1. An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?
A) Multifactor authentication B) RFID chip C) Cipher locks D) Bollards
2. A datacenter recently experienced a breach committed by a group that was able to access a server that had been shut down but not disconnected from the network. Which of the following could have prevented the breach from occurring?
A) Shutting down unneeded ports on the server B) Disabling WOL in the server BIOS C) Installing anti-malware software on the server D) Disabling non-essential services on the server
3. An administrator has a drive working properly under Linux and moves it to a Windows server. Which of the following should be performed to ensure Windows can read the disk?
A) Format the drive with UFS. B) Format the drive with ext2. C) Format the drive with ext4. D) Format the drive with NTFS.
4. A customer reports their mail can send emails but not receive them. A technician arrives on-site to troubleshoot the issue. Which of the following troubleshooting steps should the technician do FIRST?
A) Escalate the problem to a manager B) Identify changes to the server C) Perform a root cause analysis D) Establish a theory of probable cause
5. A company is planning to replace old hardware and needs to budget accordingly. Which of the following is likely to contain a list of end of life servers?
A) The server's warranty information. B) The server's life cycle schedule. C) The asset management database. D) The software licensing agreement.
Leave a comment