Which of the following is the BEST solution?
A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible . Which of the following is the BEST solution?A . Copy the fileshare to an LTO-4 tape driveB . Configure a new incremental backup job for...
Which of the following should the technician attempt FIRST to resolve the issue?
A user reports that a server is not accessible. A technician sees the following message on the server: PXE server not found . Which of the following should the technician attempt FIRST to resolve the issue?A . Ensure the network cable is properly connected and reboot the server.B . Eject...
Which of the following IP addresses should the administrator use to be in compliance with the standard?
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard . Which of the following IP addresses should the administrator use to be in compliance with the standard?A . 11.251.196.241B . 171.245.198.241C . 172.16.19.241D . 193.168.145.241View AnswerAnswer: C...
Which of the following BEST describes the concept of right to downgrade?
Which of the following BEST describes the concept of right to downgrade?A . It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OSB . It allows a server to run...
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?A . SSOB . LDAPC . TACACSD . MFAView AnswerAnswer: A Explanation: Reference: https://www.onelogin.com/learn/how-single-sign-on-works
Which of the following is the MOST likely reason for the connection failure?
A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is sucessful. To...
Which of the following cluster features will allow Ann to complete this task?
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration ....
Which of the following tools should the administrator use?
A server administrator needs to check remotely for unnecessary running services across 12 servers . Which of the following tools should the administrator use?A . DLPB . A port scannerC . Anti-malwareD . A snifferView AnswerAnswer: B Explanation: Reference: https://www.getsafeonline.org/business/articles/unnecessary-services/
Which of the following represent the BEST immediate actions to prevent unauthorized server access?
A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server . Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and...
Which of the following tools will analyze network logs in real time to report on suspicious log events?
Which of the following tools will analyze network logs in real time to report on suspicious log events?A . SyslogB . DLPC . SIEMD . HIPSView AnswerAnswer: C Explanation: Reference: https://www.manageengine.com/products/eventlog/syslog-server.html