Which of the following allows for a connection of devices to both sides inside of a blade enclosure?
Which of the following allows for a connection of devices to both sides inside of a blade enclosure?A . MidplaneB . Active backplaneC . Passive backplaneD . Management moduleView AnswerAnswer: A Explanation: The component that allows for a connection of devices to both sides inside of a blade enclosure is...
Which of the following will correctly map a script to a home directory for a user based on username?
Which of the following will correctly map a script to a home directory for a user based on username?A . \serverusers$usernameB . \server%username%C . \serverFirstInitialLastNameD . \server$username$View AnswerAnswer: B Explanation: The administrator should use server%username% to correctly map a script to a home directory for a user based on username....
Which of the following should the administrator use to access the server’s console?
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?A . IP KVMB . VNCC . A crash cartD . RDPE . SSHView AnswerAnswer: A Explanation: The administrator should use an IP KVM...
Which of the following is a storage protocol that the administrator is MOST likely using to save this data?
A server administrator is exporting Windows system files before patching and saving them to the following location: \server1ITDept Which of the following is a storage protocol that the administrator is MOST likely using to save this data?A . eSATAB . FCoEC . CIFSD . SASView AnswerAnswer: C Explanation: The storage...
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?A . Live failoverB . Simulated failoverC . AsynchronousD . TabletopView AnswerAnswer: D Explanation: The DR testing scenario that is described as verbally walking through each...
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?A . BridgedB . NATC . Host onlyD . vSwitchView AnswerAnswer: B Explanation: The method that would allow multiple VMs to share the same host IP address is NAT....
Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?
A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?A . SnapshotB . DeduplicationC...
Which of the following subnet masks would be appropriate for this setup?
A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0B . 255.255.255.128C . 255.255.255.240D . 255.255.255.254View AnswerAnswer:...
Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows: The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 Default gateway: 192.168.10.1 A ping sent to the default gateway is...
Which of the following should the company also perform as a data loss prevention method?
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the servers...