how many NICs must a machine have to host virtual machines?
At a minimum how many NICs must a machine have to host virtual machines?
Which of the following processor technologies are specifically geared towards increasing performance in a virt
Which of the following processor technologies are specifically geared towards increasing
performance in a virtual environment? (Select TWO).
Which of the following is the MOST cost effective way to backup open files on a Linux server?
Which of the following is the MOST cost effective way to backup open files on a Linux server?
Which of the following server form factors would provide the BEST solution?
An administrator for a medium sized business with multiple servers is planning to consolidate
space in a new server room. Which of the following server form factors would provide the BEST
solution?
Which of the following tape drives should the technician install?
A technician is asked to install a tape drive supporting tapes that will hold up to 400GB of data on
each tape. Which of the following tape drives should the technician install?
Which of the following should the technician use to correct the issue?
A technician is dispatched to a remote datacenter to troubleshoot a server that intermittently shuts
down. The technician diagnoses the root cause to be dust buildup in the server case. Which of the
following should the technician use to correct the issue?
Which of the following components provides for the BEST hardware cooling features?
Which of the following components provides for the BEST hardware cooling features?
Which of the following MOST correctly describes RAID technology?
Which of the following MOST correctly describes RAID technology?
Which of the following RAID levels could be selected with three drives?
Which of the following RAID levels could be selected with three drives?
Which of the following solutions would BEST restrict the users?
An administrator wants to restrict users through VPN from connecting to the network between
12:00 AM and 6:00 AM. The system uses LDAP for authentication back to a domain. Which of the
following solutions would BEST restrict the users?