Which of the following cluster techniques should be imp…
A system administrator is tasked to setup a database server with failover clustering feature enabled.
One of the requirements is to have one database running at all times with data being synchronized
and replicated to the idle database in case the primary database server fails. Both servers will be
monitored by a witness on a LUN. Which of the following cluster techniques should be implemented
to meet these requirements?
Which of the following would be the MOST appropriate ca…
A technician is configuring switches with SFP ports on multiple floors in a building. A switch on the
first floor must be connected to a switch on the second floor for trunking VLAN traffic. Which of the
following would be the MOST appropriate cable type for the technician to use?
Which of the following is the MOST secure to erase data…
Which of the following is the MOST secure to erase data before disposal of server hard drives?
Which of the following should be implemented to limit t…
A system administrator notices that there is a low level of available storage space on a file server.
Which of the following should be implemented to limit the amount of storage space users can utilize
on the file server?
Which of the following will be MOST helpful in passing …
A company is being audited by its operating system vendor. The company needs to report the
number of operating systems in use, the versions of the operating systems, and the product keys.
Which of the following will be MOST helpful in passing the audit?
Which of the following server types stores the list of …
Which of the following server types stores the list of network usernames and passwords required
for authentication?
Which of the following services will be installed as a …
A server has been assigned a role of mail server. Which of the following services will be installed
as a result of this selection?
which of the following steps would be BEST to take to p…
A number of users are indicating that access to a network file server is responding very slowly
when reading or writing to the share. The server administrator notes that a drive has failed in a
four-disk RAID 5 array. The array is running in a degraded state because no hot spare was
configured. After replacing the failed disk, which of the following steps would be BEST to take to
prevent slow response after a drive failure?
Which of the following protocols is used primarily for …
Which of the following protocols is used primarily for monitoring and managing network devices?
which of the following is the proper sequence of steps …
A server is giving a fault code indicating that a RAM chip is producing errors and should be replaced.
According to best practices, which of the following is the proper sequence of steps to replace the
faulty module?