Which of the following protocols can be used in this configuration?
An administrator is planning to implement multipathing for IP-based storage. Which of the following
protocols can be used in this configuration?
Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NA
Which of the following, in conjunction with IPSec, can be configured to provide secure access to files
on a NAS?
Which of the following file systems can be used in this scenario?
A system administrator is planning storage infrastructure to store backup copies of virtual machines
that are at least 5GB in size. Which of the following file systems can be used in this scenario? (Select
TWO).
Which of the following can be used to enable out-of-band management of a Windows-based host?
Which of the following can be used to enable out-of-band management of a Windows-based host?
Which of the following might improve the performance of the mouse?
An administrator notices that the mouse does not perform as expected within a VM. Which of the
following might improve the performance of the mouse?
Which of the following must be enabled for the accounting department to access this HR application?
A recently deployed VM is running a Human Resource (HR) application on the HR network.
Workstations in the accounting department can access the Internet and other accounting servers,
but are unable to ping the new VM. Which of the following must be enabled for the accounting
department to access this HR application?
Which of the following should the network administrator do to test whether web traffic is being sent and recei
An administrator deployed a VM that is hosting an internal website. Users report they are unable to
access the new website. Which of the following should the network administrator do to test whether
web traffic is being sent and received?
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
Which of the following would be used to advertise a public IP address on redundant WAN circuits?
Which of the following should be changed to route users to the secondary datacenter in case of a primary site
A company has deployed a website which is mirrored at a secondary datacenter. Which of the
following should be changed to route users to the secondary datacenter in case of a primary site
failure?
Which of the following is the FIRST step that must be performed?
A security administrator is being hired to perform a penetration test of a third-party cloud provider
as part of an annual security audit. Which of the following is the FIRST step that must be performed?