A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?
A. V2V
B. P2V
C. V2P
D. P2P
An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
A. Load balancing
B. Direct access
C. Overprovisioning
D. Network teaming
Which of the following describes the concept of allocating more resources than what is available on a hypervisor?
A. Direct access
B. Overprovisioning
C. Link aggregation
D. Component redundancy
E. Scalability
A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?
A. Enable an administrator account
B. Enable a UEFI password
C. Disable WOL
D. Enable encryption at rest
Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
A. Cancelled change request
B. Change request postponement
C. Emergency change request
D. Privilege change request
E. User permission change request
Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?
A. An access control vestibule
B. Video surveillance
C. Bollards
D. Data center camouflage
Several mobile users are reporting intermittent performance issues when attempting to access network shares on the file server. After some investigation, the server administrator notices the server resources are running at maximum capacity, even during non-peak usage times. A recent port scan of the network identified this server as having too many unnecessary ports open to the public. Which of the following is the most likely cause of the performance issues?
A. Incorrect share permissions for mobile users
B. Improper privilege escalation
C. A virus infection
D. A misconfigured firewall rule
IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three).
A. Run a vulnerability scanner on the server.
B. Repartition the hard drive that houses the database.
C. Patch the vulnerability.
D. Enable a host firewall.
E. Reformat the OS on the server.
F. Update the antivirus software.
G. Remove the database software.
A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:
500GB, 10,000rpm
600GB, 10,000rpm
500GB, 7,200rpm
500GB, 10,000rpm
600GB, 15,000rpm
600GB, 10,000rpm
Which of the following drive selections should the technician utilize to best accomplish this goal?
A. 1, 2, 4, and 6
B. 1, 2, 3, 5, and 6
C. 1, 2, 4, 5, and 6
D. 1, 2, 3, 4, and 6
A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?
A. QSFP+
B. 10 GigE
C. SFP
D. SFP+
Page 12 out of 35 Pages |
Previous |