Which of the following would be BEST to help protect an organization against social engineering?

Which of the following would be BEST to help protect an organization against social engineering?A . More complex passwords B. Recurring training and support C. Single sign-on D. An updated code of conduct to enforce social mediaView AnswerAnswer: B Explanation: The best way to protect an organization against social engineering...

July 24, 2023 No Comments READ MORE +

Which of the following metrics can the administrator use for monitoring?

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)A . Memory B. Page file C. Services D. Application E. CPU F. HeartbeatView AnswerAnswer: AE Explanation: Memory and CPU are two metrics that can...

July 24, 2023 No Comments READ MORE +

Which of the following would MOST likely cause this issue?

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers...

July 23, 2023 No Comments READ MORE +

Which of the following tools should the administrator use?

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?A . DLP B. A port scanner C. Anti-malware D. A snifferView AnswerAnswer: B Explanation: The tool that the administrator should use to check for unnecessary running services...

July 23, 2023 No Comments READ MORE +

Which of the following is causing the issue?

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP...

July 23, 2023 No Comments READ MORE +

Which of the following ports should the technician use?

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?A . 21 B. 22 C. 23 D. 443View AnswerAnswer: B Explanation: The technician should use port 22 to configure a server that requires secure remote access. Port 22 is the...

July 23, 2023 No Comments READ MORE +

Which of the following commands should a technician use to identify the issue?

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?A . pvdisplay B. mount C. df -h D. fdisk -lView AnswerAnswer: C Explanation: The df...

July 23, 2023 No Comments READ MORE +

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?A . Encrypt the data that is leaving the SAN B. Encrypt the data at rest C. Encrypt the host servers D. Encrypt all the network trafficView AnswerAnswer: B

July 22, 2023 No Comments READ MORE +

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Which of the following actions should a server administrator take once a new backup scheme has been configured?A . Overwrite the backups B. Clone the configuration C. Run a restore test D. Check the media integrityView AnswerAnswer: C Explanation: The action that the server administrator should take once a new...

July 22, 2023 No Comments READ MORE +

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSO B. LDAP C. TACACS D. MFAView AnswerAnswer: A Explanation: The term that is most likely part of the user authentication process when implementing SAML across multiple applications is...

July 22, 2023 No Comments READ MORE +