<< Prev Question Next Question >>

Question 338/400

Which of the following mitigates newly found vulnerabilities within software for an environment?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (400q)
Question 1: Which of the following tables would an administrator use to ...
Question 2: Which of the following network topologies should an administ...
Question 3: A company has deployed a website which is mirrored at a seco...
Question 4: Disk read/write performance on a VM is very low. The VM stor...
Question 5: Which of the following solutions primarily relies on private...
Question 6: Joe, a system administrator, has noticed that a remote facil...
Question 7: Which of the following tools would an administrator use to t...
Question 8: Which of the following cloud services provides billing, payr...
Question 9: Which of the following describes the combination of a disk, ...
Question 10: An administrator is tasked to reduce the company's datacente...
Question 11: A company has made the decision to virtualize as many server...
Question 12: A virtualized mission critical application requires a guaran...
Question 13: A fault tolerant storage array with clustered nodes is being...
Question 14: An administrator has been tasked with reducing costs by cons...
Question 15: A company has five servers and wishes to consolidate into a ...
Question 16: Which of the following attributes BEST describes "elasticity...
Question 17: Which of the following should an administrator implement whe...
Question 18: A security administrator is being hired to perform a penetra...
Question 19: Every quarter, technicians perform a UPS and generator test ...
Question 20: Which of the following is a file transfer protocol that woul...
Question 21: A company has a virtualized environment. Hosts are configure...
Question 22: An administrator has created a VM on a new virtualization ho...
Question 23: A company is migrating their physical servers to virtual. Th...
Question 24: An administrator deployed a VM that is hosting an internal w...
Question 25: Which of the following detection controls can be used to ide...
Question 26: Which of the following would BEST ensure uninterrupted commu...
Question 27: An administrator is installing a new Unix-based server and w...
Question 28: Which of the following storage technologies can leverage swi...
Question 29: After receiving a report from the helpdesk that a database a...
Question 30: A system administrator wants to create a mitigation strategy...
Question 31: Which of the following uses the business model of shared res...
Question 32: Joe, an administrator, is responsible for the maintenance an...
Question 33: A round robin is an example of which of the following method...
Question 34: An employee is asked to run an instance of a Linux OS while ...
Question 35: Which of the following will provide the MOST network address...
Question 36: A JBOD is being monitored and an administrator notices that ...
Question 37: Which of the following are components of an Object-Based Sto...
Question 38: Which of the following describes a best practice for placeme...
Question 39: Cloud bursting can alleviate which of the following attacks?...
Question 40: Which of the following are SAN protocols? (Select TWO)....
Question 41: A technician wants to configure a server for storage redunda...
Question 42: A group of users can no longer access a number of different ...
Question 43: A company has hired a new Chief Security Officer (CSO). Whil...
Question 44: A company has multiple guest operating systems running in a ...
Question 45: A technician would like to connect to a virtual server from ...
Question 46: Joe, an administrator, has just added a new VM to a producti...
Question 47: How many cores are available to the resource pool with a Typ...
Question 48: High CPU wait times can often be attributed to:...
Question 49: A VM that is generally used for development is tested quarte...
Question 50: An application has been moved to a new third-party public cl...
Question 51: Which of the following cloud services provides application i...
Question 52: Which of the following should a network administrator implem...
Question 53: Which of the following is true about Type I hypervisors?...
Question 54: Which of the following is a concern when migrating from a pr...
Question 55: A company wants to be sure their cloud infrastructure is sec...
Question 56: Which of the following cryptographic technologies is MOST li...
Question 57: Which of the following could be reviewed on devices to help ...
Question 58: A new WAN connection was recently installed between the prim...
Question 59: Which of the following is used for keeping track of all logi...
Question 60: A network engineer is investigating slow response times for ...
Question 61: Which of the following characteristics hosts several clients...
Question 62: Which of the following statements defines fault tolerance in...
Question 63: An administrator has access to the following tools: ping, tr...
Question 64: A technician wants to isolate storage from other network tra...
