An administrator discovers a Bash script file has the following permissions set in octal notation;
777
Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?
A. chmod go-rw>:
B. chmod u=rwx
C. chmod u+wx
D. chmod g-rwx
A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?
A. Unattended scripted OS installation
B. P2V
C. VM cloning
Which of the following life-cycle management phases deals with a server that is no longer in operation?
A. End-of-life
B. Disposal
C. Usage
D. Procurement
A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?
A. Lockout
B. Length
C. Complexity
D. Minimum age
Which of the following BEST describes overprovisioning in a virtual server environment?
A. Committing more virtual resources to virtual machines than there are physical resources present
B. Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
C. Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
D. Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
Page 15 out of 70 Pages |
Previous |