Which of the following technologies would allow an administrator to build a software RAID on a Windows server?
A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?
Which of the following would a systems administrator implement to ensure all web traffic is secure?
Which of the following describes the installation of an OS contained entirely within another OS installation?
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
Which of the following would be BEST to help protect an organization against social engineering?
Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?