Question 65: Which of the following server types would be an ideal candid...
Question 66: A network administrator has been asked to implement a securi...
Question 67: Which of the following cloud service models would be recomme...
Question 68: An administrator has been reviewing a cloud provider's websi...
Question 69: An enterprise hypervisor offers which of the following benef...
Question 70: Which of the following may be used to provide certificate ma...
Question 71: Which of the following is an access control type that requir...
Question 72: Which of the following is the BEST method to isolate iSCSI n...
Question 73: A cloud service provider is associating chargeback values wi...
Question 74: A number of virtual servers suddenly crash, but the physical...
Question 75: A company has a virtual database server running in the cloud...
Question 76: An administrator is investigating performance issues related...
Question 77: An administrator is tasked with encrypting all Personally Id...
Question 78: In which of the following situations would a network adminis...
Question 79: A cloud infrastructure function that can grow and shrink to ...
Question 80: Which of the following tools would an administrator use to c...
Question 81: A system administrator wants to be able to use one server to...
Question 82: Which of the following should be implemented to ensure email...
Question 83: In the process of streamlining the IT activity, a company ha...
Question 84: Which of the following would a company implement to provide ...
Question 85: An administrator has recently added a new host server to a p...
Question 86: A company is building a new server cluster to host applicati...
Question 87: A department requires segregated access due to project requi...
Question 88: Which of the following is MOST likely to be retrieved from a...
Question 89: A company has decided to reduce their datacenter size. An ad...
Question 90: Which of the following tests would be MOST appropriate when ...
Question 91: An administrator has created a new virtual server according ...
Question 92: Which of the following is the BEST answer for implementing a...
Question 93: A network administrator needs to manage a virtual switch rem...
Question 94: Which of the following generally has better performance when...
Question 95: An administrator is called in to determine why a virtual des...
Question 96: Which of the following business continuity designs provides ...
Question 97: A bare metal hypervisor runs:
Question 98: A company has an existing internal network that hosts confid...
Question 99: Which of the following reduces the risk of known attacks fro...
Question 100: The IT department of a company has received many calls conce...
Question 101: Which of the following would be used to advertise a public I...
Question 102: During the company's last DR exercise, the administrator not...
Question 103: Which of the following is the correct subnet mask for a VM w...
Question 104: A client was unable to connect to the cloud provider for ove...
Question 105: Which of the following access control types would give a sys...
Question 106: A company wants to migrate its critical application to a pub...
Question 107: An administrator wants to repurpose server hardware to host ...
Question 108: Which of the following is typically the BEST boundary contro...
Question 109: Which of the following is used to locate a specific area of ...
Question 110: The BEST way to compare daily performance metrics against a ...
Question 111: Which of the following routine practices can help protect re...
Question 112: An administrator notices that the mouse does not perform as ...
Question 113: Virtual switches are:
Question 114: Which of the following MUST be in a zone? (Select TWO)....
Question 115: A Chief Information Officer (CIO) has established a budget f...
Question 116: A virtual campus lab is accessible by students remotely. Whi...
Question 117: Which of the following will allow the administrator to be ab...
Question 118: To avoid the same LUN showing up multiple times in client ho...
Question 119: A company has two datacenters in different cities. When one ...
Question 120: A new host has been bought to be a part of a new cluster. Th...
Question 121: Which of the following is an example of two-factor authentic...
Question 122: An administrator is tasked to perform a P2V migration of a c...
Question 123: An administrator is responsible for maintenance and support ...
Question 124: An administrator notices one of the VMs hosting an applicati...
Question 125: Which of the following protocols is MOST likely used by a sw...
Question 126: Which of the following storage technologies uses file level ...
Question 127: Which of the following backup types will enable scheduled po...
Question 128: Which of the following is the BEST approach to re-architect ...
Question 129: An administrator is planning to implement multipathing for i...
Question 130: Which of the following would create an efficient means of ac...
Question 131: An administrator is implementing a private cloud that will b...
Question 132: Which of the following would be used to mitigate the risk of...
