Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A systems administrator is selecting an authentication system for a data center. The company’s security policy requires that the system support MFA. Which of the following options should the administrator deploy to meet the policy requirements?

A.

A retinal scan and a fingerprint reader

B.

A key fob and an employee badge

C.

An RFID chip and a PIN code

D.

An alphanumeric, case-sensitive password with symbols

An administrator notices a server is offline. Upon checking the console, the administrator discovers the server is stuck at:

Configuring Memory.............

After a reboot, the server still exhibits the same behavior. The administrator is able to log in to the OOB remote management but is unable to log in to the server. Which of the following is the most likely cause of this issue?

A.

A DIMM has failed

B.

The VRAM is insufficient

C.

The RAID cache has failed

D.

The BIOS needs to be updated

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

A senior administrator was notified that a junior administrator installed software on a server that should not have new software installed on it. The senior administrator decides to restrict the server via a Group Policy. Which of the following can be used to elevate the permissions?

A.

Computer management

B.

AD

C.

Local users and groups

D.

UAC

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

A.

Increasing IOPS by implementing flash storage

B.

Implementing deduplication on the storage

C.

Extending capacity by installing a 4TB SATA disk

D.

Reformatting the disk as FAT32

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.