Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?A . TelnetB . RobocopyC . XCOPYD . SCPView AnswerAnswer: D Explanation: The administrator should use SCP to transfer log files from a Linux server to a Windows workstation. SCP (Secure...
Which of the following would MOST likely cause this issue?
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers...
Which of the following is the MOST appropriate native protocol to use for this task?
A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?A . CIFSB . FTPC . SFTPD . NFSView AnswerAnswer: D Explanation: The most appropriate native protocol to use for connecting a Linux...
Which of the following would be the MOST efficient way to perform this task?
A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?A . Snapshot a VM.B . Use a physical host.C . Perform a P2V conversion.D . Use a VM...
Which of the following are the MOST likely reasons?
A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)A . The server has an architecture mismatchB . The system time is not synchronizedC . The technician does not have sufficient privilegesD . The external firewall...
Which of the following tools will analyze network logs in real time to report on suspicious log events?
Which of the following tools will analyze network logs in real time to report on suspicious log events?A . SyslogB . DLPC . SIEMD . HIPSView AnswerAnswer: C Explanation: SIEM is the tool that will analyze network logs in real time to report on suspicious log events. SIEM stands for...
Which of the following technologies is the new connection using?
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using? A. iSCSI B. eSATA C. NFS D. FcoEView AnswerAnswer: A...
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?A . VBSB . ShellC . JavaD . PowerShellE . BatchView AnswerAnswer: B Explanation: Shell is the most appropriate scripting language to use for a logon script for a Linux box....
Which of the following is an example of load balancing?
Which of the following is an example of load balancing?A . Round robinB . Active-activeC . Active-passiveD . FailoverView AnswerAnswer: A Explanation: Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load...
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC . Shut...