A system administrator has decided to create several VMs for a company. In which of the following locations would each of the VMs reside?

A system administrator has decided to create several VMs for a company. In which of the following locations would each of the VMs reside?A . HostB . VNCC . GuestD . VPNView AnswerAnswer: A

October 19, 2018 No Comments READ MORE +

Which of the following has MOST likely caused the print server to stop processing print jobs?

A server in a small company functions as a print server. Suddenly it stops sending print jobs to the printers. A technician verifies that the printers are working correctly. Additionally, the print spooler had been restarted and is running on the server, it is accessible from workstations, and it shows...

October 18, 2018 No Comments READ MORE +

Which of the following represents the FIRST action that should be taken by the server technician?

A server technician in a datacenter configures a daemon to monitor the battery health in a UPS. Over a two day time period, the daemon generates a warning message. Which of the following represents the FIRST action that should be taken by the server technician?A . Perform a test on...

October 16, 2018 No Comments READ MORE +

Which of the following should be implemented on the server so that storage growth is restricted?

An administrator is developing a storage growth plan for a new file server. Which of the following should be implemented on the server so that storage growth is restricted?A . Disk quotasB . Disk compressionC . Automatic usage reportsD . Automatic defragmentationView AnswerAnswer: A

October 16, 2018 No Comments READ MORE +

When attempting to diagnose service access issues between multiple hosts that coordinate information, which of the following can be used to track dependencies?

When attempting to diagnose service access issues between multiple hosts that coordinate information, which of the following can be used to track dependencies?A . Dataflow diagramsB . Architecture diagramsC . Baseline documentationD . Service manualsView AnswerAnswer: A

October 15, 2018 No Comments READ MORE +

Which of the following types of site does the company have?

A technician has traveled to a company's alternate site to assess current operations of the network infrastructure. Following the assessment, the technician has informed management that everything is operational, with all applications and data mirrored. Which of the following types of site does the company have?A . Warm siteB ....

October 14, 2018 No Comments READ MORE +

Which of the following would achieve this requirement?

A technician is tasked to build a server requiring the fastest possible performance. Which of the following would achieve this requirement?A . 10,000 RPM SATAB . 15,000 RPM SASC . SSDD . USBView AnswerAnswer: C

October 12, 2018 No Comments READ MORE +

Which of the following describes how the NICs should be configured for fault protection?

A server technician is replacing a web server in an organization. The new server has two integrated NICs. Which of the following describes how the NICs should be configured for fault protection?A . The NICs should be configured separately with one MAC address.B . The NICs should be placed into...

October 11, 2018 No Comments READ MORE +

Based on this report, which of the following represents the MINIMUM storage requirements needed?

A server administrator is researching the purchase of SSD for a server. The administrator receives a report from the datacenter technician detailing current storage requirements and future growth planning estimates as follows: ServerA: Current-15TB-Future-50% growth ServerB: Current-20TB-Future-80% growth Based on this report, which of the following represents the MINIMUM storage...

October 9, 2018 No Comments READ MORE +

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?A . Store the information encrypted and offline in a storage safe.B . Encrypt the information using a zip file with a password.C . Utilize a drive with full...

October 6, 2018 No Comments READ MORE +