Which of the following methods should be used when clas…
Which of the following methods should be used when classified or sensitive data is stored on a server?
Which of the following types of access control should b…
A server administrator is configuring access control on a file server for an organization. The Human Resources
manager is taking a leave of absence for three months, during which time an interim Human Resources
manager will take over the duties of the position. Which of the following types of access control should be
configured on the file server?
Which of the following MUST be implemented to meet the …
An administrator is building a web server to host an online banking application. The server should not have
access to the internal network, and only ports that are used by the application should be opened. Which of the
following MUST be implemented to meet the business requirements?
Which of the following authentication protocols could b…
Which of the following authentication protocols could be used to authenticate network administrators at a
datacenter to manage switches over a remote SSH connection? (Select TWO).
which ports are currently open on the mail server?
An email administrator is tasked to setup a Linux mail server. One of the requirements is to close all ports
except SSH, HTTPS, SMTP, POP3, and IMAP4. Which of the following commands should be used to see
which ports are currently open on the mail server? (Select TWO).
Which of the following server hardening techniques shou…
A technician would like to restrict when internal hardware components on the server are accessed. Which of
the following server hardening techniques should the technician implement?
Which of the following security methods could be implem…
A datacenter audit finds that a number of personnel are not using access cards when entering a secured area
with a coworker. Which of the following security methods could be implemented to help prevent this behavior?
which of the following represents “something you have”?
When using multifactor authentication, which of the following represents “something you have”?
Which of the following connection types should be used?
A technician is tasked with connecting a server to a NAS. Which of the following connection types should be
used?
Which of the following storage types was implemented by…
A server administrator implements external storage for a file server. At a later time, another administrator wants
to extend this storage to a second server but is unable to connect to two servers simultaneously. Which of the
following storage types was implemented by the first administrator?