Which of the following server types translates FQDNs to IP addresses?
A. DHCP
B. SMTP
C. DNS
D. FTP
A systems administrator needs to ensure data cannot be recovered from old media. Which of the following is the MOST effective method for the administrator to use?
A. Zeroize all sectors
B. Format the media
C. Empty the recycle bin
D. Change the media format
Which of the following protocols utilize SSH and TCP over port 22 for secure communication? (Choose two.)
A. SFTP
B. FTP
C. TFTP
D. SCP
E. FTPS
F. SMTP
A server administrator was hired by a company to manage and maintain 20 Windows-based servers in five geographical locations. The server administrator is going to run patches manually to ensure they are applied, which would address some major security-related items. Which of the following methods would MOST likely be the way to handle this task?
A. Physically go to each server
B. Schedule automatic patching
C. Use the management interface on the server
D. Use RDP to log into each server
A server technician works in a small environment where servers and computers reside on the subnet. Which of the following should the technician create to ensure the servers have the same network setting?
A. Manual host entries
B. DHCP reservations
C. Manual DNS entries
D. NAT address pool
An administrator receives a call from a user reporting that one of the application servers is not accessible by host name but is accessible via an IP address. Which of the following is the MOST likely issue?
A. The DNS reverse lookup zone is misconfigured.
B. The DNS MX record type is misconfigured.
C. The DNS resource record is missing.
D. The DNS forward lookup zone is missing.
An IT manager has indicated the need to deploy a feasible standby storage file server that replicates the production data file server and should be quickly accessible from the network by all users when needed. Which of the following storage technologies would be MOST appropriate?
A. JBOD
B. DAS
C. NAS
D. SAN
Which of the following describes a root cause analysis?
A. Identify the circumstances that initiated the problem.
B. Replicate the problem in a test environment.
C. List necessary corrective actions for the problem.
D. Confirm the theory of probable cause.
Which of the following is designed to guarantee that once data is written it cannot be modified? (Select TWO).
A. Flash
B. DLT4 tapes
C. CD-R
D. SDLT tapes
E. WORM
Which of the following is a storage system that can be connected to multiple servers through an iSCSI connection?
A. JBOD
B. DAS
C. NAS
D. SAN