An administrator notices that a file server is filling up quickly but has many of the same files in different directories. Which of the following storage management techniques would resolve this issue?
A. Provisioning
B. Encryption
C. Deduplication
D. Partitioning
Which of the following is the MOST secure method to access servers located in remote branch offices?
A. Use an MFA out-of-band solution
B. Use a Telnet connection
C. Use a password complexity policy
D. Use a role-based access policy
A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?
A. Per site
B. Per concurrent user
C. Per core
D. Per instance
A systems administrator is attempting to connect via RDP to a server that is running Windows. However, the systems administrator cannot connect to the machine via RDP to reboot it and apply updates. Which of the following methods should be used to access the machine and perform a reboot if the server is not physically accessible?
A. ILO/iDRAC
B. TCP/IP
C. SSH/SCP
D. VNC/VPN
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?
A. Alternate the direction of the airflow
B. Install the heaviest server at the bottom of the rack
C. Place a UPS at the top of the rack
D. Leave 1U of space between each server
An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server.
Which of the following needs to be done to prevent this from happening again?
A. Implement data loss prevention.
B. Configure intrusion detection.
C. Turn on User Account Control.
D. Disable anonymous access.
An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?
A. Anti-malware
B. Nbtstat
C. Port scanner
D. Sniffer
A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?
A. Install the latest patches.
B. Disable unneeded hardware.
C. Set the boot order.
D. Enable a BIOS password.