1
您的位置: 线上活动  >  在线答题  >  答题题库

111

2024-12-28 23:55:03.226.0.58613

111 在线考试 答题题目
1、 A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?
  • A、 Unattended scripted OS installation
  • B、 P2V
  • C、 VM cloning


  • 2、 A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?
  • A、 Increasing IOPS by implementing flash storage
  • B、 Implementing deduplication on the storage
  • C、 Extending capacity by installing a 4TB SATA disk
  • D、 Reformatting the disk as FAT32


  • 3、 A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
  • A、User account control
  • B、Anti-malware
  • C、A sniffer
  • D、A port scanner


  • 4、 Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
  • A、 Live failover
  • B、 Simulated failover
  • C、 Asynchronous
  • D、 Tabletop


  • 5、 A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:
  • A、 BIA.
  • B、 RTO.
  • C、 MTTR.
  • D、 SLA.


  • 6、 A technician wants to limit disk usage on a server. Which of the following should the technician implement?
  • A、Formatting
  • B、Compression
  • C、Disk quotas
  • D、Partitioning


  • 7、 A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?
  • A、Snapshot a VM.
  • B、Use a physical host.
  • C、Perform a P2V conversion
  • D、Use a VM template


  • 8、 A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient subnet mask for this connection?
  • A、 /28
  • B、 /29
  • C、 /30
  • D、 /32


  • 9、(多选题) A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).
  • A、 Floor load limitations
  • B、 Rack balancing
  • C、 Proper lifting techniques
  • D、 Power connector type
  • E、 KVM placement
  • F、 Cable management
  • G、 UPS power requirements
  • H、 PDU installation
  • I、 Separate circuits for power


  • 10、 A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?
  • A、 A full, weekly backup with daily open-file backups
  • B、 A full, weekly backup with daily archive backups
  • C、 A full, weekly backup with daily incremental backups
  • D、 A full, weekly backup with daily differential backups


  • 11、 A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?
  • A、 MTBF
  • B、 RPO
  • C、 MTTR
  • D、 RFC


  • 12、 A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?
  • A、 Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
  • B、 Perform a complete OS reinstall on the server using the same media that was used during the initial install.
  • C、 Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
  • D、 Set a BIOS password to prevent server technicians from making any changes to the system.


  • 13、(多选题) A systems administrator notices that a SAN is running out of space. There is no additional funding in the budget to upgrade the storage space. Which of the following will significantly reduce the storage space with the least effort? (Select two).
  • A、 Configuring compression
  • B、Deleting old and unused files
  • C、Increasing the number of IOPS
  • D、Decreasing the RAID level
  • E、Enabling deduplication
  • F、Upgrading the filesystem type


  • 14、 A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?
  • A、 Open file
  • B、 Synthetic full
  • C、 Full incremental
  • D、 Full differential


  • 15、 Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?
  • A、 Active-passive
  • B、 Failover
  • C、 Active-active
  • D、 Fallback


  • 16、 Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?
  • A、Connect the server to a KVM.
  • B、Use cable management.
  • C、Connect the server to a redundant network.
  • D、Connect the server to a UPS


  • 17、 Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?
  • A、 RTO
  • B、 MTBF
  • C、 PRO
  • D、 MTTR


  • 18、 An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?
  • A、 Document the findings and actions.
  • B、 Escalate the issue to the management team.
  • C、 Implement the solution.
  • D、 Establish an action plan.


  • 19、 A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?
  • A、 Reinstall the OS.
  • B、 Wipe the drives.
  • C、 Degauss the drives.
  • D、 Update the IP schema.


  • 20、 Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?
  • A、 Per-server
  • B、 per-seat
  • C、 Per-concurrent user
  • D、 per-core


  • 21、 An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?
  • A、 SAS SSD
  • B、 SATA SSD
  • C、 SAS drive with 10000rpm
  • D、 SATA drive with 15000rpm


  • 22、 The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?
  • A、 Set a BIOS/UEFI password on the server.
  • B、 Change the boot order on the server and restrict console access.
  • C、Configure the host OS to deny login attempts via USB.
  • D、 Disable all the USB ports on the server.


