Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?
A systems administrator notices that a SAN is running out of space. There is no additional funding in the budget to upgrade the storage space. Which of the following will significantly reduce the storage space with the least effort? (Select two).
Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?
A recently deployed server is experiencing significant connection issues after being plugged into the network switch. An administrator was asked to review the server configuration and finds the following:
10Gb server NIC with 50-micron optic installed
10m single-mode fiber patch cable to the switch
10Gb switch interface with short-range optic installed
Which of the following steps should the administrator take next?
An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?
A systems administrator noticed a new network card is not being recognized by the operating system. Which of the following is most likely the cause?
A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?