Configure individual user accounts
Logon scripts
Local policy
Set NTFS permissions
第1题:
Which of the following BEST describes a hub?()
第2题:
Which of the following best describes a full backup? ()
第3题:
Which of the following is the BEST reason to label servers within the server room?()
第4题:
Which of the following is the MOST important reason for referencing the HCL?()
第5题:
When making changes to a server, which of the following is the BEST way to troubleshoot a problem?()
第6题:
Which of the following is the BEST way to ensure that a server is up-to-date with all updates as soon as they are released?()
第7题:
An IT manager is concerned about server administrators having to be cross-trained to work on every server. Which of the following is the BEST way to correct this problem?()
第8题:
To ensure server documentation is kept up to date
To ensure administrators avoid duplicate server names
To ensure server power requirements are met
To ensure the servers can be identified quickly and easily
第9题:
Server build checklist
Server baselining tools
Architecture diagrams
Hardware compatibility list
第10题:
Ensure that server baselines are documented for each server.
Ensure that all server documentation is completed and up to date.
Ensure that each server is accessible via a KVM over IP.
Ensure that each server is processed through the change control board.
第11题:
Configure individual user accounts
Logon scripts
Local policy
Set NTFS permissions
第12题:
To ensure that all hardware being used has previously been tested
To ensure that all hardware being used has the latest firmware
To ensure that all hardware being used is the most energy efficient
To ensure that all hardware being used can be upgraded in the future
第13题:
which one of the following best where layer can be used?()
第14题:
Which of the following is a best practice that can be used to ensure consistency when building systems?()
第15题:
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()
第16题:
Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()
第17题:
When implementing a solution to a problem, which of the following is the BEST course of action to take?()
第18题:
Which of the following is the BEST way to prevent social engineering tactics?()
第19题:
Which of the following should be used to ensure that all packets are received by every connecteddevice?()
第20题:
Perform root cause analysis and then test the theory to determine the cause.
Make changes to the system and document everything once the problem is resolved.
Make multiple changes to all affected areas to resolve all potential issues.
Make a change and if the problem is not resolved, reverse the change.
第21题:
Installing antivirus
Reconfiguring the firewall
Changing the permissions and passwords
Educating the end user
第22题:
Replace all components simultaneously to ensure that the system is functional.
Replace all hardware associated with the problem first to eliminate the possibility of hardware and move onto software.
Purchase new parts for the system to confirm that they function.
Implement one change at a time, reversing the change if it has not resolved the problem.
第23题:
Replace all components simultaneously to ensure that the system is functional.
Replace all hardware associated with the problem first to eliminate the possibility of hardware and move onto software
Purchase new parts for the system to confirm that they function.
Implement one change at a time, reversing the change if it has not resolved the problem.