  • 23、 Which of the following supports virtualization?
  • A、Type 1 hypervisor
  • B、Bare-metal installation
  • C、Server-level redundancy
  • D、Active-active load balancing


  • 24、 A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?
  • A、 An ACL
  • B、 Antivirus
  • C、 DLP
  • D、 A firewall


  • 25、 Which of the following allows for a connection of devices to both sides inside of a blade enclosure?
  • A、 Midplane
  • B、 Active backplane
  • C、 Passive backplane
  • D、 Management module


  • 26、 Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
  • A、 Encrypt the data that is leaving the SAN
  • B、 Encrypt the data at rest
  • C、 Encrypt the host servers
  • D、 Encrypt all the network traffic


  • 27、 A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?
  • A、 Confirm the client PCs are using the correct speed on the NIC
  • B、 Confirm the network uses the same NTP server as the clients
  • C、 Confirm the network has a helper address for the DHCP server
  • D、Confirm the DHCP server is authorized in Active Directory


  • 28、 A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?
  • A、 Insider threat
  • B、 Worms
  • C、 Ransomware
  • D、 Open ports
  • E、 Two-person integrity


  • 29、 A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?
  • A、 Hot
  • B、 Cold
  • C、 Colocated
  • D、 Warm


  • 30、 An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
  • A、 Load balancing
  • B、 Direct access
  • C、 Overprovisioning
  • D、 Network teaming


  • 31、 Which of the following life-cycle management phases deals with a server that is no longer in operation?
  • A、 End-of-life
  • B、 Disposal
  • C、 Usage
  • D、 Procurement


  • 32、 A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?
  • A、 eSATA
  • B、 USB
  • C、 FC
  • D、 iSCSI


  • 33、(多选题) Which of the following, if properly configured, would prevent a user from installing an OS on a server?(Select TWO).
  • A、Administrator password
  • B、Group Policy Object
  • C、Root password
  • D、SELInux
  • E、Bootloader password
  • F、BIOS/UEFI password


  • 34、 A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely configured?
  • A、 Delegation
  • B、 Role-based
  • C、 Rule-based
  • D、 Scope-based


  • 35、 An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?
  • A、 /root.ssh/sshd/config
  • B、 /etc.ssh/sshd_config
  • C、 /root/.ssh/ssh_config
  • D、 /etc.sshs_shd_config


  • 36、 Several mobile users are reporting intermittent performance issues when attempting to access network shares on the file server. After some investigation, the server administrator notices the server resources are running at maximum capacity, even during non-peak usage times. A recent port scan of the network identified this server as having too many unnecessary ports open to the public. Which of the following is the most likely cause of the performance issues?
  • A、 Incorrect share permissions for mobile users
  • B、Improper privilege escalation
  • C、A virus infection
  • D、A misconfigured firewall rule


  • 37、 A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?
  • A、 Crash cart
  • B、 Out-of-band console
  • C、 IP KVM
  • D、 RDP


  • 38、 Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?
  • A、 Humidity control system
  • B、 Sensors
  • C、 Fire suppression
  • D、 Heating system


  • 39、 A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?
  • A、Full
  • B、Bare metal
  • C、Core
  • D、GUI


  • 40、 Which of the following is the MOST secure method to access servers located in remote branch offices?
  • A、 Use an MFAout-of-band solution.
  • B、 Use a Telnet connection.
  • C、 Use a password complexity policy.
  • D、 Use a role-based access policy.


  • 41、 A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?
  • A、 DLF configuration
  • B、 MBR failure
  • C、 ECC support
  • D、 MD5 checksum


  • 42、 A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?
  • A、 Stop sharing the volume
  • B、 Replace the disk
  • C、 Shut down the SAN
  • D、 Stop all connections to the volume


  • 43、 A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
  • A、 11.251.196.241
  • B、 171.245.198.241
  • C、 172.16.19.241
  • D、 193.168.145.241


  • 44、 An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options would minimize the amount of time the administrator needs to load the operating system on every machine?
  • A、 SD card
  • B、Optical
  • C、Network
  • D、USB


