1. When configuring a DHCP server,which of the following can the administrator define for DHCP users? (Select THREE).(Select 3answers)
A) SQL server
B) Database server
C) NTP server
D) Domain name
E) DNS server
F) DHCP server
2. Multiple users report that an application attempting to open a file retrieved from a server reports that the file is corrupted. Which of the following applications can be used on the server to verify file integrity?
A) Cipher
B) Checksum
C) Anti-malware
D) Port scanner
3. A technician receives a report that two users are having difficulty retaining connections to a server hosting a company application. On testing,the technician sees the following: Initial connections to the server are sporadic. If connected,the client is dropped within 30 seconds. Attempting to reconnect is sometimes successful but other times requires multiple attempts. Local testing on the server reveals no problems. Given these symptoms,which of the following is the MOST likely cause of the problem?
A) Routing has been configured incorrectly for the clients.
B) Two separate NICs have the same MAC address.
C) Two workstations have been configured with the same IP address.
D) There are multiple DNS entries for the same host.
4. Which of the following assists with airflow in a server? (Select TWO).(Select 2answers)
A) Shroud
B) Riser cards
C) Heat sinks
D) Baffle
E) Water cooling
5. A technician would like to restrict when internal hardware components on the server are accessed. Which of the following server hardening techniques should the technician implement?
A) Disabled WOL
B) Chassis lock
C) Intrusion detection
D) BIOS password