to harden a guest OS?

An administrator is creating a new VM template and has a requirement that the OS must be hardened . Which of the following should be performed to harden a guest OS?A . Encrypt the hard driveB . Run defragC . Rename administrator accountD . Change page fileView AnswerAnswer: C

June 17, 2021 No Comments READ MORE +

Which of the following methods would be the FIRST method for relocating the server to the new data center?

A datacenter migration is taking place and the administrator has been tasked with reducing the footprint of the new datacenter by virtualizing as many servers as possible. A physical server has been flagged as a candidate for relocation to the new data center . Which of the following methods would...

June 17, 2021 No Comments READ MORE +

Which of the following would the administrator utilize?

A system administrator wants to create a mitigation strategy to quickly roll back a virtual image after applying the latest updates . Which of the following would the administrator utilize?A . File backupB . SnapshotC . Offline backupD . Image backupView AnswerAnswer: B

June 17, 2021 No Comments READ MORE +

This type of setup is an example of which of the following?

A server has two power supplies such that when the first one fails, the second one automatically is used to provide power to the server. This type of setup is an example of which of the following?A . LatencyB . ReplicationC . RedundancyD . FailbackView AnswerAnswer: C

June 17, 2021 No Comments READ MORE +

Which of the following uses the business model of shared resources in a cloud environment?

Which of the following uses the business model of shared resources in a cloud environment?A . ElasticityB . Self-serveC . Cloud burstingD . Multi-tenancyView AnswerAnswer: D

June 17, 2021 No Comments READ MORE +

In which of the following cloud services will the customer be responsible for securing provisioned hosts?

In which of the following cloud services will the customer be responsible for securing provisioned hosts?A . PaaSB . IaaSC . SaaSD . DaaSView AnswerAnswer: B

June 16, 2021 No Comments READ MORE +

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?

Which of the following could be reviewed on devices to help determine whether unauthorized access has occurred?A . AntivirusB . FirewallC . Audit logsD . IDSView AnswerAnswer: C

June 16, 2021 No Comments READ MORE +

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?

Which of the following would be used to establish a dedicated connection in a hybrid cloud environment?A . CHAPB . AESC . PKID . VPNView AnswerAnswer: D

June 16, 2021 No Comments READ MORE +

Which of the following MUST be in a zone? (Select TWO).

Which of the following MUST be in a zone? (Select TWO).A . InitiatorB . TargetC . CNAD . HBAE . Fibre ChannelView AnswerAnswer: A,B

June 16, 2021 No Comments READ MORE +

Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?

Which of the following hypervisor types runs on a host operating system that provides virtualization services, including memory management and device support?A . Type II hypervisorB . Proprietary hypervisorC . Type I hypervisorD . Open source hypervisorView AnswerAnswer: A

June 16, 2021 No Comments READ MORE +