  • 45、 An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
  • A、 Load balancing
  • B、Direct access
  • C、Overprovisioning
  • D、Network teaming


  • 46、 A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files.Which of the following would be BEST for the technician to deploy?
  • A、iSCSI
  • B、CIFS
  • C、HTTPS
  • D、DAS


  • 47、 A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?
  • A、 Encrypt all network traffic
  • B、 Implement MFA on all the servers with encrypted data
  • C、 Block the servers from using an encrypted USB
  • D、 Implement port security on the switches


  • 48、 A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?
  • A、 255.255.255.0
  • B、 255.255.255.128
  • C、 255.255.255.240
  • D、 255.255.255.254


  • 49、 Which of the following refers to the requirements that dictate when to delete data backups?
  • A、 Retention policies.
  • B、 Cloud security impact
  • C、 Off-site storage
  • D、 Life-cycle management


  • 50、 Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?
  • A、The DHCP exclusion needs to be removed.
  • B、The DHCP scope is full.
  • C、The DHCP scope options are misconfigured
  • D、The DHCP lease times are too short.
  • E、The DHCP reservations need to be configured.


  • 51、(多选题) A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).
  • A、 Drives
  • B、 Fans
  • C、 CMOSIC
  • D、 Processor
  • E、 Power supplies
  • F、 Motherboard
  • G、 Memory
  • H、 BIOS


  • 52、 Which of the following policies would be BEST to deter a brute-force login attack?
  • A、 Password complexity
  • B、 Password reuse
  • C、 Account age threshold
  • D、 Account lockout threshold


  • 53、 After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?
  • A、 Power cycle the storage arrays and rescan RAID on the server.
  • B、 Boot the OS into recovery mode and rescan the disks.
  • C、 Restore the default RAID configuration and reboot.
  • D、 Perform a rescan on the server's RAID controller.


  • 54、(多选题) A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)
  • A、 Host
  • B、 Template
  • C、 Clone
  • D、 Type1
  • E、 Type2
  • F、 Guest


  • 55、 Which of the following documents would explain the consequences of server downtime?
  • A、 Service-level agreement
  • B、Business continuity plan
  • C、Disaster recovery plan
  • D、Business impact analysis


  • 56、 A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?
  • A、 25
  • B、 443
  • C、 3389
  • D、 8080


  • 57、 Which of the following licensing models was created by software companies in response to the increasing density of processors?
  • A、 Per-instance
  • B、 Per-server
  • C、 per-user
  • D、 per-core


  • 58、(多选题) A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
  • A、 Remote desktop
  • B、 IP KVM
  • C、 A console connection
  • D、 A virtual administration console
  • E、 Remote drive access
  • F、 A crash cart


  • 59、 Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?
  • A、 SLA
  • B、 MTBF
  • C、 RTO
  • D、 MTTR


  • 60、(多选题) Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)
  • A、 Uninstall recent updates.
  • B、 Reimage the server with a different OS.
  • C、 Run a port scan to verify open ports.
  • D、 Enable a GPO to uninstall the update.
  • E、 Scan and remove any malware.
  • F、 Reformat the server and restore the image from the latest backup.


  • 61、 Which of the following attacks is the most difficult to mitigate with technology?
  • A、 Ransomware
  • B、 Backdoor
  • C、 SQL injection
  • D、 Phishing


  • 62、 A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?
  • A、 The RAID card
  • B、 The BIOS
  • C、 The backplane
  • D、 The HBA


  • 63、 A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?
  • A、 A virtual router
  • B、 A host NIC
  • C、 A VPN
  • D、 A virtual switch
  • E、 A vNlC


  • 64、 A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors.Which of the following is the MOST likely source of the issue?
  • A、A local firewall is blocking authentication requests.
  • B、The users have expired passwords
  • C、The system clock is off by more than five minutes
  • D、The server has no access to the LDAP host


  • 65、 Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?
  • A、 nbtstat
  • B、 netuse
  • C、 tracert
  • D、 netstst


  • 66、 An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?
  • A、 Remove all the data from the server drives using the least destructive method.
  • B、 Repurpose and recycle any usable server components.
  • C、 Remove all the components from the server.
  • D、 Review all company polices.


