Which of the following check boxes should have been sel…
An administrator was tasked to enforce disk quotas on the Windows file server. The administrator allocated
1GB of space to each user. A month later, the users were still able to save beyond 1GB. Which of the following
check boxes should have been selected?
Which of the following is the FIRST step the administra…
A system administrator has a database server that crashes at random times. No changes have been made to
either the server’s software or hardware. Which of the following is the FIRST step the administrator should take
towards resolving this issue?
Which of the following would MOST likely happen in this…
A host server in a small business environment does not have virtual switching configured. The NIC on a guest
is configured with an IP address that is on a different subnet from the host server. Which of the following would
MOST likely happen in this case?
Which of the following website types is needed?
An administrator needs to create two websites. One website must only be used by internal users and the other
website must be a corporate website accessible externally by customers. Which of the following website types
is needed?
Which of the following would be the STRONGEST technique…
An administrator decides to implement access control techniques to secure a datacenter. Which of the
following would be the STRONGEST technique for the administrator to use?
which of the following default port numbers should be u…
A system administrator is tasked to enable authentication on a web server’s login page. One of the
requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all static HTML
pages. Using the information supplied, which of the following default port numbers should be used to satisfy
these requirements?
Which of the following file system types is being used?
A technician is backing up 10 GB of data on a file server to a 250 GB external USB hard drive. After 4 GB has
been backed up, the software generates an error that the size of the backup exceeds the file limit. Which of the
following file system types is being used?
Which of the following protocols can be used to query f…
Which of the following protocols can be used to query for host, user, and group information for clients?
Which of the following should the system administrators…
A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology Officer issued
a memorandum to the IT department with a directive to reduce power and cooling consumptions by 50% in the
datacenters. Which of the following should the system administrators recommend?
Which of the following protocols did the administrator …
After successfully authenticating to a remote server, a server administrator is presented with an interactive
command line with no graphical interface. Which of the following protocols did the administrator MOST likely
use to securely connect to the remote server?