Which of the following subnet masks would be appropriate for this setup?

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0 B. 255.255.255.128 C. 255.255.255.240 D. 255.255.255.254View AnswerAnswer:...

July 22, 2023 No Comments READ MORE +

Which of the following is the MOST likely system vulnerability?

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?A . Insider threat B. Worms C. Ransomware D. Open ports E. Two-person integrityView AnswerAnswer: A Explanation: Insider threat is the most likely system vulnerability in...

July 21, 2023 No Comments READ MORE +

Which of the following is the BEST course of action for the technician to take while loading the rack?

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?A . Alternate the direction of the airflow B. Install the heaviest server at the bottom of the rack C. Place...

July 21, 2023 No Comments READ MORE +

Which of the following would be the company’s BEST course of action?

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?A . Upgrade the application package B. Tighten the rules on the firewall C. Install antivirus software D. Patch...

July 21, 2023 No Comments READ MORE +

Which of the following RAID levels should the administrator choose?

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?A . RAID 0 B. RAID 1 C. RAID 5 D. RAID 6View AnswerAnswer: A Explanation: The RAID level that provides the highest possible capacity for...

July 21, 2023 No Comments READ MORE +

Which of the following should the administrator implement FIRST to address the issue?

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?A ....

July 21, 2023 No Comments READ MORE +

Which of the following is the MOST likely reason for the connection failure?

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To...

July 21, 2023 No Comments READ MORE +

Which of the following is typical of software licensing in the cloud?

Which of the following is typical of software licensing in the cloud?A . Per socket B. Perpetual C. Subscription-based D. Site-basedView AnswerAnswer: C Explanation: Cloud software licensing refers to the process of managing and storing software licenses in the cloud. The benefits of cloud software licensing models are vast. The...

July 20, 2023 No Comments READ MORE +

Which of the following is the MOST appropriate native protocol to use for this task?

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?A . CIFS B. FTP C. SFTP D. NFSView AnswerAnswer: D Explanation: The most appropriate native protocol to use for connecting a Linux...

July 20, 2023 No Comments READ MORE +

Which of the following represent the BEST immediate actions to prevent unauthorized server access?

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and permissions...

July 20, 2023 No Comments READ MORE +