1. A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller,the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?
A) Guest account B) User account C) Service account D) Shared account
2. A systems administrator is configuring a system that uses data classification labels. Which of the following will the administrator need to implement to enforce access control?
A) Rule-based access control B) Role-based access control C) Mandatory access control D) Discretionary access control
3. Joe,a backup administrator,wants to implement a solution that will reduce the restoration time of physical servers. Which of the following is the BEST method for Joe to use?
A) Full B) Snapshots C) Incremental D) Differential
4. A technician must configure a firewall to block external DNS traffic from entering a network. Which of the following ports should they block on the firewall?
A) 143 B) 53 C) 443 D) 110
5. During a routine audit,it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring again?
A) Group policy management B) Account expiration policy C) Credential management D) Acceptable use policy
Leave a comment