Which of the following command line tools should the administrator run to view available disk space on the partition?
A technician is troubleshooting a Linux server and wants to inspect the free disk space on the /dev/sda partition of the system. Which of the following command line tools should the administrator run to view available disk space on the partition?A . ddB . duC . lsD . dfView AnswerAnswer:...
Which of the following provides two-factor authentication?
Which of the following provides two-factor authentication?A . Bank card and PIC . Username and password.D . Fingerprint and iris scan.E . Key and proximity badge.View AnswerAnswer: A
A certain rack mounted blade server chassis needs 3-phase power for operation. There is currently only single-phase power coming into the room.
A certain rack mounted blade server chassis needs 3-phase power for operation. There is currently only single-phase power coming into the room. The administrator needs to:A . call an electrician to wire the single-phase power into 3-phase power.B . use a single-phase UPS to power the 3-phase server.C . call...
Which of the following cable choices would produce the BEST throughput?
A server technician is connecting a server to a switch in the server room. Both the server and the switch are equipped with 10 Gigabit Ethernet adapters. Which of the following cable choices would produce the BEST throughput?A . CAT6 rollover cableB . CAT5e straight-through cableC . CAT6 straight-through cableD...
Which of the following describes how the NICs should be configured for fault protection?
A server technician is replacing a web server in an organization. The new server has two integrated NICs. Which of the following describes how the NICs should be configured for fault protection?A . The NICs should be configured separately with one MAC address.B . The NICs should be placed into...
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?A . Store the information encrypted and offline in a storage safe.B . Encrypt the information using a zip file with a password.C . Utilize a drive with full...
Which of the following should the technician do FIRST?
A technician needs to install additional memory in a server to help resolve performance issues. Which of the following should the technician do FIRST?A . Perform an impact analysis.B . Follow change management procedures.C . Install the additional memory.D . Update system firmware.View AnswerAnswer: B
Which of the following specifications should the technician examine?
A technician needs to add a processor to a server. Which of the following specifications should the technician examine? (Select THREE).A . Bus multiplierB . Processor speedC . Socket typeD . Processor steppingE . L3 cache sizeF . Thermal specificationsView AnswerAnswer: B,C,D
Which of the following BEST describes how the network hardware on the server should be configured?
A server administrator is configuring a new server for an organization. The server will function as a firewall and proxy server, as well as provide NAT services for other devices on the network. Which of the following BEST describes how the network hardware on the server should be configured?A ....
Which of the following could validate this hypothesis?
A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access. Which of the following could validate this hypothesis?A . Port scannerB . Cipher toolsC . Checksum analyzerD . TDRView AnswerAnswer: A