Which of the following is causing the issue?
A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP...
Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows: The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 Default gateway: 192.168.10.1 A ping sent to the default gateway is...
A server administrator must respond to tickets within a certain amount of time.
A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the: A. BIA. B. RTO. C. MTTR. D. SLA.View AnswerAnswer: D
Which of the following is the BEST way to protect the data from leaking?
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration . Which of the following is the BEST way to protect the data from leaking?A ....
Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries . Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same...
Which of the following commands should the administrator issue to configure MySQL successfully?
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?A . setenforce 0B . setenforce permissiveC . setenforce 1D . setenforce disabledView...
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....
Which of the following should the administrator do to prevent this situation in the future?
Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off . Which of the following should the administrator do to prevent this situation in the future?A . Connect the server to a KVMB . Use cable...
Which of the following open ports should be closed to secure the server properly? (Choose two.)
Which of the following open ports should be closed to secure the server properly? (Choose two.)A . 21B . 22C . 23D . 53E . 443F . 636View AnswerAnswer: A,C Explanation: Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-basedB . Role-basedC . Location-basedD . Rule-basedView AnswerAnswer: B