A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?
A. V2V
B. P2V
C. V2P
D. P2P
An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
A. Load balancing
B. Direct access
C. Overprovisioning
D. Network teaming
Which of the following describes the concept of allocating more resources than what is available on a hypervisor?
A. Direct access
B. Overprovisioning
C. Link aggregation
D. Component redundancy
E. Scalability
A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?
A. Enable an administrator account
B. Enable a UEFI password
C. Disable WOL
D. Enable encryption at rest
Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
A. Cancelled change request
B. Change request postponement
C. Emergency change request
D. Privilege change request
E. User permission change request
Page 23 out of 70 Pages |
Previous |