Which of the following would be BEST to help protect an organization against social engineering?
A. More complex passwords
B. Recurring training and support
C. Single sign-on
D. An updated code of conduct to enforce social media
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?
A. IP KVM
B. VNC
C. A crash cart
D. RDP
E. SSH
The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)
A. RFID
B. Proximity readers
C. Signal blocking
D. Camouflage
E. Reflective glass
F. Bollards
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
Which of the following actions should a server administrator take once a new backup scheme has been configured?
A. Overwrite the backups
B. Clone the configuration
C. Run a restore test
D. Check the media integrity
A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?
A. A warm site
B. A hot site
C. Cloud recovery
D. A cold site
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?
A. Alternate the direction of the airflow
B. Install the heaviest server at the bottom of the rack
C. Place a UPS at the top of the rack
D. Leave 1U of space between each server
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
A. Heartbeat
B. Failback
C. Redundancy
D. Load balancing
Which of the following techniques can be configured on a server for network redundancy?
A. Clustering
B. Vitalizing
C. Cloning
D. Teaming
Which of the following policies would be BEST to deter a brute-force login attack?
A. Password complexity
B. Password reuse
C. Account age threshold
D. Account lockout threshold
A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?
A. Management port
B. Crash cart
C. IP KVM
D. KVM
Page 3 out of 29 Pages |
Previous |