  • 67、 An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?
  • A、Backplane failure
  • B、CMOS failure
  • C、Misconfigured RAID
  • D、Cache battery failure


  • 68、 A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?
  • A、 Close unneeded ports.
  • B、Disable unused services.
  • C、Set a BIOS password.
  • D、Apply driver updates.


  • 69、 Which of the following concepts refers to prioritizing a connection that had previously worked successfully?
  • A、 Round robin
  • B、 SCP
  • C、 MRU
  • D、 Link aggregation


  • 70、 A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?
  • A、The server is In the process of shutting down, so fan speed operations have been defaulted to high.
  • B、An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.
  • C、A fan failure has occurred, and the other fans have increased speed to compensate.
  • D、The server is utilizing more memory than the other servers, so it has increased the fans to compensate.


  • 71、 An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?
  • A、 Network encapsulation
  • B、 Off-site data
  • C、 Secure FTP
  • D、 Data in transit


  • 72、 Which of the following describes the concept of allocating more resources than what is available on a hypervisor?
  • A、Direct access
  • B、Overprovisioning
  • C、Link aggregation
  • D、Component redundancy
  • E、Scalability


  • 73、 A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?
  • A、 Two-person Integrity
  • B、 SSO
  • C、 SIEM
  • D、 Faraday cage
  • E、 MFA


  • 74、 A server administrator is reviewing the following specifications:VM01 Host: CPU: 2 Physical, 4 Cores RAM: 16GB Storage: 16TB Server 1 on VM01: CPU: 1 virtual socket, 1 core per socket RAM: 4GB Storage: 8TB Server 2 on VM01: CPU: 2 virtual sockets, 2 cores per socket RAM: 8GB Storage: 10TB Which of the following is described given these specifications?
  • A、 Virtual switch
  • B、 Host vs. guest
  • C、 Overprovisioning
  • D、 Scalability


  • 75、 A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?
  • A、 Determine whether there is a common element in the symptoms causing multiple problems.
  • B、 Perform a root cause analysis.
  • C、 Make one change at a time and test.
  • D、 Document the findings, actions, and outcomes throughout the process.


  • 76、 An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario.Which of the following actions should the organization perform?
  • A、 Have the facility inspect and inventory the tapes on a regular basis.
  • B、 Have duplicate equipment available at the cold site.
  • C、 Retrieve the tapes from the cold site and test them.
  • D、 Use the test equipment at the cold site to read the tapes.


  • 77、 An administrator is patching a file and print server After rebooting the server, it begins acting strangely. The administrator tries to open Print Management, but it will not open Upon inspection, the spooler service has been disabled. The administrator then notices the server has services that should be enabled but are disabled. Which of the following actions should the administrator take next to resolve the issue as quickly as possible?
  • A、 Roll back the installed updates
  • B、 Set the services to restart automatically and reboot the server
  • C、 Enable the spooler service.
  • D、 Reboot the server into safe mode


  • 78、 A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?
  • A、 MTBF
  • B、 RTO
  • C、 MTTR
  • D、 RPO


  • 79、 A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?
  • 0
  • B、1
  • C、5
  • D、10


  • 80、 A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?
  • A、 Reinstall the OS and programs.
  • B、 Configure old drives to RAID.
  • C、 Reconfigure the RAID.
  • D、 Install from backup.


  • 81、 A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?
  • A、Network address translation
  • B、in-band management
  • C、Round robin
  • D、NIC teaming


  • 82、 A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?
  • A、DHCP configuration
  • B、Firewall rules
  • C、DLP software
  • D、Intrusion detection system


  • 83、 A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?
  • A、 Configure the domain search variable
  • B、 Change the permissions on resolv. conf
  • C、 Configure the DNS address
  • D、 Modify nsswitch. Conf.


