Which of the following is an example of load balancing?

Which of the following is an example of load balancing?A . Round robinB . Active-activeC . Active-passiveD . FailoverView AnswerAnswer: A Explanation: Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load...

May 10, 2025 No Comments READ MORE +

Which of the following will correctly map a script to a home directory for a user based on username?

Which of the following will correctly map a script to a home directory for a user based on username?A . \serverusers$usernameB . \server%username%C . \serverFirstInitialLastNameD . \server$username$View AnswerAnswer: B Explanation: The administrator should use server%username% to correctly map a script to a home directory for a user based on username....

May 9, 2025 No Comments READ MORE +

Which of the following would be the BEST way to complete this request?

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this...

May 9, 2025 No Comments READ MORE +

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?A . SLAB . MTBFC . RTOD . MTTRView AnswerAnswer: C Explanation: The term that best describes the amount of time a company can afford to...

May 9, 2025 No Comments READ MORE +

A snapshot is a feature that can be used in hypervisors to:

A snapshot is a feature that can be used in hypervisors to:A . roll back firmware updates.B . restore to a previous version.C . roll back application drivers.D . perform a backup restore.View AnswerAnswer: B Explanation: A snapshot is a feature that can be used in hypervisors to restore to...

May 8, 2025 No Comments READ MORE +

Which of the following would be the MOST efficient way to perform this task?

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?A . Snapshot a VM.B . Use a physical host.C . Perform a P2V conversion.D . Use a VM...

May 6, 2025 No Comments READ MORE +

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?A . BridgedB . NATC . Host onlyD . vSwitchView AnswerAnswer: B Explanation: The method that would allow multiple VMs to share the same host IP address is NAT....

May 5, 2025 No Comments READ MORE +

Which of the following would MOST likely help the analyst determine if the applications are running?

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A port...

May 1, 2025 No Comments READ MORE +

Which of the following technologies is the new connection using?

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using? A. iSCSI B. eSATA C. NFS D. FcoEView AnswerAnswer: A...

April 29, 2025 No Comments READ MORE +

Which of the following should the company also perform as a data loss prevention method?

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the servers...

April 29, 2025 No Comments READ MORE +