Question 6 of 109

A company wants to create highly available datacenters.

Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?

    Correct Answer: D

    To maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down, the use of Border Gateway Protocol (BGP) is appropriate. BGP is designed to manage how packets are routed across the internet through the exchange of routing and reachability information between edge routers in different autonomous systems. In a scenario where a WAN link fails, BGP can reroute the traffic through another available WAN link, ensuring continued availability and connectivity of the datacenters.

Question 7 of 109

A technician is helping a SOHO determine where to install the server.

Which of the following should be considered FIRST?

    Correct Answer: B

    When determining where to install a server, especially in a SOHO (Small Office/Home Office) environment, the primary concern should be the environment limitations. Factors such as temperature control, humidity, ventilation, and physical security greatly affect the performance and longevity of the server. Ensuring a suitable environmental conditions will prevent overheating, hardware failure, and potential data loss.

Question 8 of 109

A company is experiencing accessibility issues reaching services on a cloud-based system.

Which of the following monitoring tools should be used to locate possible outages?

    Correct Answer: A

    A network analyzer is the most appropriate tool for locating possible outages in a cloud-based system. It helps monitor and analyze the performance of the network, identifying issues such as connectivity problems, latency, and bandwidth usage. This enables the user to pinpoint where the accessibility issues are occurring, making it the correct choice.

Question 9 of 109

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs.

Which of the following systems should be used?

    Correct Answer: C

    The system that should be used to analyze and aggregate security logs is a Security Information and Event Management (SIEM) system. SIEM technology combines security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by network hardware and applications. It aggregates data from various sources, including network, security, servers, databases, and applications, consolidating it to ensure critical events are not missed. Additionally, SIEM systems can log security data and generate necessary compliance reports.

Question 10 of 109

After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers.

Which of the following should the technician perform so that Ann can get back to work as quickly as possible?

    Correct Answer: E

    Rolling back the drivers to the previous version is the most efficient solution in this scenario. By restoring the drivers to a version that is known to be compatible, Ann will be able to use her lab equipment again without the need for extensive reconfiguration or reinstallations. This process is usually quick and straightforward, minimizing downtime so that Ann can get back to work as quickly as possible.