  • 84、 A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as
  • A、 Copy the fileshare to an LTO-4 tape drive
  • B、 Configure a new incremental backup job for the fileshare
  • C、 Create an additional partition and move a copy of the fileshare
  • D、 Create a snapshot of the fileshare


  • 85、 A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?
  • A、 Restart the server
  • B、 Configure the network on the server
  • C、 Enable the port on the server
  • D、 Check the DHCP configuration


  • 86、 A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?
  • A、 DLP
  • B、 A port scanner
  • C、 Anti-malware
  • D、 A sniffer


  • 87、 A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?
  • A、Log rotation
  • B、Log shipping
  • C、Log alerting
  • D、Log analysis


  • 88、 Which of the following will protect critical data during a natural disaster?
  • A、 Off-site storage
  • B、 Life-cycle management
  • C、Environmental controls
  • D、Data-at-rest encryption


  • 89、 A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation: userGhost:!# nmap localhost Nmap scan report for localhost (127.0.0.1) Host is up (0.001 ms latency)
  • A、Check the database server
  • B、Change the database password
  • C、Open port 3306 on the server
  • D、Edit the network firewall rules


  • 90、 A technician needs to replace two RAID controllers on a database server as part of an upgrade. The server has six external storage arrays and eight internal disks that are controlled by the two RAID controllers. The technician completes the replacement and powers the systems back on, but the server OS detects several missing disks in the configuration. Which of the following steps should the technician take first to resolve this issue?
  • A、 Reboot to the RAID controller BIOS and rescan for attached disks and arrays
  • B、 Start the motherboard UEFI and confirm the RAID controller start order is correct
  • C、Turn off the external arrays and reboot the server to redetect the internal disks first
  • D、Turn off all components and confirm all external and internal cables before rebooting


  • 91、 A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?
  • A、 Enable HIDS.
  • B、 Change the service account permissions.
  • C、 Check the host firewall I rule.
  • D、 Roll back the applied patch.


  • 92、(多选题) An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).
  • A、 21
  • B、 22
  • C、 53
  • D、 67
  • E、 69
  • F、 110
  • G、 123
  • H、 389


  • 93、 A company needs a media server set up that provides the highest availability with a minimum requirement of at least 10TB. The company purchased five HDDs, each with a 4TB capacity. Which of the options would provide the highest fault tolerance and meet the requirements?
  • A、 RAID 0
  • B、RAID 5
  • C、RAID 6
  • D、RAID 10


  • 94、 An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?
  • A、 A firewall blocking the ICMP echo reply.
  • B、 The DHCP scope option is incorrect
  • C、 The DNS entries for the print server are incorrect.
  • D、 The hosts file misconfigured.


  • 95、 Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?
  • A、 An access control vestibule
  • B、 Video surveillance
  • C、 Bollards
  • D、 Data center camouflage


  • 96、 A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?
  • A、Separate circuits
  • B、An uninterruptible power supply
  • C、Increased PDU capacity
  • D、Redundant power supplies


  • 97、 Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?
  • A、 Bolting door lock
  • B、Combination door lock
  • C、Electronic door lock
  • D、Biometric door lock


  • 98、 server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?
  • A、 Decrease the size of the page/swap file
  • B、Reformat drive C to use all the disk space
  • C、Enable whole disk encryption on the hard drive
  • D、Enforce disk quotas on shares within that server
  • E、Partition the unallocated space to provide more available space


  • 99、 Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?
  • A、Overprovisioning
  • B、Scalability
  • C、Thin clients
  • D、Resource Monitor


  • 100、 A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?
  • A、 Biometrics
  • B、 Push notifications
  • C、 Smart carts
  • D、 Physical tokens


  • 101、 A technician has received tickets responding a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?
  • A、Log rotation
  • B、Alerts
  • C、Reports
  • D、Log stopping


  • 102、 A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non- essential ports be disabled on the firewall.Which of the following ports must remain open?
  • A、 25
  • B、53
  • C、443
  • D、3389
  • E、8080


  • 103、 A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?
  • A、 Inform the impacted users.
  • B、Make the changes to the system.
  • C、Determine the probable causes.
  • D、Identify changes to the server.


  • 104、 Which of the following should a technician verify first before decommissioning and wiping a file server?
  • A、 The media destruction method
  • B、 The recycling policy
  • C、 Asset management documentation
  • D、 Document retention policy


  • 105、 An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?
  • A、 The server will gracefully shut down.
  • B、 The server will immediately crash.
  • C、 The server will operate but in read-only mode.
  • D、 The server will continue to operate normally.


