Which of the following represents the FIRST action that…
A server technician in a datacenter configures a daemon to monitor the battery health in a UPS. Over a two day
time period, the daemon generates a warning message. Which of the following represents the FIRST action
that should be taken by the server technician?
Which of the following would have been a more effective…
A server unexpectedly shut down as a result of overheating. An alert was sent to the administrator’s email
address but the administrator was away from the workstation when the alert arrived. Which of the following
would have been a more effective method for sending the alert notification?
Which of the following methods should a technician perf…
Which of the following methods should a technician perform to properly clear a hard drive before disposal?
Which of the following is an example of the principle o…
Which of the following is an example of the principle of least privilege and is the MOST secure when granting
access to a shared network drive used by the Accounting department?
Which of the following should be used to accomplish thi…
A system administrator is tasked with dividing the network so that each department is separate from the other.
Which of the following should be used to accomplish this task?
which of the following?
Network devices between two firewalls are included in which of the following?
Which of the following is the BEST method to prevent fu…
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server.
Which of the following is the BEST method to prevent future occurrences?
Which of the following rule sets would accomplish this task?
A network administrator is tasked to block all outbound SSH connections on the default port from a network
subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?
administrative passwords, trusted signing keys)?
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g.
administrative passwords, trusted signing keys)?
Which of the following provides two-factor authentication?
Which of the following provides two-factor authentication?