Which of the following BEST describes what is happening?
A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163<UP, BROADCAST, RUNNING, MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1 Which of the following BEST describes what is happening?A . The server...
Which of the following commands should the administrator issue to configure MySQL successfully?
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?A . setenforce 0B . setenforce permissiveC . setenforce 1D . setenforce disabledView...
Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?
Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?A . BollardsB . Reflective glassC . Security guardsD . Security camerasView AnswerAnswer: A Explanation: Bollards are an example of a method that is used to prevent motor...
A server administrator must respond to tickets within a certain amount of time.
A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the: A. BIA. B. RTO. C. MTTR. D. SLA.View AnswerAnswer: D Explanation: The server administrator needs to adhere to the Service Level Agreement (SLA) when responding to tickets within a...
Which of the following policies would be BEST to deter a brute-force login attack?
Which of the following policies would be BEST to deter a brute-force login attack?A . Password complexityB . Password reuseC . Account age thresholdD . Account lockout thresholdView AnswerAnswer: D Explanation: The best policy to deter a brute-force login attack is account lockout threshold. A brute-force login attack is a...
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?A . Service-level agreementB . Disaster recovery planC . Business impact analysisD . Business continuity planView AnswerAnswer: B Explanation: A disaster recovery plan would be useful when trying to restore IT infrastructure...
Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server?
A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)A . Remote desktopB . IP KVMC...
Which of the following will MOST likely resolve the issue?
A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is...
Which of the following should the server administrator use to prevent this situation in the future?
Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?A . Cable managementB . Rail kitsC . A wireless connectionD . A power distribution unitView AnswerAnswer: A Explanation:...
Which of the following caused the issue?
A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands: Which of the following caused the issue?A . Duplicate IP addressB ....