1.
An administrator is developing a storage growth plan for a new file server. Which of the following should be implemented on the server so that storage growth is restricted?
2.
A server administrator is researching the purchase of SSD for a server. The administrator receives a report from the datacenter technician detailing current storage requirements and future growth planning estimates as follows:
ServerA: Current-15TB-Future-50% growth
ServerB: Current-20TB-Future-80% growth
Based on this report, which of the following represents the MINIMUM storage requirements needed?
3.
Which of the following provides two-factor authentication?
4.
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?
5.
A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?
6.
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
7.
Network devices between two firewalls are included in which of the following?
8.
A system administrator is tasked with dividing the network so that each department is separate from the other. Which of the following should be used to accomplish this task?
9.
Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?
10.

Which of the following methods should a technician perform to properly clear a hard drive before disposal?