Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following factors would most likely impact the selection of an organization's cloud provider?

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

A systems administrator is setting up a second VLAN for end users. Which of the following should be provisioned for a DHCP server to be able to receive client requests from a different subnet?

A.

DHCP options

B.

NIC teaming

C.

Zone transfers

D.

Relay agent

E.

VLAN ID

A storage administrator is configuring a new array to provide storage to a virtual cluster. The array has a built-in backup agent to allow data that is stored on the array to be backed up. The storage administrator wants the virtual cluster to use a file-based storage protocol so the backup agent can just back up the files that change and not the whole data store. Which of the following storage protocols should the administrator use?

A.

iSCSI

B.

FC

C.

FCoE

D.

NFS

A server in the data center reportedly has a BSOD and is not responding. The server needs to be rebooted. Which of the following is the best method to reboot the server remotely?

A.

Crash cart

B.

KVM

C.

IRMI

D.

shutdown -r

Which of the following will protect critical data during a natural disaster?

A.

Off-site storage

B.

Life-cycle management

C.

Environmental controls

D.

Data-at-rest encryption

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

A.

File

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

A technician is configuring a server that will need to accommodate a planned network upgrade. All hosts will be changed from 10Gb copper to 25Gb fiber. Which of the following would best suit the requirements?

A.

FCoE

B.

VLAN ID

C.

SFP

D.

HBA