Which of the following describes the point in time when resources can be assigned to scheduled tasks?
Which of the following describes the point in time when resources can be assigned to scheduled tasks?
Which cable should be used to connect the NIC to the switch?
A new server NIC is being installed to connect to a 1000Base-SX gigabit switch. Which cable should be used to connect the NIC to the switch?
When connecting power for switches and storage equipment with two or more redundant power supplies in a rack?
When connecting power for switches and storage equipment with two or more redundant power supplies in a rack?
During which of the following process groups is the availability of required resources for the project determi
During which of the following process groups is the availability of required resources for the project determined?
Which three actions must the administrator take before he can administer the server? (Select THREE)
A system administrator wants to remotely administer a server using a Web browser-based application so he can administer remotely from any operating system. He wants to ensure that the communication is secure and that only he can log in to the server. Which three actions must the administrator take before he can administer the server? (Select THREE)
If an administrator applies RAID 5, which of the following is the usable capacity of the five drives?
An array has five drives, and each drive is 300GB in capacity. If an administrator applies RAID 5, which of the following is the usable capacity of the five drives?
During which of the following process groups is the preliminary project risk assessment performed?
During which of the following process groups is the preliminary project risk assessment performed?
Which two are the BEST times to collect server baselines? (Select TWO)
Which two are the BEST times to collect server baselines? (Select TWO)
Which of the following technologies should be implemented to accomplish this?
An administrator would like to combine several ISLs into a single virtual connection. Which of the following technologies should be implemented to accomplish this?
Which of the following risk response strategies involves the use of insurance, performance bonds, or warrantie
Which of the following risk response strategies involves the use of insurance, performance bonds, or warranties?