Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-based B. Role-based C. Location-based D. Rule-basedView AnswerAnswer: B
Which of the following disk types will serve this purpose?
An administrator is configuring a server that will host a high-performance financial application . Which of the following disk types will serve this purpose?A . SAS SSD B. SATA SSD C. SAS drive with 10000rpm D. SATA drive with 15000rpmView AnswerAnswer: A Explanation: Reference: https://www.hp.com/us-en/shop/tech-takes/sas-vs-sata
Which of the following would a systems administrator implement to ensure all web traffic is secure?
Which of the following would a systems administrator implement to ensure all web traffic is secure?A . SSH B. SSL C. SMTP D. PGPView AnswerAnswer: B Explanation: Secure Sockets Layer (SSL): SSL and its successor Transport Layer Security (TLS) enable client and server computers to establish a secure connection session...
Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?
A server room with many racks of servers is managed remotely with occasional on-site support . Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?A . Management port B. Crash cart C. IP KVM D. KVMView AnswerAnswer: C
Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?
A technician is laying out a filesystem on a new Linux server . Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?A . LVM B. DiskPart C. fdisk D. FormatView AnswerAnswer: A
Which of the following is causing the issue?
An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the...
Which of the following would BEST enable this correlation?
A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used...
Which of the following RAID configurations should be used to provide redundancy for the OS?
A server administrator is deploying a new server that has two hard drives on which to install the OS . Which of the following RAID configurations should be used to provide redundancy for the OS?A . RAID 0 B. RAID 1 C. RAID 5 D. RAID 6View AnswerAnswer: B
A snapshot is a feature that can be used in hypervisors to:
A snapshot is a feature that can be used in hypervisors to:A . roll back firmware updates. B. restore to a previous version. C. roll back application drivers. D. perform a backup restore.View AnswerAnswer: D Explanation: Hypervisor-based snapshots provide a way to take an image copy of a virtual machine...
Which of the following should the technician use to command a remote shutdown?
CORRECT TEXT A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings . Which of the following should the technician use to command a remote shutdown? A virtual...