Which of the following is the BEST feature to use to present storage to the server while maximizing storage fl
A customer wants to present a LUN to a server totaling 5TB. The server will initially use only
100GB. The storage administrator will upgrade the SAN as more storage is needed. Which of the
following is the BEST feature to use to present storage to the server while maximizing storage
flexibility?
Which of the following should be done before resetting a user’s password due to expiration?
Which of the following should be done before resetting a user’s password due to expiration?
Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees
Which of the following would Pete, a security administrator, MOST likely implement in order to
allow employees to have secure remote access to certain internal network services such as file
servers?
Which of the following aims to restrict certain dangerous substances commonly used in electronics and electron
Which of the following aims to restrict certain dangerous substances commonly used in electronics
and electronic equipment?
Which mitigation measure would detect and correct this?
An internal auditor is concerned with privilege creep that is associated with transfers inside the
company. Which mitigation measure would detect and correct this?
Which of the following is the NEXT logical step the technician should take?
A technician receives a ticket that Ann, a wireless customer, cannot access her email. As part of
the troubleshooting process, the technician has finished establishing a plan of action to resolve the
problem. Which of the following is the NEXT logical step the technician should take?
Which of the following should be updated?
A technician changes a VLAN name from VLAN10 to VLAN20 in a switch. Which of the
following should be updated?
Which of the following commands will provide locale-specific information about a system and its environment?
Which of the following commands will provide locale-specific information about a system and
its environment?
Which of the following addressing schemes should the technician use?
An administrator is setting up a network and would like to prevent users from having the
ability to plug their PC into the network to receive an IP address. Which of the following
addressing schemes should the technician use?
Which of the following is the output when the below shell script executes?
Which of the following is the output when the below shell script executes? cat <<foobar Hello foobar
foobar