Question 31

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?
  • Question 32

    A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?
  • Question 33

    Multiple users have reported an issue accessing files on a specific server. Which of the following should be the first step in troubleshooting this issue?
  • Question 34

    An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?
  • Question 35

    Which of the following licensing models was created by software companies in response to the increasing density of processors?