Which of the following can be used to map a network drive to a user profile?
A. System service
B. Network service
C. Login script
D. Kickstart script
Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?
A. Check the power supplies
B. Review the log files.
C. Reinstall the ESX server.
D. Reseat the processors.
A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:
nfsserver:/home /home nfs defaults 0 0
However, a df -h /home command returns the following information:
/dev/sda2 10G 1G 9G 10% /home
Which of the following should the technician attempt FIRST to resolve the issue?
A. mkdir /home
B. umount nfsserver:/home
C. rmdir nfsserver:/home/dev/sda2
D. mount /home
A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?
A. Out-of-band management
B. Crash cart access
C. Virtual administrator console
D. Local KVM setup
E. RDP connection
A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?
A. Firmware incompatibility
B. CPU overheating
C. LED indicators
D. ESD issues
A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?
A. A full, weekly backup with daily open-file backups
B. A full, weekly backup with daily archive backups
C. A full, weekly backup with daily incremental backups
D. A full, weekly backup with daily differential backups
Joe, a user in the IT department, cannot save changes to a sensitive file on a Linux server. An is -la shows the following listing: -rw-r--r 1 Ann IT 6780 12 June 2019 filename
Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?
A. chmod 777 filename
B. chown Joe filename
C. chmod g+w filename
D. chgrp IT filename
A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?
A. VMFS
B. Unattended scripted OS installation
C. P2V
D. VM cloning
A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?
A. Telnet connections are disabled on the server.
B. Role-based access control is misconfigured.
C. There are misconfigured firewall rules.
D. Group policies have not been applied.
An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:
The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?
A. Option A
B. Option B
C. Option C
D. Option D
A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?
A. Security guards
B. Security cameras
C. Bollards
D. An access control vestibule
Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?
A. Bolting door lock
B. Combination door lock
C. Electronic door lock
D. Biometric door lock
A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?
A. Confirm the client PCs are using the correct speed on the NIC.
B. Confirm the network uses the same NTP server as the clients.
C. Confirm the network has a helper address for the DHCP server.
D. Confirm the DHCP server is authorized in Active Directory.
A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?
A. Network connectivity on the server
B. LVM status on the server
C. Disk space in the /var directory
D. YUM dependencies
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action?
A. Upgrade the application package
B. Tighten the rules on the firewall
C. Install antivirus software
D. Patch the server OS