Which of the following tools should the administrator use?

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?A . DLP B. A port scanner C. Anti-malware D. A snifferView AnswerAnswer: B Explanation: The tool that the administrator should use to check for unnecessary running services...

July 23, 2023 No Comments READ MORE +

Which of the following is causing the issue?

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP...

July 23, 2023 No Comments READ MORE +

Which of the following ports should the technician use?

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?A . 21 B. 22 C. 23 D. 443View AnswerAnswer: B Explanation: The technician should use port 22 to configure a server that requires secure remote access. Port 22 is the...

July 23, 2023 No Comments READ MORE +

Which of the following commands should a technician use to identify the issue?

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?A . pvdisplay B. mount C. df -h D. fdisk -lView AnswerAnswer: C Explanation: The df...

July 23, 2023 No Comments READ MORE +

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?A . Encrypt the data that is leaving the SAN B. Encrypt the data at rest C. Encrypt the host servers D. Encrypt all the network trafficView AnswerAnswer: B

July 22, 2023 No Comments READ MORE +

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Which of the following actions should a server administrator take once a new backup scheme has been configured?A . Overwrite the backups B. Clone the configuration C. Run a restore test D. Check the media integrityView AnswerAnswer: C Explanation: The action that the server administrator should take once a new...

July 22, 2023 No Comments READ MORE +

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSO B. LDAP C. TACACS D. MFAView AnswerAnswer: A Explanation: The term that is most likely part of the user authentication process when implementing SAML across multiple applications is...

July 22, 2023 No Comments READ MORE +

Which of the following is an example of load balancing?

Which of the following is an example of load balancing?A . Round robin B. Active-active C. Active-passive D. FailoverView AnswerAnswer: A Explanation: Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load...

July 22, 2023 No Comments READ MORE +

Which of the following subnet masks would be appropriate for this setup?

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?A . 255.255.255.0 B. 255.255.255.128 C. 255.255.255.240 D. 255.255.255.254View AnswerAnswer:...

July 22, 2023 No Comments READ MORE +

Which of the following is the MOST likely system vulnerability?

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?A . Insider threat B. Worms C. Ransomware D. Open ports E. Two-person integrityView AnswerAnswer: A Explanation: Insider threat is the most likely system vulnerability in...

July 21, 2023 No Comments READ MORE +