Which of the following graphically depicts the movement…
Which of the following graphically depicts the movement of information within a system?
how should the NIC be configured?
A network administrator installs a new web server and notices that the server was configured with
one quad-port NIC. In order to properly provision the hardware resources, how should the NIC be
configured?
Which of the following check boxes should have been sel…
An administrator was tasked to enforce disk quotas on the Windows file server. The administrator
allocated 1GB of space to each user. A month later, the users were still able to save beyond 1GB.
Which of the following check boxes should have been selected?
Which of the following would MOST likely happen in this…
A host server in a small business environment does not have virtual switching configured. The NIC
on a guest is configured with an IP address that is on a different subnet from the host server. Which
of the following would MOST likely happen in this case?
Which of the following website types is needed?
An administrator needs to create two websites. One website must only be used by internal users
and the other website must be a corporate website accessible externally by customers. Which of
the following website types is needed?
Which of the following would be the STRONGEST technique…
An administrator decides to implement access control techniques to secure a datacenter. Which of
the following would be the STRONGEST technique for the administrator to use?
which of the following default port numbers should be u…
A system administrator is tasked to enable authentication on a web server’s login page. One of the
requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all
static HTML pages. Using the information supplied, which of the following default port numbers
should be used to satisfy these requirements?
Which of the following file system types is being used?
A technician is backing up 10 GB of data on a file server to a 250 GB external USB hard drive.
After 4 GB has been backed up, the software generates an error that the size of the backup exceeds
the file limit. Which of the following file system types is being used?
Which of the following protocols can be used to query f…
Which of the following protocols can be used to query for host, user, and group information for
clients?
Which of the following should the system administrators…
A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology
Officer issued a memorandum to the IT department with a directive to reduce power and cooling
consumptions by 50% in the datacenters. Which of the following should the system administrators
recommend?