Question 6

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration. Which of the following technologies is the new connection using?
  • Question 7

    A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action?
  • Question 8

    A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?
  • Question 9

    Which of the following policies would be BEST to deter a brute-force login attack?
  • Question 10

    An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?