Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

A.

Check the power cables

B.

Clean the fans.

C.

Replace the RAM.

D.

Reattach the CPU heat sink

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Which of the following attacks is the most difficult to mitigate with technology?

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?

A.

MTBF

B.

RTO

C.

MTTR

D.

RPO

Which of the following supports virtualization?

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full