Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sens
Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media
containing sensitive information?
Which of the following command line utilities should the administrator use to reboot the system remotely?
An administrator does not have console access to a Windows Server. Which of the following
command line utilities should the administrator use to reboot the system remotely?
which of the following is MOST important?
When upgrading the BIOS, which of the following is MOST important?
Which of the following is the advantage of Server to Server replication in a cluster environment over Disk to
Which of the following is the advantage of Server to Server replication in a cluster environment over
Disk to Disk?
which of the following?
NAS, SAN, and Tape library are MOST commonly used for which of the following?
Which of the following is the MOST important consideration?
An administrator is creating a new data retention policy. Which of the following is the MOST
important consideration?
Which of the following is the SAFEST course of action for the administrator to take?
During a printer driver installation, a message appears stating “The software being installed for this
hardware has not passed Windows logo testing”. Which of the following is the SAFEST course of
action for the administrator to take?
Which of the following should the server administrator perform?
A server contains a 3 disk RAID 5 array. The red LED is illuminated on one of the drives. Which of the
following should the server administrator perform?
Which of the following can the technician do?
A technician is setting up a wired SOHO network for a client. The client would like to ensure
that unauthorized PCs are not easily able to communicate on the network. Which of the
following can the technician do?
Which of the following security threats requires the attacker to be physically located near the target machine
Which of the following security threats requires the attacker to be physically located near the
target machine?