Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?A . VBSB . ShellC . JavaD . PowerShellE . BatchView AnswerAnswer: B Explanation: Shell is the most appropriate scripting language to use for a logon script for a Linux box....

December 31, 2023 No Comments READ MORE +

Which of the following server types would benefit MOST from the use of a load balancer?

Which of the following server types would benefit MOST from the use of a load balancer?A . DNS serverB . File serverC . DHCP serverD . Web serverView AnswerAnswer: D Explanation: The server type that would benefit most from the use of a load balancer is web server. A web...

December 30, 2023 No Comments READ MORE +

Which of the following BEST describes how the server administrator can accomplish this task?

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?A . Create a group that includes all users and assign it to an ACL.B . Assign individual...

December 30, 2023 No Comments READ MORE +

Which of the following RAID levels should the technician configure for this drive array?

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician...

December 30, 2023 No Comments READ MORE +

Which of the following would be the company’s BEST course of action?

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?A . Upgrade the application packageB . Tighten the rules on the firewallC . Install antivirus softwareD . Patch...

December 30, 2023 No Comments READ MORE +

Which of the following are MOST likely causing the issue?

A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue? (Choose two.)A...

December 30, 2023 No Comments READ MORE +

Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?A...

December 30, 2023 No Comments READ MORE +

Which of the following would resolve this concern?

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)A . RFIDB . Proximity readersC . Signal blockingD . CamouflageE . Reflective glassF . BollardsView AnswerAnswer: C, E Explanation:...

December 30, 2023 No Comments READ MORE +

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following: dr-xr-xr-- /home/Ann Which of the following commands should the administrator use to resolve the issue...

December 30, 2023 No Comments READ MORE +

Which of the following would MOST likely help the analyst determine if the applications are running?

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A port...

December 29, 2023 No Comments READ MORE +