Which of the following tools can the administrator use to access a command shell over the network?

An administrator needs to reconfigure a Linux server's operating system. Which of the following tools can the administrator use to access a command shell over the network? (Select TWO).A . Connect with SSHB . Connect with RDPC . Connect with VNCD . Connect with BASHE . Connect with FTPView AnswerAnswer:...

July 9, 2021 No Comments READ MORE +

Which of the following methodologies would be used to present the LUN to only that host?

A server administrator wants to isolate a SAN hosted LUN to be visible to only a single host. Which of the following methodologies would be used to present the LUN to only that host?A . LUN maskingB . LUN ID assignmentC . Port mappingD . Port zoningView AnswerAnswer: A

July 9, 2021 No Comments READ MORE +

Which of the following is the FIRST troubleshooting step?

A database server stops responding to requests, and the administrator suspects that the server is experiencing memory faults during heavy network traffic and database access. Which of the following is the FIRST troubleshooting step?A . Check the security log.B . Check the application logs.C . Check the debug report.D ....

July 8, 2021 No Comments READ MORE +

Which of the following voltages will MOST likely be available at the facility?

An administrator is tasked with deploying a server in a telephone switching station. Which of the following voltages will MOST likely be available at the facility?A . -48VDCB . 120VDCC . 220VACD . 440VACView AnswerAnswer: A

July 8, 2021 No Comments READ MORE +

Which of the following is the MAXIMUM number of half-height blades that can be installed in the chassis if six full-height blades are already installed?

A blade chassis can hold 16 half-height blades or eight full-height blades. Which of the following is the MAXIMUM number of half-height blades that can be installed in the chassis if six full-height blades are already installed?A . 2B . 4C . 8D . 16View AnswerAnswer: B

July 8, 2021 No Comments READ MORE +

Which of the following protocols is considered stateless and utilizes TCP when communicating between a server and client?

Which of the following protocols is considered stateless and utilizes TCP when communicating between a server and client?A . IMAPB . SMTPC . HTTPD . SSHView AnswerAnswer: C

July 8, 2021 No Comments READ MORE +

Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?

Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?A . Grant appropriate permissions to only users in the Accounting department for both the share and NTFSB . Grant...

July 8, 2021 No Comments READ MORE +

Network devices between two firewalls are included in which of the following?

Network devices between two firewalls are included in which of the following?A . VPNB . SANC . VLAND . DMZView AnswerAnswer: D

July 8, 2021 No Comments READ MORE +

Which of the following involves finding and correcting the MOST important reason for performance issues?

Which of the following involves finding and correcting the MOST important reason for performance issues?A . Root cause analysisB . Replicating the problemC . Defining preventative actionD . Theory of probable causeView AnswerAnswer: A

July 8, 2021 No Comments READ MORE +

Which of the following is the purpose of an NTP server?

Which of the following is the purpose of an NTP server?A . For hosting instant messaging applicationsB . For synchronizing clocks on network devicesC . For file sharing and collaborationD . For hosting newsgroupsView AnswerAnswer: B

July 7, 2021 No Comments READ MORE +