Which of the following ports should the technician use?
A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?A . 21 B. 22 C. 23 D. 443View AnswerAnswer: B Explanation: The technician should use port 22 to configure a server that requires secure remote access. Port 22 is the...
Which of the following commands should a technician use to identify the issue?
A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?A . pvdisplay B. mount C. df -h D. fdisk -lView AnswerAnswer: C Explanation: The df...
Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?A . Encrypt the data that is leaving the SAN B. Encrypt the data at rest C. Encrypt the host servers D. Encrypt all the network trafficView AnswerAnswer: B
Which of the following actions should a server administrator take once a new backup scheme has been configured?
Which of the following actions should a server administrator take once a new backup scheme has been configured?A . Overwrite the backups B. Clone the configuration C. Run a restore test D. Check the media integrityView AnswerAnswer: C Explanation: The action that the server administrator should take once a new...
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSO B. LDAP C. TACACS D. MFAView AnswerAnswer: A Explanation: The term that is most likely part of the user authentication process when implementing SAML across multiple applications is...
Which of the following is an example of load balancing?
Which of the following is an example of load balancing?A . Round robin B. Active-active C. Active-passive D. FailoverView AnswerAnswer: A Explanation: Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load...
Which of the following subnet masks would be appropriate for this setup?
A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0 B. 255.255.255.128 C. 255.255.255.240 D. 255.255.255.254View AnswerAnswer:...
Which of the following is the MOST likely system vulnerability?
A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?A . Insider threat B. Worms C. Ransomware D. Open ports E. Two-person integrityView AnswerAnswer: A Explanation: Insider threat is the most likely system vulnerability in...
Which of the following is the BEST course of action for the technician to take while loading the rack?
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?A . Alternate the direction of the airflow B. Install the heaviest server at the bottom of the rack C. Place...
Which of the following would be the company’s BEST course of action?
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?A . Upgrade the application package B. Tighten the rules on the firewall C. Install antivirus software D. Patch...