Which of the following would a systems administrator implement to ensure all web traffic is secure?
Which of the following would a systems administrator implement to ensure all web traffic is secure?A . SSHB . SSLC . SMTPD . PGPView AnswerAnswer: B Explanation: Secure Sockets Layer (SSL): SSL and its successor Transport Layer Security (TLS) enable client and server computers to establish a secure connection session...
Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?A...
Which of the following technologies is the new connection using?
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using? A. iSCSI B. eSATA C. NFS D. FcoEView AnswerAnswer: A...
A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume.
A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:A . hardware is UEFI compliantB . volume is formatted as GPTC ....
Which of the following is the BEST way to protect the data from leaking?
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?A . Utilize...
Which of the following would be BEST to help protect an organization against social engineering?
Which of the following would be BEST to help protect an organization against social engineering?A . More complex passwordsB . Recurring training and supportC . Single sign-onD . An updated code of conduct to enforce social mediaView AnswerAnswer: B Explanation: The best way to protect an organization against social engineering...
Which of the following will correctly map a script to a home directory for a user based on username?
Which of the following will correctly map a script to a home directory for a user based on username?A . \serverusers$usernameB . \server%username%C . \serverFirstInitialLastNameD . \server$username$View AnswerAnswer: B Explanation: The administrator should use server%username% to correctly map a script to a home directory for a user based on username....
Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows: The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 Default gateway: 192.168.10.1 A ping sent to the default gateway is...
Which of the following allows for a connection of devices to both sides inside of a blade enclosure?
Which of the following allows for a connection of devices to both sides inside of a blade enclosure?A . MidplaneB . Active backplaneC . Passive backplaneD . Management moduleView AnswerAnswer: A Explanation: The component that allows for a connection of devices to both sides inside of a blade enclosure is...
Which of the following are the BEST options to comply with the user requirements?
Data availability is a high priority, even in the case of multiple hard drive failures. Which of the following are the BEST options to comply with the user requirements? (Choose three.)A . Install the OS on a RAID 0 array.B . Install the OS on a RAID 1 array.C ....