  • 106、 A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?
  • A、 Necessary dependencies were installed for multiple architectures.
  • B、 There is not enough hard drive space.
  • C、 The server is infected with a virus.
  • D、 Some modules are not compatible.


  • 107、 Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?
  • A、 Third-party acceptable use policy
  • B、 Customer data encryption and masking
  • C、 Non-disclosure and indemnity agreements
  • D、 Service- and operational-level agreements


  • 108、(多选题) A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?(Choose two.)
  • A、Adware is installed on the users’ devices
  • B、The firewall rule for the server is misconfigured
  • C、The server is infected with a virus
  • D、Intrusion detection is enabled on the network
  • E、Unnecessary services are disabled on the server
  • F、SELinux is enabled on the server


  • 109、 Which of the following actions should a server administrator take once a new backup scheme has been configured?
  • A、 Overwrite the backups
  • B、 Clone the configuration
  • C、 Run a restore test
  • D、 Check the media integrity


  • 110、 A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?
  • A、Disable port 389 on the server
  • B、Move traffic from port 389 to port 443
  • C、Move traffic from port 389 to port 637
  • D、Enable port 389 for web traffic


  • 111、 A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?
  • A、QSFP+
  • B、10 GigE
  • C、SFP
  • D、SFP+


  • 112、 An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?
  • A、 The user accounts are locked out
  • B、 The NTP on the client side is misconfigured
  • C、 MFA is not working
  • D、The wrong time zone was set in the remote office


  • 113、 An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used
  • A、 Implement data loss prevention.
  • B、 Configure intrusion detection.
  • C、 Turn on User Account Control.
  • D、 Disable anonymous access.


  • 114、 A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?
  • A、 Link aggregation
  • B、 Heartbeat
  • C、 Most recently used
  • D、 Active-active


  • 115、 Which of the following is typical of software licensing in the cloud?
  • A、 Per socket
  • B、 Perpetual
  • C、 Subscription-based
  • D、 Site-based


  • 116、(多选题) A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are the BEST backup methods to use to support the management’s priorities? (Choose two.)
  • A、 Differential
  • B、 Synthetic full
  • C、 Archive
  • D、 Full
  • E、 Incremental
  • F、 Open file


  • 117、 An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?
  • A、 The server has not been joined to the domain.
  • B、 An IP address has not been assigned to the server.
  • C、 The server requires a reboot to complete the deployment process.
  • D、 The domain credentials are invalid.


  • 118、 A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?
  • A、 Inspect the GPU that is being installed.
  • B、 Ensure the GPU meets HCL guidelines.
  • C、 Shut down the server.
  • D、 Disconnect the power from the rack.


  • 119、(多选题) Following a recent power outage, a server in the data center has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would most likely cause this issue? (Select two).
  • A、 The server has a faulty power supply.
  • B、The server has a CMOS battery failure.
  • C、The server requires OS updates.
  • D、The server has a malfunctioning LED panel.
  • E、The servers have NTP configured.
  • F、CPU frequency scaling is set too high.


  • 120、 A technician runs top on a dual-core server and notes the following conditions:top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6 Which of the following actions should the administrator take?
  • A、 Schedule a mandatory reboot of the server
  • B、 Wait for the load average to come back down on its own
  • C、 Identify the runaway process or processes
  • D、 Request that users log off the server


  • 121、 An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the following installation options should the administrator use?
  • A、 Bare metal
  • B、Headless
  • C、Virtualized
  • D、Slipstreamed


  • 122、 A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
  • A、 Configure a firewall
  • B、 Close the unneeded ports
  • C、 Install a HIDS
  • D、 Disable unneeded services


  • 123、 A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?
  • A、Unplug the power cables from the redundant power supplies, leaving just the minimum required.
  • B、Convert the physical servers to the hypervisors and retire the ten servers.
  • C、Reimage the physical servers and retire all ten servers after the migration is complete.
  • D、Convert the ten servers to power-efficient core editions.


