Which of the following would MOST likely happen in this…
A host server in a small business environment does not have virtual switching configured. The NIC on a guest
is configured with an IP address that is on a different subnet from the host server. Which of the following would
MOST likely happen in this case?
Which of the following website types is needed?
An administrator needs to create two websites. One website must only be used by internal users and the other
website must be a corporate website accessible externally by customers. Which of the following website types
is needed?
Which of the following would be the STRONGEST technique…
An administrator decides to implement access control techniques to secure a datacenter. Which of the
following would be the STRONGEST technique for the administrator to use?
which of the following default port numbers should be u…
A system administrator is tasked to enable authentication on a web server’s login page. One of the
requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all static HTML
pages. Using the information supplied, which of the following default port numbers should be used to satisfy
these requirements?
Which of the following file system types is being used?
A technician is backing up 10 GB of data on a file server to a 250 GB external USB hard drive. After 4 GB has
been backed up, the software generates an error that the size of the backup exceeds the file limit. Which of the
following file system types is being used?
Which of the following protocols can be used to query f…
Which of the following protocols can be used to query for host, user, and group information for clients?
Which of the following should the system administrators…
A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology Officer issued
a memorandum to the IT department with a directive to reduce power and cooling consumptions by 50% in the
datacenters. Which of the following should the system administrators recommend?
Which of the following protocols did the administrator …
After successfully authenticating to a remote server, a server administrator is presented with an interactive
command line with no graphical interface. Which of the following protocols did the administrator MOST likely
use to securely connect to the remote server?
which of the following drives?
A server has a faulty hard drive, and the administrator needs to replace the hard drive while it is running. The
server needs to support which of the following drives?
which of the following represents the top level of a ce…
In a PKI, which of the following represents the top level of a certificate authority?