Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSOB . LDAPC . TACACSD . MFAView AnswerAnswer: A Explanation: The term that is most likely part of the user authentication process when implementing SAML across multiple applications is...

January 2, 2024 No Comments READ MORE +

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume.

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:A . hardware is UEFI compliantB . volume is formatted as GPTC ....

January 1, 2024 No Comments READ MORE +

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-basedB . Role-basedC . Location-basedD . Rule-basedView AnswerAnswer: B Explanation: The access control methodology that can be described best as allowing a...

January 1, 2024 No Comments READ MORE +

Which of the following are the MOST likely reasons?

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)A . The server has an architecture mismatchB . The system time is not synchronizedC . The technician does not have sufficient privilegesD . The external firewall...

January 1, 2024 No Comments READ MORE +

Which of the following represent the BEST immediate actions to prevent unauthorized server access?

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and permissionsB...

January 1, 2024 No Comments READ MORE +

Which of the following is the BEST way to protect the data from leaking?

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?A . Utilize...

January 1, 2024 No Comments READ MORE +

Which of the following is the BEST course of action for the technician to take while loading the rack?

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?A . Alternate the direction of the airflowB . Install the heaviest server at the bottom of the rackC . Place...

January 1, 2024 No Comments READ MORE +

Which of the following would be the BEST way to complete this request?

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this...

January 1, 2024 No Comments READ MORE +

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?A . RTOB . MTBFC . PROD . MTTRView AnswerAnswer: C

January 1, 2024 No Comments READ MORE +

Which of the following actions should the technician take to complete this task as efficiently as possible?

A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?A . Take a snapshot of the original VMB . Clone the original VMC . Convert the original VM to use dynamic disksD ....

December 31, 2023 No Comments READ MORE +