An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?
A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?
A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?
IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three).
A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?
A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?
Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?
A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,
copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to
narrow down the issue?