Network statistics show that the 1Gbps switch port used for storage traffic is fully saturated. Which of the following switch technologies can be used to provide twice the bandwidth?
A. NAT
B. Multipathing
C. Link aggregation
D. VLAN
A company has an existing internal network that hosts confidential information. However, this network also has a connection to a separate site. The separate site is managed by a third party organization that has an SLA with the company. Which of the following BEST defines this cloud delivery model?
A. Private Cloud
B. Public Cloud
C. Community Cloud
D. Hybrid Cloud
A business has a virtualized environment which relies on specific file types, formats, and vendor supported tools. The business is MOST likely using which of the following?
A. Type II
B. Type I
C. Open source
D. Proprietary
Geo-clustering protects against which of the following?
A. Data corruptions
B. Global disasters
C. Denial of Service
D. Regional disruptions
Joe, a network administrator, is working with the security team to determine who deleted files from a file share. Which of the following would the security team ask Joe to provide during the security review?
A. Packet logs
B. Syslogs
C. Network logs
D. Audit logs
Joe, a system administrator, has noticed that a remote facility has entries in his 3-year-old slave LDAP server that has not been updated from its master in about a month. Which of the following failures is MOST likely to have occurred?
A. Replication from the master site to the remote site has failed.
B. Replication has not been configured.
C. Replication to the master site from the remote site has failed.
D. There is high latency on the replication connection.
A system administrator has a distribution switch with four uplinks to the core switch in a single aggregated link. The aggregated link requires all four connections to be up to function. Which of the following is this MOSTLY an example of?
A. Fault tolerance with multipathing
B. Load balancing with high availability
C. Load balancing without high availability
D. High availability with multipathing
Which of the following would be the FIRST choice to encrypt a laptop hard drive?
A. DES
B. TDE
C. AES
D. SSL
A company has a contract with a cloud vendor in which their monthly bill changes based on how much data is stored in the cloud. Which of the following is a benefit of this contract?
A. Portability
B. Application isolation
C. Scalability
D. Availability
Which of the following is the BEST technique an administrator can use to keep copies of various VM states while servers are online?
A. Cold backup
B. Snapshot
C. Clone
D. Disk image