1. A new server was installed. Most clients are located in the same subnet as the server and can successfully access the server. Clients located on different subnets have been unable to access the server,but have no trouble accessing other servers on their subnet. Which of the following is the reason that these clients are unable to access the server?
A) Incorrect default gateway on the server. B) WINS server is not responding. C) DNS entries were not created. D) DHCP has assigned the wrong addresses.
2. A server administrator is implementing disk redundancy in all database servers. Which of the following RAID configurations should the administrator use so that a MINIMUM number of disks are required?
A) RAID 5 B) RAID 1 C) RAID 6 D) RAID 0
3. A server has a file share for each department. An auditor has discovered that all users have access to all of the departmental shared folders. Which of the following is the BEST solution to ensure users have access to the shared folders of only their department?
A) Delete the shared folders and create new shared folders,and grant the users access to the shared folders according to their departments. B) Create security groups,add the users to the security groups according to their departments,and grant the security groups access to the file shares according to each department. C) Remove everyone from the shared folders,create a security group for each department,add the users to the security groups,and grant each security group access to its own shared folders. D) Remove everyone from the shared folders,grant full access to the IT administrators,and instruct the users to ask managers permission to be re-added to the shared folders according to their department.
4. A network administrator is installing additional devices on the network. The network segment is currently utilizing all allocated IP addresses. If there are additional addresses available,which of the following would be BEST for the network administrator to perform to accommodate the new network devices?
A) Increase the size of the DHCP scope for the network segment in question. B) Create a new DHCP scope for the network segment in question. C) Configure the network to use NAT for the network segment in question. D) Configure the DHCP server for IPv6.
5. A security incident occurs that requires a systems administrator to take an image of a user - s workstation hard drive. Which of the following should be taken at the time the system image is generated and retained through the file of the investigation to assure files have not been modified since?
A) The user - s credentials and permissions B) A checksum hash of the drive image or files C) Copies of the system logs at specific intervals D) A snapshot of the file system
Leave a comment