Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries . Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same...
Which of the following commands should the administrator issue to configure MySQL successfully?
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?A . setenforce 0B . setenforce permissiveC . setenforce 1D . setenforce disabledView...
Which of the following should the technician do NEXT, given the disk is hot swappable?
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....
Which of the following should the administrator do to prevent this situation in the future?
Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off . Which of the following should the administrator do to prevent this situation in the future?A . Connect the server to a KVMB . Use cable...
Which of the following open ports should be closed to secure the server properly? (Choose two.)
Which of the following open ports should be closed to secure the server properly? (Choose two.)A . 21B . 22C . 23D . 53E . 443F . 636View AnswerAnswer: A,C Explanation: Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?A . Scope-basedB . Role-basedC . Location-basedD . Rule-basedView AnswerAnswer: B
Which of the following would resolve this concern?
The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside . Which of the following would resolve this concern? (Choose two.)A . RFIDB . Proximity readersC . Signal blockingD . CamouflageE . Reflective glassF . BollardsView AnswerAnswer: A,B Explanation:...
Which of the following would be the MOST efficient way to perform this task?
A server administrator needs to deploy five VMs, all of which must have the same type of configuration . Which of the following would be the MOST efficient way to perform this task?A . Snapshot a VC . Use a physical host.D . Perform a P2V conversion.E . Use a...
On which of the following drive types should the technician install the hypervisor?
A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?A . SD cardB . NAS...
Which of the following methods should be used to access the machine and perform a reboot if the server is not physically accessible?
A systems administrator is attempting to connect via RDP to a server that is running Windows. However, the systems administrator cannot connect to the machine via RDP to reboot it and apply updates . Which of the following methods should be used to access the machine and perform a reboot...