Which of the following should the administrator do FIRST?
An administrator is looking to apply a new service pack for an OS on several systems that run
business critical applications for a large international finance corporation. Which of the following
should the administrator do FIRST?
Which of the following should the administrator do NEXT?
A user is unable to connect to the companys intranet server by FQDN, but can connect by IP
address. Other users are not having a problem. An administrator verifies that the user can
successfully ping the server by IP address and can properly resolve the FQDN using nslookup.
The problem is persisting after running ipconfig /flushdns. Which of the following should the
administrator do NEXT?
Which of the following should the administrator do FIRS…
An administrator has just upgraded a server from non-hot plug storage to all hot plug storage. The
administrator powers up the server, during POST the RAID controller is recognized but none of the
drive lights flash. Which of the following should the administrator do FIRST to troubleshoot the
problem?
Which of the following connects the L2 cache to the pro…
Which of the following connects the L2 cache to the processor?
which of the following guidelines must be followed?
When installing processors with mixed stepping levels in a server, which of the following guidelines
must be followed? (Select TWO.)
Which of the following should be used to accomplish thi…
A system administrator is tasked with dividing the network so that each department is separate
from the other. Which of the following should be used to accomplish this task?
which of the following?
Network devices between two firewalls are included in which of the following?
Which of the following is the BEST method to prevent fu…
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a
server. Which of the following is the BEST method to prevent future occurrences?
Which of the following rule sets would accomplish this task?
A network administrator is tasked to block all outbound SSH connections on the default port from
a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would
accomplish this task?
administrative passwords, trusted signing keys)?
Which of the following is the MOST secure method of storing critical and sensitive system
information (e.g. administrative passwords, trusted signing keys)?