  • 124、 A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?
  • A、 The jumbo frames are not enabled.
  • B、 The subnet mask is incorrect.
  • C、 There is an IP address conflict.
  • D、 There is an improper DNS configuration.


  • 125、 A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?
  • A、 The VLAN Is improperly configured.
  • B、 The DNS configuration Is invalid.
  • C、 The OS version is not compatible with the network switch vendor.
  • D、 The HIDS is preventing the connection.


  • 126、 In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?
  • A、Waterfall
  • B、Synthetic full
  • C、Tower of Hanoi
  • D、Grandfather-father-son


  • 127、 Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?
  • A、 Usage
  • B、 End-of-life
  • C、 Procurement
  • D、 Disposal


  • 128、 Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?
  • A、 RTO
  • B、 SLA
  • C、 MTBF
  • D、 MTTR


  • 129、 A server administrator has received tickets from users who report the system runs very slowly and various unrelated messages pop up when they try to access an internet-facing web application using default ports. The administrator performs a scan to check for open ports and reviews the following report: Starting Nmap 7.70 https://nmap.org) at 2019-09-19 14:30 UTC Nmap scan report for www.abc.com (172.45.6.85)Host is up (0.0021s latency) Other addresses for www.abc.com (not scanned) : 4503 : F7b0 : 4293: 703: : 3209 RDNS record for 172.45.6.85: 1ga45s12-in-f1.2d100.net Port State Service 21/tcp filtered ftp 22/tcp filtered ssh 23/tcp filtered telnet 69/tcp open @username.com 80/tcp open http 110/tcp filtered pop 143/tcp filtered imap 443/tcp open https 1010/tcp open www.popup.com 3389/tcp filtered ms-abc-server Which of the following actions should the server administrator perform on the server?
  • A、 Close ports 69 and 1010 and rerun the scan.
  • B、 Close ports 80 and 443 and rerun the scan.
  • C、 Close port 3389 and rerun the scan.
  • D、 Close all ports and rerun the scan.


  • 130、 A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
  • A、 Configure a firewall
  • B、 Close the unneeded ports
  • C、 Install a HIDS
  • D、 Disable unneeded services


  • 131、 A server administrator created a new script and included the path to the script binary as the first line of the script. Which of the following scripting languages did the administrator most likely use?
  • A、Batch
  • B、Java
  • C、Bash
  • D、PowerShell


  • 132、 A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?
  • A、 Copy and send an SSD to the site.
  • B、 Copy and send a DVD to the site.
  • C、 Copy and send a SATA drive to the site.
  • D、 Copy and send a microSD card to the site.


  • 133、 A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?
  • A、CIFS
  • B、FTP
  • C、SFTP
  • D、NFS


  • 134、 Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?
  • A、 Disable the heartbeat network.
  • B、 Replace the disk
  • C、 Set the cluster to active-active.
  • D、 Failover all VMs.


  • 135、 A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?
  • A、 Take a snapshot of the original VM
  • B、 Clone the original VM
  • C、 Convert the original VM to use dynamic disks
  • D、 Perform a P2V of the original VM


  • 136、 Which of the following BEST describes overprovisioning in a virtual server environment?
  • A、 Committing more virtual resources to virtual machines than there are physical resources present
  • B、 Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
  • C、 Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
  • D、 Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure


  • 137、 A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?
  • A、Fibre Channel
  • B、FCoE
  • C、iSCSI
  • D、eSATA


  • 138、 An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?
  • A、 Configure a RAID array.
  • B、 Replace the current drives with higher-capacity disks.
  • C、 Implement FCoE for more storage capacity.
  • D、 Connect the server to a SAN


  • 139、 A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A portscan reports the following ports are open:
  • A、21
  • B、22
  • C、23
  • D、53
  • E、443
  • F、636


  • 140、 A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?
  • A、 Security guards
  • B、 Security cameras
  • C、 Bollards
  • D、 An access control vestibule


  • 141、 A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?
  • A、 Consult the HCL to ensure everything is supported.
  • B、 Migrate the physical server to a virtual server.
  • C、 Low-level format the hard drives to ensure there is no old data remaining.
  • D、 Make sure the case and the fans are free from dust to ensure proper cooling.


