which of the following should the administrator do to m…
An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC’s, one that connects
to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the
following should the administrator do to meet these requirements?
Which of the following account management practices doe…
The IT department has setup a website with a series of questions to allow end users to reset their own accounts. Which of the following account management
practices does this help?
Which of the following is the NEXT step that should be …
A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken?
Which of the following should be done before resetting …
Which of the following should be done before resetting a user’s password due to expiration?
which of the following OSI layers could the problem exist?
A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be
functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO)
Which of the following can the security Administrator i…
A security administrator is concerned about the strength of user’s passwords. The company does not want to implement a password complexity policy. Which of
the following can the security Administrator implement to mitigate the risk of an online password attack against users with weak passwords?
Which of the following should the technician implement …
Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request. Which of the following
should the technician implement to avoid potential occurrences from happening in the future?
Which of the following BEST supports this reasoning?
Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this
reasoning?
which of the following wireless characteristics?
Channel bonding will improve which of the following wireless characteristics?
Which of the following would BEST mitigate this risk?
The systems administrator notices that many employees are using passwords that can be easily guessed or are susceptible to brute force attacks. Which of the
following would BEST mitigate this risk?