Which of the following is the FIRST item the administrator should check or perform?
A SAN administrator is troubleshooting a connectivity issue between a new server and a FC
switch. The link is running at 8Gbps and uses a 90 meter (295 feet) optical cable. Which of the
following is the FIRST item the administrator should check or perform?
Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
Which of the following is MOST likely preventing the users from experiencing the effects of the spikes?
An administrator notices an occasional spike in disk IOPS beyond what the disks can handle.
Worried about application performance, the administrator talks with users, but the effect seems to
have gone unnoticed. Which of the following is MOST likely preventing the users from
experiencing the effects of the spikes?
Which of the following default ports should Ann ensure is open?
Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer
using Kerberos authentication, but she cannot connect to the destination machine. Which of the
following default ports should Ann ensure is open?
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
Which of the following technologies provides an abstraction of physical drives within a storage array?
Which of the following technologies provides an abstraction of physical drives within a storage
array?
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered comp
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be
considered components of:
Which of the following are requirements for having an ISL between two FC switches?
Which of the following are requirements for having an ISL between two FC switches? (Select
TWO).
Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers
that lock the PC after five minutes of inactivity. Which of the following controls is being described
in this situation?