Which of the following tools would BEST be used to inst…
Two technicians are asked to install a 6U server at location U25 in a 40U server rack. The rack has
been properly stabilized to the floor. Which of the following tools would BEST be used to install the
server?
Which of the following should the technician do to allo…
A technician working in the datacenter has finished racking a new 4U server into a new rack. Which
of the following should the technician do to allow for hot/cold aisle containment?
Which of the following methods should be used when clas…
Which of the following methods should be used when classified or sensitive data is stored on a
server?
Which of the following types of access control should b…
A server administrator is configuring access control on a file server for an organization. The Human
Resources manager is taking a leave of absence for three months, during which time an interim
Human Resources manager will take over the duties of the position. Which of the following types
of access control should be configured on the file server?
Which of the following MUST be implemented to meet the …
An administrator is building a web server to host an online banking application. The server should
not have access to the internal network, and only ports that are used by the application should be
opened. Which of the following MUST be implemented to meet the business requirements?
Which of the following authentication protocols could b…
Which of the following authentication protocols could be used to authenticate network
administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO.)
which ports are currently open on the mail server?
An email administrator is tasked to setup a Linux mail server. One of the requirements is to close
all ports except SSH, HTTPS, SMTP, POP3, and IMAP4. Which of the following commands should
be used to see which ports are currently open on the mail server? (Select TWO.)
Which of the following server hardening techniques shou…
A technician would like to restrict when internal hardware components on the server are accessed.
Which of the following server hardening techniques should the technician implement?
Which of the following describes this scenario?
Historical data shows that on average, a server is likely to fail once every nine months. A company
has purchased 24×7, four hour hardware response to replace a server’s failed hardware.
Additionally, the company can restore a server to its operational status within six hours from the
time the failed hardware has been replaced. Which of the following describes this scenario?
Which of the following is likely to contain a list of e…
A company is planning to replace old hardware and needs to budget accordingly. Which of the
following is likely to contain a list of end of life servers?