Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Which of the following BEST defines RAID 4?
A. RAID 4 allows two failed drives.
B. RAID 4 requires a minimum of 4 disks.
C. RAID 4 has a dedicated parity drive.
D. RAID 4 is less secure than RAID 5.
A user is notified that they will be terminated at the end of the day. As they start cleaning up their workstation, they try to FTP information from their workstation to a cloud-based, personal backup solution. Which of the following hardening techniques would be used to restrict their ability to transfer this information via FTP?
A. Antivirus
B. NIPS
C. NIDS
D. Host-based firewall
Which of the following backup types will enable scheduled point-in-time recovery of data and is accessible to end-users?
A. Image backup
B. Asynchronous replication
C. File system snapshot
D. Virtual machine cloning
An administrator finds and removes an "any any" allow rule. Which of the following is the administrator MOST likely modifying?
A. VPN
B. IDS
C. SSH
D. ACL
A system administrator repeatedly gets reports of files becoming unexpectedly deleted from a shared storage file system. Which of the following is the system administrator MOST likely to investigate?
A. LUN masking
B. Zoning
C. User and host authentication
D. Audit logs
Which of the following tests would be MOST appropriate when determining the need for patches and updates to servers in the datacenter?
A. Penetration testing
B. Risk assessment
C. Latency testing
D. Bandwidth determination
Which of the following is the BEST technique an administrator can use to keep copies of various VM states while servers are online?
A. Cold backup
B. Snapshot
C. Clone
D. Disk image
Which of the following are VM template hardening techniques? (Select TWO).
A. Joining a domain
B. IP address configuration
C. Deactivating default accounts
D. OS patching
E. Disabling all ports and services
Which of the following are used in guest servers? (Select TWO).
A. Virtual routers
B. Virtual NIC
C. NIC
D. HBA
E. Virtual memory