Which of the following documents would be useful when trying to restore IT infrastructure
operations after a non-planned interruption?
B
Explanation:
A disaster recovery plan would be useful when trying to restore IT infrastructure operations after a
non-planned interruption. A disaster recovery plan is a document that outlines the steps and
procedures to recover from a major disruption of IT services caused by natural or man-made
disasters, such as fire, flood, earthquake, cyberattack, etc. A disaster recovery plan typically includes:
A list of critical IT assets and resources that need to be protected and restored
A list of roles and responsibilities of IT staff and stakeholders involved in the recovery process
A list of backup and recovery strategies and tools for data, applications, servers, networks, etc.
A list of communication channels and methods for notifying users, customers, vendors, etc.
A list of testing and validation methods for ensuring the functionality and integrity of restored
systems
A list of metrics and criteria for measuring the effectiveness and efficiency of the recovery process
A disaster recovery plan helps IT organizations to minimize downtime, data loss, and financial impact
of a disaster, as well as to resume normal operations as quickly as possible.
A systems administrator is setting up a new server that will be used as a DHCP server. The
administrator installs the OS but is then unable to log on using Active Directory credentials.The
administrator logs on using the local administrator account and verifies the server has the correct IP
address, subnet mask, and default gateway. The administrator then gets on another server and can
ping the new server. Which of the following is causing the issue?
D
Explanation:
The server is not joined to the domain is causing the issue. A domain is a logical grouping of
computers that share a common directory database and security policy on a network. Active
Directory is a Microsoft technology that provides domain services for Windows-based computers. To
use Active Directory credentials to log on to a server, the server must be joined to the domain that
hosts Active Directory. If the server is not joined to the domain, it will not be able to authenticate
with Active Directory and will only accept local accounts for logon. To join a server to a domain, the
administrator must have a valid domain account with sufficient privileges and must know the name
of the domain controller that hosts Active Directory.
A systems administrator is preparing to install two servers in a single rack. The administrator is
concerned that having both servers in one rack will increase the chance of power issues due to the
increased load. Which of the following should the administrator implement FIRST to address the
issue?
A
Explanation:
The administrator should implement separate circuits first to address the issue of power issues due
to the increased load. Separate circuits are electrical wiring systems that provide independent power
sources for different devices or groups of devices. By using separate circuits, the administrator can
avoid overloading a single circuit with too many servers and reduce the risk of power outages,
surges, or fires. Separate circuits also provide redundancy and fault tolerance, as a failure in one
circuit will not affect the other circuit.
Which of the following is a method that is used to prevent motor vehicles from getting too close to
building entrances and exits?
A
Explanation:
Bollards are an example of a method that is used to prevent motor vehicles from getting too close to
building entrances and exits. Bollards are short, sturdy posts that are installed on sidewalks, parking
lots, or roads to create physical barriers and control traffic flow. Bollards can be used to protect
pedestrians, buildings, or other structures from vehicle collisions or attacks. Bollards can be made of
various materials, such as metal, concrete, or plastic, and can be fixed, removable, or retractable.
Reference: https://en.wikipedia.org/wiki/Bollard
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of
action for the technician to take while loading the rack?
B
Explanation:
The technician should install the heaviest server at the bottom of the rack to load the rack properly.
Installing the heaviest server at the bottom of the rack helps to balance the weight distribution and
prevent the rack from tipping over or collapsing. Installing the heaviest server at the bottom of the
rack also makes it easier to access and service the server without lifting or moving it. Installing the
heaviest server at any other position in the rack could create instability and safety hazards.
A technician is configuring a server that requires secure remote access. Which of the following ports
should the technician use?
B
Explanation:
The technician should use port 22 to configure a server that requires secure remote access. Port 22 is
the default port for Secure Shell (SSH), which is a protocol that allows secure remote login and
command execution over a network connection using a command-line interface (CLI). SSH encrypts
both the authentication and data transmission between the client and the server, preventing
eavesdropping, tampering, or spoofing. SSH can be used to perform various tasks on a server
remotely, such as configuration, administration, maintenance, troubleshooting, etc.
A server administrator is using remote access to update a server. The administrator notices
numerous error messages when using YUM to update the applications on a server. Which of the
following should the administrator check FIRST?
C
Explanation:
The administrator should check disk space in the /var directory first when using YUM to update
applications on a server. YUM stands for Yellowdog Updater Modified, which is a software package
manager for Linux systems that use RPM (Red HatPackage Manager) packages. YUM downloads and
installs packages from online repositories and resolves dependencies automatically. YUM stores its
cache files in the /var/cache/yum directory by default. These cache files include metadata and
package data for each repository that YUM uses. If there is not enough disk space in the /var
directory, YUM may fail to update applications and generate error messages.
Which of the following is an example of load balancing?
A
Explanation:
Round robin is an example of load balancing. Load balancing is the method of distributing network
traffic equally across a pool of resources that support an application. Load balancing improves
application availability, scalability, security, and performance by preventing any single resource from
being overloaded or unavailable. Round robin is a simple load balancing algorithm that assigns each
incoming request to the next available resource in a circular order. For example, if there are three
servers (A, B, C) in a load balancer pool, round robin will send the first request to server A, the
second request to server B, the third request to server C, the fourth request to server A again, and so
on.
Reference: https://simplicable.com/new/load-balancing
Which of the following is the MOST appropriate scripting language to use for a logon script for a
Linux box?
B
Explanation:
Shell is the most appropriate scripting language to use for a logon script for a Linux box. Shell is a
generic term for a command-line interpreter that allows users to interact with the operating system
by typing commands and executing scripts. Shell scripts are files that contain a series of commands
and instructions that can be executed by a shell. Shell scripts are commonly used for automating
tasks, such as logon scripts that run when a user logs on to a system. There are different types of
shells available for Linux systems, such as Bash, Ksh, Zsh, etc., but they all share a similar syntax and
functionality.
Which of the following tools will analyze network logs in real time to report on suspicious log events?
C
Explanation:
SIEM is the tool that will analyze network logs in real time to report on suspicious log events. SIEM
stands for Security Information and Event Management, which is a software solution that collects,
analyzes, and correlates log data from various sources, such as servers, firewalls, routers, antivirus
software, etc. SIEM can detect anomalies, patterns, trends, and threats in the log data and generate
alerts or reports for security monitoring and incident response. SIEM can also provide historical
analysis and compliance reporting for audit purposes.
Reference:
https://www.manageengine.com/products/eventlog/syslog-server.html