Which of the following caused the issue?

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands: Which of the following caused the issue?A . Duplicate IP addressB ....

March 30, 2025 No Comments READ MORE +

Which of the following BEST describes the concept of right to downgrade?

Which of the following BEST describes the concept of right to downgrade?A . It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OSB . It allows a server to run...

March 27, 2025 No Comments READ MORE +

Which of the following backup types only records changes to the data blocks on a virtual machine?

Which of the following backup types only records changes to the data blocks on a virtual machine?A . DifferentialB . SnapshotC . IncrementalD . Synthetic fullView AnswerAnswer: B Explanation: The backup type that only records changes to the data blocks on a virtual machine is snapshot. A snapshot is a...

March 26, 2025 No Comments READ MORE +

Which of the following RAID levels should the administrator choose?

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?A . RAID 0B . RAID 1C . RAID 5D . RAID 6View AnswerAnswer: A Explanation: The RAID level that provides the highest possible capacity for...

March 25, 2025 No Comments READ MORE +

Which of the following are the MOST likely reasons?

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)A . The server has an architecture mismatchB . The system time is not synchronizedC . The technician does not have sufficient privilegesD . The external firewall...

March 24, 2025 No Comments READ MORE +

Which of the following commands would successfully mount the drive with the required parameters?

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?A...

March 23, 2025 No Comments READ MORE +

Which of the following types of data replication is required?

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?A . AsynchronousB . IncrementalC . Application consistentD . ConstantView AnswerAnswer: D Explanation: The type of data replication that is required for a hot-site disaster recovery model is constant. A hot site is a...

March 22, 2025 No Comments READ MORE +

Which of the following represent the BEST immediate actions to prevent unauthorized server access?

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and permissionsB...

March 22, 2025 No Comments READ MORE +

Which of the following commands should a technician use to identify the issue?

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?A . pvdisplayB . mountC . df -hD . fdisk -lView AnswerAnswer: C Explanation: The df...

March 22, 2025 No Comments READ MORE +

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Which of the following would a systems administrator implement to ensure all web traffic is secure?A . SSHB . SSLC . SMTPD . PGPView AnswerAnswer: B Explanation: Secure Sockets Layer (SSL): SSL and its successor Transport Layer Security (TLS) enable client and server computers to establish a secure connection session...

March 21, 2025 No Comments READ MORE +