Which of the following RAID levels should the technicia…
A technician is tasked with creating a test system containing non-critical data. The technician has
limited hardware, but needs maximum performance. Which of the following RAID levels should the
technician use?
Which of the following should the administrator perform…
A system administrator has just performed a backup. Which of the following should the
administrator perform to easily identify the backup tape?
Which of the following graphically depicts the movement…
Which of the following graphically depicts the movement of information within a system?
how should the NIC be configured?
A network administrator installs a new web server and notices that the server was configured with
one quad-port NIC. In order to properly provision the hardware resources, how should the NIC be
configured?
Which of the following check boxes should have been sel…
An administrator was tasked to enforce disk quotas on the Windows file server. The administrator
allocated 1GB of space to each user. A month later, the users were still able to save beyond 1GB.
Which of the following check boxes should have been selected?
Which of the following would MOST likely happen in this…
A host server in a small business environment does not have virtual switching configured. The NIC
on a guest is configured with an IP address that is on a different subnet from the host server. Which
of the following would MOST likely happen in this case?
Which of the following website types is needed?
An administrator needs to create two websites. One website must only be used by internal users
and the other website must be a corporate website accessible externally by customers. Which of
the following website types is needed?
Which of the following would be the STRONGEST technique…
An administrator decides to implement access control techniques to secure a datacenter. Which of
the following would be the STRONGEST technique for the administrator to use?
which of the following default port numbers should be u…
A system administrator is tasked to enable authentication on a web server’s login page. One of the
requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all
static HTML pages. Using the information supplied, which of the following default port numbers
should be used to satisfy these requirements?
Which of the following file system types is being used?
A technician is backing up 10 GB of data on a file server to a 250 GB external USB hard drive.
After 4 GB has been backed up, the software generates an error that the size of the backup exceeds
the file limit. Which of the following file system types is being used?