  • 142、 An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?
  • A、 1000BASE-LX 1Gb single-mode plenum fiber connection
  • B、 10GBASE-T 10Gb copper plenum Ethernet connection
  • C、 1000BASE-T 1Gb copper non-plenum Ethernet connection
  • D、 10GBASE-SR 10Gb multimode plenum fiber connection


  • 143、 An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes. Which of the following would BEST help answer the server performance question9
  • A、 Server performance thresholds
  • B、 A server baseline
  • C、 A hardware compatibility list
  • D、 An application service-level agreement


  • 144、 A snapshot is a feature that can be used in hypervisors to:?
  • A、roll back firmware updates.
  • B、restore to a previous version.
  • C、roll back application drivers.
  • D、perform a backup restore


  • 145、 The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?
  • A、 Copy the existing data to an external USB 3 0 enclosure.
  • B、 Place the existing data on a DVD and use the internal DVD-ROM drive.
  • C、 Transfer the existing data to an external eSATA enclosure.
  • D、 Move the existing data to a new. larger internal hard drive.


  • 146、 A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?
  • A、Check the firewall rules.
  • B、Replace the CMOS battery in the server.
  • C、Restart the time servers.
  • D、Manually correct the time.


  • 147、(多选题) The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Select TWO).
  • A、RFID
  • B、Proximity readers
  • C、Signal blocking
  • D、Camouflage
  • E、Reflective glass
  • F、Bollards


  • 148、 A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?
  • A、 RAID array
  • B、 Serial Attached SCSI
  • C、 Solid-state drive
  • D、 Just a bunch of disks


  • 149、 A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?
  • A、 RA,NAT
  • B、 ICMP
  • C、 VLAN
  • D、 NIDS


  • 150、 A user logs in to a Linux server and attempts to run the following command:
  • A、visudo I grep userid
  • B、sudo -1 -U userid
  • C、cat /etc/passwd
  • D、userlist I grep userid


  • 151、 A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do NEXT to install the firmware?
  • A、 Press F8 to enter safe mode
  • B、 Boot from the media
  • C、 Enable HIDS on the server
  • D、 Log in with an administrative account


  • 152、 A very old PC is running a critical, proprietary application in MS-DOS.Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?
  • A、 Perform scheduled chkdsk tests.
  • B、 Purchase matching hardware and clone the disk.
  • C、 Upgrade the hard disk to SSD.
  • D、 Perform quarterly backups.


  • 153、 A technician is laying out a filesystem on a new Linux server. Which of the following tools would workBEST to allow the technician to increase a partition's size in the future without reformatting it?
  • A、LVM
  • B、DiskPart
  • C、fdisk
  • D、Format


  • 154、 A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.
  • A、 mantrap.
  • B、 a bollard
  • C、 geofencing
  • D、 RFID.


  • 155、 Which of the following authentication types defines credentials as "something you have"?
  • A、 Swipe pattern
  • B、 PIN
  • C、 Fingerprint
  • D、 Smart card


  • 156、 Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
  • A、 Cancelled change request
  • B、 Change request postponement
  • C、 Emergency change request
  • D、 Privilege change request
  • E、 User permission change request


  • 157、 Which of the following is an example of load balancing?
  • A、Round robin
  • B、Active-active
  • C、Active-passive
  • D、Failover


  • 158、 systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?
  • A、 Port 443 is not open on the firewall
  • B、 The server is experiencing a downstream failure
  • C、 The local hosts file is blank
  • D、 The server is not joined to the domain


  • 159、 A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users.Which of the following should the developer use when designing the web application?
  • A、 Round robin
  • B、 Link aggregation
  • C、 Network address translation
  • D、 Bridged networking


  • 160、 A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights.Which of the following is most likely the issue?
  • A、 A single-mode fiber cable is used in place of multimode.
  • B、 The switchport is on the wrong virtual SAN.
  • C、 The HBA driver needs to be installed on the server.
  • D、 The zoning on the fiber switch is wrong.


  • 微信扫一扫 在线答题 在线出卷 随机出题小程序 闯关答题软件 出题答题小程序