Which of the following policies would be BEST to deter a brute-force login attack?
Which of the following policies would be BEST to deter a brute-force login attack?A . Password complexityB . Password reuseC . Account age thresholdD . Account lockout thresholdView AnswerAnswer: D Explanation: The best policy to deter a brute-force login attack is account lockout threshold. A brute-force login attack is a...
Which of the following actions should the technician take to complete this task as efficiently as possible?
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?A . Take a snapshot of the original VMB . Clone the original VMC . Convert the original VM to use dynamic disksD ....
Which of the following is the BEST way to protect the data from leaking?
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?A . Utilize...
Which of the following IP addresses should the administrator use to be in compliance with the standard?
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?A . 11.251.196.241B . 171.245.198.241C . 172.16.19.241D . 193.168.145.241View AnswerAnswer: C Explanation:...
Which of the following cluster features will allow Ann to complete this task?
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which...
Which of the following commands should the administrator issue to configure MySQL successfully?
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?A . setenforce 0B . setenforce permissiveC . setenforce 1D . setenforce disabledView...
On which of the following drive types should the technician install the hypervisor?
A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?A . SD cardB . NAS...
Which of the following is typical of software licensing in the cloud?
Which of the following is typical of software licensing in the cloud?A . Per socketB . PerpetualC . Subscription-basedD . Site-basedView AnswerAnswer: C Explanation: Cloud software licensing refers to the process of managing and storing software licenses in the cloud. The benefits of cloud software licensing models are vast. The...
Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following: dr-xr-xr-- /home/Ann Which of the following commands should the administrator use to resolve the issue...
Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?
A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?A . Install security camerasB . Utilize security guardsC . Install bollardsD . Install a mantrapView AnswerAnswer: C Explanation:...