Which of the following is the BEST solution the adminis…
For budget purposes, the accounting department has asked an administrator to provide a disaster recovery solution that will comply with the following requirements:
– Systems have to be operational within two days
– No disaster will be declared if the primary site is fully operational within 24 hours
Which of the following is the BEST solution the administrator can propose to the accounting department?
Which of the following should the administrator perform?
An administrator has virtualized a physical server. The application team reports satisfactory performance. The physical machine has been reimaged with a newer operating system. The following day, the application team remembers that the physical server had a dual purpose and uses a proprietary telephony card that connects to the PBX switch. The administrator needs to restore the server to its previous state. Which of the following should the administrator perform?
Which of the following increases storage read throughput?
Which of the following increases storage read throughput?
which of the following?
Metadata is described as which of the following?
An amount of storage capacity presented to a host to fo…
An amount of storage capacity presented to a host to format with its own file system is:
Which of the following should the administrator impleme…
An administrator reports the company is running out of disk space on the SAN. The network administrator is installing a new SAN. Which of the following should the administrator implement to alleviate this problem on the new SAN?
Which of the following encryption types would be used t…
Which of the following encryption types would be used to protect company information when stored on a cloud server being shared by multiple companies?
Which of the following elements should be tested when d…
Which of the following elements should be tested when deploying cloud based services? (Select TWO).
A virtual machine snapshot is:
A virtual machine snapshot is:
Which of the following tools should the technician use?
A technician has just installed a key-value store on a server and is unable to connect it to the application using port 8291. The technician logged on to the server and needs to determine if the port is listening. Which of the following tools should the technician use?