1.
Which of the following storage technologies uses file level access?
2.
Which of the following services can an administrator disable to prevent remote access to a system?
3.
An administrator is working on a guest operating system and needs access to the CD-ROM drive from the host operating system to install a driver. Which of the following describes what the administrator should use to accomplish this goal?
4.
Which of the following should a network administrator implement to logically segregate network traffic?
5.
The corporate security department is recommending that the administrator deploys Type I hypervisor versus Type II. Which of the following is a security concern in regards to deploying a Type II hypervisor?
6.
Which of the following is a concern when migrating from a private cloud to a public cloud?
7.
During the company's last DR exercise, the administrator noticed that the backup site (Site B) was responding 35% slower to ICMP packets than the primary site (Site A). Which of the following tests can help the administrator determine the root cause of a slow network?
8.
Which of the following is the BEST technique an administrator can use to keep copies of various VM states while servers are online?
9.
Which of the following would be a good reason to perform a V2V migration?
10.
An administrator has access to the following tools: ping, tracert, ipconfig/ifconfig, and route. All of these can be used to troubleshoot which of the following?