Which of the following ports should the technician use?
A technician is configuring a server that requires secure remote access . Which of the following ports should the technician use?A . 21 B. 22 C. 23 D. 443View AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/windows-server/remote/remote-access/ras/manage-remote-clients/install/step-1-configure-the-remote-access-infrastructure
Which of me following should be placed at the top of a Bash script to ensure it can be executed?
Which of me following should be placed at the top of a Bash script to ensure it can be executed?A . bash B. !execute C. #! D. @eacho offView AnswerAnswer: C
Which of the following should the technician attempt FIRST to resolve the issue?
A user reports that a server is not accessible. A technician sees the following message on the server: PXE server not found . Which of the following should the technician attempt FIRST to resolve the issue?A . Ensure the network cable is properly connected and reboot the server. B. Eject...
Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?
A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications . Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?A . Snapshot B....
Which of the following tiles should be edited to complete this task?
An administrator needs to disable root login over SSH . Which of the following tiles should be edited to complete this task?A . /root.ssh/sshd/config B. /etc.ssh/sshd_config C. /root/.ssh/ssh_config D. /etc.sshs_shd_configView AnswerAnswer: B
Which of the following backup methods does this describe?
A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used . Which of the following backup methods does this describe?A . Open file B. Synthetic full C. Full Incremental D. Full differentialView AnswerAnswer: A
Which of the following is the BEST way to protect the data from leaking?
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration . Which of the following is the BEST way to protect the data from leaking?A ....
Which of the following does the administrator need to install to make the website trusted?
A server administrator has configured a web server . Which of the following does the administrator need to install to make the website trusted?A . PKI B. SSL C. LDAP D. DNSView AnswerAnswer: A Explanation: Reference: https://www.csoonline.com/article/3400836/what-is-pki-and-how-it-secures-just-about-everything-online.html
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-based B. Role-based C. Location-based D. Rule-basedView AnswerAnswer: B
Which of the following disk types will serve this purpose?
An administrator is configuring a server that will host a high-performance financial application . Which of the following disk types will serve this purpose?A . SAS SSD B. SATA SSD C. SAS drive with 10000rpm D. SATA drive with 15000rpmView AnswerAnswer: A Explanation: Reference: https://www.hp.com/us-en/shop/tech-takes/sas-vs-sata