Question 6
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration. Which of the following technologies is the new connection using?
Question 7
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action?
Question 8
A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?
Question 9
Which of the following policies would be BEST to deter a brute-force login attack?
Question 10
An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?