لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A systems administrator is creating a playbook to run tasks against a server on a set schedule. Which of the following authentication techniques should the systems administrator use within the playbook?
A. Use the server’s root credentials
B. Hard-code the password within the playbook
C. Create a service account on the server
D. Use the administrator’s SSO credentials
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A systems administrator needs to configure monitoring for a private cloud environment. The administrator has decided to use SNMP for this task. Which of the following ports should the administrator open on the monitoring server’s firewall?
A. 53
B. 123
C. 139
D. 161
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Some VMs that are hosted on a dedicated host server have each been allocated with 32GB of memory. Some of VMs are not utilizing more than 30% of the allocation. Which of the following should be enabled to optimize the memory utilization?
A. Auto-scaling of compute
B. Oversubscription
C. Dynamic memory allocations on guests
D. Affinity rules in the hypervisor
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A company recently experienced a power outage that lasted 30 minutes. During this time, a whole rack of servers was inaccessible, even though the servers did not lose power. Which of the following should be investigated FIRST?
A. Server power
B. Rack power
C. Switch power
D. SAN power
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?
A. DLP
B. WAF
C. FIM
D. ADC
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A Chief Information Security Officer (CISO) is evaluating the company’s security management program. The CISO needs to locate all the assets with identified deviations and mitigation measures. Which of the following would help the CISO with these requirements?
A. An SLA document
B. ADR plan
C. SOC procedures
D. A risk register
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A systems administrator is creating a VM and wants to ensure disk space is not allocated to the VM until it is needed. Which of the following techniques should the administrator use to ensure?
A. Deduplication
B. Thin provisioning
C. Software-defined storage
D. iSCSI storage
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Users of an enterprise application, which is configured to use SSO, are experiencing slow connection times. Which of the following should be done to troubleshoot the issue?
A. ? Perform a memory dump of the OS
B. ? Perform a packet capture during authentication
C. ? Analyze the storage system IOPS
D. ? Evaluate the OS ACLs
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: