Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?A . Encrypt the data that is leaving the SANB . Encrypt the data at restC . Encrypt the host serversD . Encrypt all the network trafficView AnswerAnswer: B...

September 23, 2024 No Comments READ MORE +

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Which of the following actions should a server administrator take once a new backup scheme has been configured?A . Overwrite the backupsB . Clone the configurationC . Run a restore testD . Check the media integrityView AnswerAnswer: C Explanation: The action that the server administrator should take once a new...

September 23, 2024 No Comments READ MORE +

Which of the following types of data replication is required?

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?A . AsynchronousB . IncrementalC . Application consistentD . ConstantView AnswerAnswer: D Explanation: The type of data replication that is required for a hot-site disaster recovery model is constant. A hot site is a...

September 23, 2024 No Comments READ MORE +

Which of the following should the technician do FIRST to return the server to service as soon as possible?

A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network. Which of the following should the technician do FIRST to return the server to service as soon as possible?A . Replace the NICB . Make...

September 23, 2024 No Comments READ MORE +

A snapshot is a feature that can be used in hypervisors to:

A snapshot is a feature that can be used in hypervisors to:A . roll back firmware updates.B . restore to a previous version.C . roll back application drivers.D . perform a backup restore.View AnswerAnswer: B Explanation: A snapshot is a feature that can be used in hypervisors to restore to...

September 23, 2024 No Comments READ MORE +

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSOB . LDAPC . TACACSD . MFAView AnswerAnswer: A Explanation: The term that is most likely part of the user authentication process when implementing SAML across multiple applications is...

September 22, 2024 No Comments READ MORE +

Which of the following is the BEST course of action for the technician to take while loading the rack?

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?A . Alternate the direction of the airflowB . Install the heaviest server at the bottom of the rackC . Place...

September 22, 2024 No Comments READ MORE +

Which of the following should the company also perform as a data loss prevention method?

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the servers...

September 22, 2024 No Comments READ MORE +

Which of the following server roles will the administrator MOST likely need to install?

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?A . MessagingB . ApplicationC . PrintD ....

September 22, 2024 No Comments READ MORE +

Which of the following subnet masks would be appropriate for this setup?

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0B . 255.255.255.128C . 255.255.255.240D . 255.255.255.254View AnswerAnswer:...

September 22, 2024 No Comments READ MORE +