Question 133: Which of the following cloud delivery models presents the LE...
Question 134: A business has a virtualized environment which relies on spe...
Question 135: An administrator has received a request for a disaster recov...
Question 136: Hardware compatibility among multiple hosts guarantees which...
Question 137: The Chief Technology Officer (CTO) has recently implemented ...
Question 138: Which of the following is an example of a customer solely re...
Question 139: Which of the following can be used by the cloud consumer and...
Question 140: Which of the following encryption technologies would MOST li...
Question 141: A web server is offline. Which of the following will allow t...
Question 142: An administrator has provisioned a LUN on a SAN and wants to...
Question 143: Which of the following types of virtual components performs ...
Question 144: A company has virtualized all of their servers on one physic...
Question 145: Which of the following services can an administrator disable...
Question 146: A company has just established a new branch office that need...
Question 147: An administrator is responsible for managing a host that is ...
Question 148: Which of the following should be installed on VMs to report ...
Question 149: Which of the following provides a secure tunnel through the ...
Question 150: The network administrator creates a DNS A record. Which of t...
Question 151: An administrator has configured a cluster but one of the VMs...
Question 152: An external USB hard drive physically attached to a server i...
Question 153: VM templates should have their default account passwords cha...
Question 154: Which of the following deployment models BEST meets the requ...
Question 155: A hypervisor host that has two fibre-channel ports needs to ...
Question 156: In regards to private clouds, which of the following BEST ex...
Question 157: Which of the following hypervisors will allocate resources M...
Question 158: Which of the following service delivery models is MOST likel...
Question 159: Which of the following is an example of vertical scaling?...
Question 160: A new network engineer logs into a router and discovers mult...
Question 161: Which of the following protocols allows fibre channel to be ...
Question 162: Which of the following solutions would an administrator depl...
Question 163: Multipathing software normally chooses favored paths based o...
Question 164: Which of the following is bridged and sends packets on the w...
Question 165: Which of the following are VM template hardening techniques?...
Question 166: Multipathing achieves which of the following high availabili...
Question 167: Which of the following, in conjunction with IPSec, can be co...
Question 168: Which of the following access control types allows users to ...
Question 169: Which of the following provides a company with the BEST equi...
Question 170: Which of the following BEST explains why remote access works...
Question 171: An organization wants to create a server VM that is segregat...
Question 172: Which of the following would be used to establish a dedicate...
Question 173: Which of the following factors yields cost savings in cloud ...
Question 174: Which of the following ensures that there is enough space fo...
Question 175: Which of the following BEST describes the process of mapping...
Question 176: After a recent outage going unnoticed, an administrator has ...
Question 177: Which of the following can be used to enable out-of-band man...
Question 178: Which of the following is a subcomponent of a virtual machin...
Question 179: Which of the following components should be virtualized and ...
Question 180: Which of the following is MOST important when factoring netw...
Question 181: In which of the following cloud services will the customer b...
Question 182: A system administrator is creating images of the physical se...
Question 183: An administrator is tasked with writing the company disaster...
Question 184: A company has purchased a new self-service provisioning syst...
Question 185: Students in a virtual lab must be able to upload and downloa...
Question 186: A technician has recently virtualized an older business crit...
Question 187: An administrator is no longer receiving alerting messages fr...
Question 188: An administrator is building a VM for a department whose req...
Question 189: Joe, a new administrator, is asked to enter his mobile phone...
Question 190: Several servers are connected to a SAN using three storage d...
Question 191: A company decided to go with a cloud-based hosted email solu...
Question 192: An administrator has been tasked with the collection of all ...
Question 193: Which of the following protocols could be used to identify t...
Question 194: A company uses a third-party utility to protect critical vir...
Question 195: Users on a network report that they are unable to access any...
Question 196: In a storage fabric, which of the following is the primary w...
Question 197: An administrator is troubleshooting the cause of multiple VM...
Question 198: A critical hypervisor security patch has been released and n...
Question 199: A storage system that retains data in a flat address space i...
