Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?
Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?A . Grant appropriate permissions to only users in the Accounting department for both the share and NTFSB . Grant...
Which of the following command line tools should the administrator run to view available disk space on the partition?
A technician is troubleshooting a Linux server and wants to inspect the free disk space on the /dev/sda partition of the system. Which of the following command line tools should the administrator run to view available disk space on the partition?A . ddB . duC . lsD . dfView AnswerAnswer:...
Network devices between two firewalls are included in which of the following?
Network devices between two firewalls are included in which of the following?A . VPNB . SANC . VLAND . DMZView AnswerAnswer: D
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?A . Store the information encrypted and offline in a storage safe.B . Encrypt the information using a zip file with a password.C . Utilize a drive with full...
Which of the following should the administrator reference prior to purchasing physical servers to be deployed as hosts in the new virtual architecture?
An organization has agreed on the software that will be used to virtualize the company's web servers. Which of the following should the administrator reference prior to purchasing physical servers to be deployed as hosts in the new virtual architecture?A . The vendor's software compatibility listB . The vendor's service...
Which of the following changes should the server administrator make?
Users on a network segment report that they are unable to connect to a newly installed file server. The file server IP address settings are as follows: IP address: 10.0.10.254 Subnet Mask: 255.255.255.0 Default Gateway: 10.10.10.1 Which of the following changes should the server administrator make?A . Change the IP...
Based on this report, which of the following represents the MINIMUM storage requirements needed?
A server administrator is researching the purchase of SSD for a server. The administrator receives a report from the datacenter technician detailing current storage requirements and future growth planning estimates as follows: ServerA: Current-15TB-Future-50% growth ServerB: Current-20TB-Future-80% growth Based on this report, which of the following represents the MINIMUM storage...
Which of the following types of site is the administrator currently using?
An administrator is updating the server infrastructure at a company's disaster recovery site. Currently, an enormous amount of effort is required by the administrator to replicate operations. Which of the following types of site is the administrator currently using?A . Cold siteB . Hot siteC . Warm siteD . Replication...
Which of the following has the administrator MOST likely violated?
A customer reports that connectivity to their web server has been sporadic throughout the morning. An administrator has applied OS patches periodically throughout the morning and rebooted the server. Which of the following has the administrator MOST likely violated?A . Service level agreementB . Mean time before failureC . Mean...
As a best practice, which of the following should be determined prior to provisioning a server? (Select TWO).
As a best practice, which of the following should be determined prior to provisioning a server? (Select TWO).A . User accountsB . Group accountsC . HostnameD . MAC addressE . Domain nameF . IP addressView AnswerAnswer: CF