Which of the following would be the MOST efficient way to perform this task?
A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?A . Snapshot a VM.B . Use a physical host.C . Perform a P2V conversion.D . Use a VM...
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?A . BridgedB . NATC . Host onlyD . vSwitchView AnswerAnswer: B Explanation: The method that would allow multiple VMs to share the same host IP address is NAT....
Which of the following would MOST likely help the analyst determine if the applications are running?
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A port...
Which of the following technologies is the new connection using?
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using? A. iSCSI B. eSATA C. NFS D. FcoEView AnswerAnswer: A...
Which of the following should the company also perform as a data loss prevention method?
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the servers...
Which of the following is a storage protocol that the administrator is MOST likely using to save this data?
A server administrator is exporting Windows system files before patching and saving them to the following location: \server1ITDept Which of the following is a storage protocol that the administrator is MOST likely using to save this data?A . eSATAB . FCoEC . CIFSD . SASView AnswerAnswer: C Explanation: The storage...
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?A . Live failoverB . Simulated failoverC . AsynchronousD . TabletopView AnswerAnswer: D Explanation: The DR testing scenario that is described as verbally walking through each...
Which of the following is the MOST appropriate native protocol to use for this task?
A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?A . CIFSB . FTPC . SFTPD . NFSView AnswerAnswer: D Explanation: The most appropriate native protocol to use for connecting a Linux...
Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?A...
Which of the following IP addresses should the administrator use to be in compliance with the standard?
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?A . 11.251.196.241B . 171.245.198.241C . 172.16.19.241D . 193.168.145.241View AnswerAnswer: C Explanation:...