Question 200: Which of the following cloud delivery models is deployed ove...
Question 201: Which of the following authentication types is being require...
Question 202: New servers were purchased specifically for virtualization c...
Question 203: Which of the following goals are met by multi-port link aggr...
Question 204: Which of the following would be used to prove the existence ...
Question 205: Which of the following would physically block access to a zo...
Question 206: An administrator allocates 50GB on a SAN for use by a server...
Question 207: Which of the following is a type of hypervisor that runs on ...
Question 208: An IT professional is considering the migration of an on-lin...
Question 209: A system administrator can no longer easily control a remote...
Question 210: An administrator has noticed that a 500MB file is taking ove...
Question 211: Which of the following can be used to protect data integrity...
Question 212: Which of the following offers 128, 192, and 256 bit encrypti...
Question 213: A host has four NICs. Two of the NICs that have been teamed ...
Question 214: Which of the following storage technologies is IP-based?...
Question 215: An administrator has logically grouped several VMs and confi...
Question 216: Encryption ensures which of the following? (Select TWO)....
Question 217: Geo-clustering protects against which of the following?...
Question 218: A catastrophic disk failure occurred on a company's critical...
Question 219: An administrator is configuring access to hypervisors that w...
Question 220: Which of the following may be used prior to encryption of in...
Question 221: Which of the following can be used to assign priority to spe...
Question 222: Which of the following would be the FASTEST way to backup a ...
Question 223: Which of the following cloud delivery models consists of pri...
Question 224: Which of the following RAID configuration would be used to a...
Question 225: Which of the following are used in guest servers? (Select TW...
Question 226: A storage administrator has created five new LUNs for a comp...
Question 227: An administrator needs to provide Internet access to all int...
Question 228: Which of the following can limit VM mobility in a host clust...
Question 229: A new server is connected to the fibre channel switch. In or...
Question 230: Which of the following would assist in preventing malware fr...
Question 231: One of the administrators of a cloud service provider has be...
Question 232: In order to enhance security on a SAN, which of the followin...
Question 233: A system administrator is testing various types of software ...
Question 234: An administrator receives an automated text that indicates a...
Question 235: Which of the following terms would describe a cloud characte...
Question 236: The Chief Information Officer (CIO) of a company would like ...
Question 237: Which of the following would be the FIRST choice to encrypt ...
Question 238: A technician wants to remotely gather a list of all the soft...
Question 239: An administrator is planning to implement multipathing for I...
Question 240: After deploying VM guests from a VM template on an NFS datas...
Question 241: An administrator adds a new virtualization host to an existi...
Question 242: The administrator of an organization needs to configure a VM...
Question 243: Anne, a disgruntled employee, decides to load a VM onto a US...
Question 244: Which of the following provides insight information when inv...
Question 245: A system administrator identified an issue on a critical ser...
Question 246: Which of the following would allow the knowledge management ...
Question 247: An administrator is building a sandbox environment. There is...
Question 248: Requiring all SaaS vendors to perform updates to systems wit...
Question 249: The corporate security department is recommending that the a...
Question 250: A user is notified that they will be terminated at the end o...
Question 251: Which of the following technologies should be used to reduce...
Question 252: An administrator finds and removes an "any any" allow rule. ...
Question 253: Joe, a network administrator, is working with the security t...
Question 254: A system engineer is asked to design a new department infras...
Question 255: A company has tasked an administrator with virtualizing the ...
Question 256: The actual data within an object store is called the:...
Question 257: Which of the following can be used to enable additional netw...
Question 258: A new self-service provisioning system has been deployed to ...
Question 259: Which of the following virtualization implementations yields...
Question 260: After a sudden spike in traffic Anne, an administrator, noti...
Question 261: Which of the following is LEAST suitable for online storage ...
Question 262: Which of the following can be used to encrypt data at rest o...
Question 263: A storage array is shared with other departments. An adminis...
Question 264: An administrator deployed ten application servers from a sin...
Question 265: Users report that they are unable to access the Internet. Th...
