Which logical topology uses distributed authentication?
Logical Topology (also referred to as Signal Topology) is a network computing term used to
describe the arrangement of devices on a network and how they communicate with one another.
Which logical topology uses distributed authentication?
This is an example of:
A person pretends to be a telecommunications repair technician, enters a building stating that
there is a networking trouble work order and requests that a security guard unlock the wiring
closet. The person connects a packet sniffer to the network switch in the wiring closet and hides
the sniffer behind the switch against a wall. This is an example of:
How could the company BEST reduce power consumption among these four servers, while not sacrificing functional
A small business currently has four separate servers, three of which perform low-overhead tasks
with small memory footprints. How could the company BEST reduce power consumption among
these four servers, while not sacrificing functionality?
Which utility can be used to pinpoint the segment of the network or server that is causing the slow retrieval?
The HR department with Linux based servers reports data retrieval is very slow. Which utility can
be used to pinpoint the segment of the network or server that is causing the slow retrieval?
What command should be invoked to give the user sally read and write, but not execute, access to the file stra
What command should be invoked to give the user sally read and write, but not execute, access to
the file strategy.txt using Extended ACL entries?
which slots?
You have been asked to add 2 new PCI-X cards into an existing server architecture and notice
that they run at different clock speeds. The system has both shared and dedicated PCI bus slots
available. In order to maximize performance, which PCI cards should be installed in which slots?
(Choose two.)
What storage event will occur as a result of this?
There are two datacenters separated by twelve (12) km with IP connections linking the two sites.
Site A is the primary production site, Site B is for test/development & disaster recovery. Site A
synchronously replicates data to Site B for disaster recovery purposes via a merged SAN fabric
between the two sites. The communication between the two sites is lost. What storage event will
occur as a result of this?
Which of the following is an appropriate reason for not starting the project?
A company manager has turned in project objectives, and requests that the project manager start
the project immediately. The project manager informs the company manager that the project
cannot be started. Which of the following is an appropriate reason for not starting the project?
Where should the administrator document this work?
An administrator is updating firmware on routers throughout the company. Where should the
administrator document this work?
Which of the following is the MOST likely reason for this?
An administrator attempts to install the latest security patches for an older server. When the
administrator runs the patch installer, the install fails. The administrator tries again, and the
installer fails again. Which of the following is the MOST likely reason for this?