Which of the following should be created to understand how long data is stored and how frequently data backups should be scheduled?
A. Retention policies
B. Service-level agreement
C. Life-cycle management
D. Mean time to recover
An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to accomplish this task?
A. tracert
B. telnet
C. ipconfig
D. ping
An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select two).
A. 53
B. 80
C. 389
D. 443
E. 445
F. 3389
G. 8080
Which of me following should be placed at the top of a Bash script to ensure it can be executed?
A. bash
B. !execute
C. #!
D. @eacho off
Which of the following would be BEST to help protect an organization against social engineering?
A. More complex passwords
B. Recurring training and support
C. Single sign-on
D. An updated code of conduct to enforce social media
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?
A. IP KVM
B. VNC
C. A crash cart
D. RDP
E. SSH
The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)
A. RFID
B. Proximity readers
C. Signal blocking
D. Camouflage
E. Reflective glass
F. Bollards
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
Which of the following actions should a server administrator take once a new backup scheme has been configured?
A. Overwrite the backups
B. Clone the configuration
C. Run a restore test
D. Check the media integrity
A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?
A. A warm site
B. A hot site
C. Cloud recovery
D. A cold site
Page 3 out of 35 Pages |
Previous |