Question 266: A company with an online store website has migrated the webs...
Question 267: Which of the following would be a good reason to perform a V...
Question 268: An administrator is working on a guest operating system and ...
Question 269: A storage administrator has just partitioned storage to seve...
Question 270: The Chief Information Officer (CIO) of a company is tasked t...
Question 271: Which of the following is often used by a certificate to kee...
Question 272: Which of the following describes federated access control?...
Question 273: Which of the following are benefits of virtualization in a c...
Question 274: A company needs to have a system that allows for high availa...
Question 275: Which of the following security methods would be used to har...
Question 276: Which of the following would be a deciding factor when choos...
Question 277: Which of the following disk drive types would be the BEST fo...
Question 278: In which of the following situations would an administrator ...
Question 279: Management has implemented a policy which states that the OS...
Question 280: Which of the following cloud models would be used when imple...
Question 281: A company wants to build a cloud environment where individua...
Question 282: A network engineer continuously runs traceroute at different...
Question 283: A Chief Information Officer (CIO) has summoned an administra...
Question 284: Anne, an administrator, receives an alert indicating a disk ...
Question 285: A system administrator has been tasked with increasing redun...
Question 286: Which of the following protocols uses port 53, by default?...
Question 287: A corporate office allows employees to work remotely, using ...
Question 288: Which of the following only uses Fibre Channel to implement ...
Question 289: An administrator has implemented a self-service provisioning...
Question 290: A developer is storing a large number of images in binary fo...
Question 291: An administrator is unable to communicate with the physical ...
Question 292: An administrator is creating a new VM template and has a req...
Question 293: Which of the following would be the FIRST thing to do after ...
Question 294: A company has contracted email and storage services from a c...
Question 295: An administrator deployed a VM from a template which has the...
Question 296: An IT manager wishes to migrate classified data to a cloud e...
Question 297: A storage administrator has 100 terabytes of physical storag...
Question 298: The Chief Information Officer (CIO) is selecting a hardware ...
Question 299: After an administrator successfully migrated the last physic...
Question 300: A system administrator has a pool of employees using VMs tha...
Question 301: When conducting penetration testing on production systems du...
Question 302: Which of the following events will force a storage migration...
Question 303: Which of the following backup methods is MOST used by VM use...
Question 304: A system administrator repeatedly gets reports of files beco...
Question 305: Which of the following should an administrator perform to ha...
Question 306: Which of the following tools is used to manage virtual serve...
Question 307: A company that provides Software as a Service wants to preve...
Question 308: Which of the following is the BEST means of ensuring resourc...
Question 309: Which of the following would need to be consistent for a LUN...
Question 310: Two independent organizations want to share authentication a...
Question 311: An administrator is tasked with installing an application pa...
Question 312: An administrator has overcommitted resources in a cluster. A...
Question 313: Which of the following is the BEST classification for a host...
Question 314: Which of the following is true about a Type II hypervisor?...
Question 315: An administrator needs to add more guests in a virtual envir...
Question 316: An administrator is tasked with ensuring that any new virtua...
Question 317: Host A and B can both access LUNs one to ten in a single SAN...
Question 318: Which of the following allows a network device to process st...
Question 319: A system administrator has a server that has lost one of its...
Question 320: Which of the following ciphers consists of independent keys ...
Question 321: A company that provides cloud-based storage services wants t...
Question 322: Which of the following storage technologies is file-based?...
Question 323: A system administrator is planning storage infrastructure to...
Question 324: During deployment, which of the following should a technicia...
Question 325: A government agency wants to create a common environment tha...
Question 326: Which of the following BEST describes a copy of data?...
Question 327: A start-up company has recently gone public and is experienc...
Question 328: Which of the following is a disk interface type that has the...
Question 329: Ubiquitous access to cloud computing means:...
Question 330: When working with hypervisors configured in a highly availab...
Question 331: Which of the following ports is generally associated with a ...
Question 332: A small startup wins a contest giving them advertising time ...
Question 333: A system administrator is asked to build ten servers and is ...
