Which of the following should the administrator have done FIRST before migrating this server?
After an administrator successfully migrated the last physical application server to a virtual environment, the help desk reported slow performance . Which of the following should the administrator have done FIRST before migrating this server?A . Apply operating system patches to the application server after the migration.B . Contact the...
Which of the following storage technologies is file-based?
Which of the following storage technologies is file-based?A . WANB . DASC . SAND . NASView AnswerAnswer: D
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?
Which of the following detection controls can be used to identify an unauthorized individual who accessed a remote network share?A . ObfuscationB . AuthenticationC . Log reviewD . LUN maskingView AnswerAnswer: C
Which of the following should the company revise?
A catastrophic disk failure occurred on a company’s critical database. After a technician performs a full system restore, one of the business units realizes that the current backup does not hold fresh enough information . Which of the following should the company revise?A . RTOB . MTTRC . RPOD ....
Which of the following tools could the technician use?
A technician would like to connect to a virtual server from inside the network, using a desktop computer . Which of the following tools could the technician use?A . HTTPB . RDPC . IMAPD . SSLView AnswerAnswer: B
Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?
Which of the following cloud services provides billing, payroll, contract management, and human resource management functions?A . CaaSB . SaaSC . BPaaSD . DaaSView AnswerAnswer: C
To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:
To avoid the same LUN showing up multiple times in client hosts, an administrator should implement:A . Multipathing softwareB . Multiple HBAsC . Multiple zonesD . Multiple initiatorsView AnswerAnswer: A
Which of the following would be used to prove the existence of vulnerabilities on a network?
Which of the following would be used to prove the existence of vulnerabilities on a network?A . Penetration testingB . Vulnerability assessmentC . Business impact analysisD . Risk assessmentView AnswerAnswer: A
Which of the following is a MINIMUM requirement for VM online migration?
Which of the following is a MINIMUM requirement for VM online migration?A . Same CPU family between source and target hosts.B . Same network equipment between source and target hosts.C . Same hardware vendor for the datacenter.D . Same hypervisor versions between source and target hosts.View AnswerAnswer: A
Which of the following should the administrator perform?
An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers . Which of the following should the administrator perform?A . Migrate servers using V2V technologyB . Perform an offline migration...