Highly classified data is being shared on a company network. The systems administrator needs to ensure the data is safe
and only necessary personnel can access it. Which of the following protocols would be BEST to use for this type of data to
be shared?
B
An administrator was tasked to enforce disk quotas on the Windows file server. The administrator allocated 1GB of space to
each user. A month later, the users were still able to save beyond 1GB. Which of the following check boxes should have
been selected?
C
An administrator has several years worth of incremental, differential, and full backups on a variety of legacy media. All the
data must be kept for several years due to various regulations. Which of the following should the administrator perform to
BEST ensure the data survives intact?
A
A server administrator is formulating a DRP for an organization. The DRP specifies that all backups must be saved in a
format that supports linear data access. Which of the following media types would meet this objective?
A
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When
the administrator checks the IP address the response returns as 169.254.0.5.
Which of the following should the administrator verify?
D
Which of the following types of network cable would be BEST to attach to a high-performance server?
C
A server technician is trying to minimize power outages using a UPS that is plugged into an outlet in the server room. Given
this scenario, which of the following procedures should be followed to minimize outages?
A
After successfully authenticating to a remote server, a server administrator is presented with an interactive command line
with no graphical interface. Which of the following protocols did the administrator MOST likely use to securely connect to the
remote server?
A
An administrator is asked to harden a Linux server after installing the OS. Which of the following should the administrator do
FIRST?
A
Which of the following statements best represent the difference between SSH and Telnet? (Choose two.)
A D
Explanation:
Reference: https://study-ccna.com/telnet-ssh/