Question 334: Every night a datacenter takes snapshots of each VM and back...
Question 335: Which of the following is used to handle non-sensitive infor...
Question 336: Which of the following storage technologies would be MOST ap...
Question 337: In order for a company to transition to a cloud solution, wh...
Question 338: Which of the following mitigates newly found vulnerabilities...
Question 339: Which of the following is a boot type that requires a NIC wh...
Question 340: A cloud based global multiplayer game is an example of which...
Question 341: Users report that they are unable to access a virtual server...
Question 342: ARP is used to resolve IP addresses to:...
Question 343: A web hosting company received reports of slow performance f...
Question 344: Which of the following could be assigned to a virtual CPU?...
Question 345: Which of the following would an administrator implement betw...
Question 346: An administrator has three VMs and each has been allocated t...
Question 347: The IT department has had problems coping with the demand of...
Question 348: The administrator wants to have central storage for all of t...
Question 349: A small business is moving ten physical servers to the cloud...
Question 350: An administrator is designing a VM cluster to support a new ...
Question 351: A datacenter migration is taking place and the administrator...
Question 352: Several clients hosted on a cluster, is BEST referred to as:...
Question 353: Clients of a cloud provider are able to access their informa...
Question 354: A system administrator has a distribution switch with four u...
Question 355: Which of the following could an administrator perform to res...
Question 356: In which of the following situations would a network adminis...
Question 357: Joe, an administrator, is experiencing connectivity problems...
Question 358: Although the SAN appears to be running without any problems,...
Question 359: Which of the following BEST defines RAID 4?...
Question 360: Which of the following cloud services would MOST likely be u...
Question 361: An administrator deployed a DaaS cloud delivery model for a ...
Question 362: Which of the following is true about physical and virtual CP...
Question 363: Which of the following describes the access control method w...
Question 364: Elasticity is closely related to which of the following clou...
Question 365: An administrator creates a new virtual desktop for a user. T...
Question 366: A server has two power supplies such that when the first one...
Question 367: An administrator is testing a new web server from outside of...
Question 368: Which of the following tools would an administrator use to t...
Question 369: Which of the following hypervisor types runs on a host opera...
Question 370: The performance logs on a virtualization server show a large...
Question 371: Which of the following would be considered a cold site?...
Question 372: A software development team is looking for a sandbox environ...
Question 373: Which of the following networking components would be used t...
Question 374: An administrator recently deployed a critical web server tha...
Question 375: Some of the VMs in an environment are experiencing network c...
Question 376: Which of the following BEST describes the need for LUN Maski...
Question 377: Which of the following is a MINIMUM requirement for VM onlin...
Question 378: Which of the following access control methods would be BEST ...
Question 379: Which of the following will be the BEST option for an admini...
Question 380: An administrator has enabled NPIV and has configured the SAN...
Question 381: A network administrator was tasked with creating several new...
Question 382: Which of the following will explain why only some of the CPU...
Question 383: Which of the following protocols would allow data to be tran...
Question 384: Which of the following would mitigate a "ping of death" atta...
Question 385: An IPS is used to:
Question 386: A company wants to streamline their reporting tools. They ha...
Question 387: A hypervisor is unable to access its fibre-channel storage. ...
Question 388: An administrator has installed a new NAS and is now attempti...
Question 389: Network statistics show that the 1Gbps switch port used for ...
Question 390: Which of the following network terms describes the process o...
Question 391: A company that provides IaaS to small business organizations...
Question 392: A company is required to provide their customers with zero d...
Question 393: Which of the following locations would a system engineer MOS...
Question 394: The Chief Information Officer (CIO) tells the IT department ...
Question 395: A programmer removes OS software from a laptop during develo...
Question 396: Users have been reporting slow response times on a database ...
Question 397: A storage administrator wants to limit an operating system f...
Question 398: An administrator creates a new VM, but after powering on the...
Question 399: Which of the following RAID levels spreads blocks of a file ...
Question 400: An administrator, who operates a public cloud, has been task...