Which of the following hardening techniques would have …
Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select TWO).
Which of the following is a hardening technique that an…
Which of the following is a hardening technique that an administrator would perform when creating a standard VM template that would be used for deploying servers in a production environment?
Which of the following is MOST likely to be the case?
Anne, a system administrator, has replaced an HBA in one of her servers; however, none of the FC logical drives are accessible. Which of the following is MOST likely to be the case?
Which of the following is the MOST likely bottleneck fo…
A company has purchased two new servers to host several virtualized database servers. Each server has two 3GHz quad-core processors each, 64GB RAM each, 200GB DAS, and two 10GbE NICs each. Which of the following is the MOST likely bottleneck for these systems?
Which of the following describes a host server that is …
Which of the following describes a host server that is configured to bridge four guest servers?
Which of the following should be used to check services…
An administrator suspects malware has infected a server. Which of the following should be used to check services communicating with external servers?
Which of the following does the administrator need to c…
An administrator creates a new virtual desktop for a user. The user is unable to log in with their domain credentials. However, the administrator is able to log in with a local administrator account and ping other VDIs on the same subnet. Which of the following does the administrator need to correct?
Which of the following explains why access was denied?
An administrator has been promoted to architect when trying to access one of the servers, the architect receives the error: “Authentication failure: Account is not allowed”. Which of the following explains why access was denied?
Which of the following could be causing this problem?
Two VMs are in the same subnet 10.120.10.x/24, but the VMs cannot communicate with each other. Which of the following could be causing this problem?
A hypervisor that prevents vendor lock-in is:
A hypervisor that prevents vendor lock-in is: