Which of the following open ports should be closed to secure the server properly? (Choose two.)
Which of the following open ports should be closed to secure the server properly? (Choose two.)A . 21B . 22C . 23D . 53E . 443F . 636View AnswerAnswer: A,C Explanation: Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html
Which of the following should the company also perform as a data loss prevention method?
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy . Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the...
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)A . Perform a root cause analysisB . Develop a plan of actionC . Document the findingsD . Escalate the issueE . Scope the issueF . Notify the usersView AnswerAnswer: C,F
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?A . Service-level agreementB . Disaster recovery planC . Business impact analysisD . Business continuity planView AnswerAnswer: B
Which of the following would MOST likely cause this issue?
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers...
Which of the following would MOST likely help the analyst determine if the applications are running?
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server . Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A...
Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?
Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?A . SLAB . MTBFC . RTOD . MTTRView AnswerAnswer: C Explanation: Reference: https://whatis.techtarget.com/definition/recovery-time-objective-RTO
Which of the following is the BEST solution?
A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible . Which of the following is the BEST solution?A . Copy the fileshare to an LTO-4 tape driveB . Configure a new incremental backup job for...
Which of the following should the technician attempt FIRST to resolve the issue?
A user reports that a server is not accessible. A technician sees the following message on the server: PXE server not found . Which of the following should the technician attempt FIRST to resolve the issue?A . Ensure the network cable is properly connected and reboot the server.B . Eject...