which ports are currently open on the email server?
An email administrator is tasked to set up a Linux mail server. One of the requirements is to close
all ports except SSH, HTTPS, SMTP, POP3, and IMAP4. Which of the following commands should
be used to see which ports are currently open on the email server? (Choose two.)
Which of the following utilities should the administrat…
A new version of the primary OS used by a company has been released. Due to some significant
changes in the OS, a system administrator wants to see which remotely accessible services are
enabled by default to access the security risk prior to upgrading to the new version. Which of the
following utilities should the administrator use?
which of the following describes how the NIC should be …
A network administrator installs a new web server and notices that the server was configured with
one quad-port NIC. In order to properly provision the hardware resources, which of the following
describes how the NIC should be configured?
Which of the following is the FIRST step the administra…
A system administrator has a database server that crashes at random times. No changes have
been made to either the server’s software or hardware. Which of the following is the FIRST step
the administrator should take towards resolving this issue?
Which of the following tools would the administrator us…
An administrator thinks that a particular network connection is dropping packets. Which of the
following tools would the administrator use to BEST identify where the packets are being dropped?
Which of the following provides the fastest restore whi…
A technician has access to a recent full backup. Data has changed since the last backup. Which of
the following provides the fastest restore while minimizing backup size?
which of the following servers will the workstation be …
An administrator is using IPv4 on all servers. If a new technician installs only IPv6 on a workstation,
which of the following servers will the workstation be able to access?
Which of the following security threats includes suspic…
Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?
Which of the following application types is MOST often …
Which of the following application types is MOST often used for doing a mail merge?
Which of the following is a benefit of setting up a com…
Which of the following is a benefit of setting up a computer to receive automatic updates from the OS vendor?