Which of the following protocols should be used to monitor network performance?
Which of the following protocols should be used to monitor network performance?
Which command is used to enable disk quotas on a particular filesystem?
CORRECT TEXT
Which command is used to enable disk quotas on a particular filesystem? (Provide only the
command, with no options or parameters)
which of the following monitoring types?
A support method which will automatically notify the support vendor of a problem would be an
example of which of the following monitoring types?
Which of the following devices has its own BIOS?
Which of the following devices has its own BIOS?
which of the following attacks?
A security administrator notices large amounts of traffic within the network heading out to an
external website. The website seems to be a fake bank site with a phone number that when called,
asks for sensitive information. After further investigation, the security administrator notices that a
fake link was sent to several users. This is an example of which of the following attacks?
Which of the following actions is the BEST method to identify the issue?
While connected to the company’s wireless network, users are experiencing connection issues
and reporting slow network speeds. Which of the following actions is the BEST method to identify
the issue?
Which of the following crontab entries could be used to set the system time at regular intervals?
Which of the following crontab entries could be used to set the system time at regular
intervals?
Which of the following security threats is occurring?
A user receives an email slating that their account was compromised and there is a need to
verify account credentials by submitting the correct information on a website. Which of the
following security threats is occurring?
Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?
Several departments within a company have a business need to send high volumes of confidential
information to customers via email. Which of the following is the BEST solution to mitigate
unintentional exposure of confidential information?
What is the BEST utility to create a boot floppy from the disk image?
CORRECT TEXT
An administrator has downloaded an image file of a boot floppy disk to a hard drive. What is the
BEST utility to create a boot floppy from the disk image? (Specify a single command without
options.)