Cloning
Bare Metal Restore
OS Restore
Snapshot
第1题:
An administrator is creating a comprehensive backup system to backup a single web server. Which of the following is the BEST way to provide full restore?()
第2题:
Which of the following is the BEST sequence to bare metal restore a server?()
第3题:
A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()
第4题:
A system administrator has a filesystem called /test/data in volume group datavg. Which of the following commands will allow the administrator to create a mirrored copy of the filesystem’s data?()
第5题:
Take an image backup nightly while the server is online.
Take an incremental backup while the server is offline.
Take a monthly snapshot backup while the server is online.
Take a differential backup while the server is online.
第6题:
Cloning
Bare Metal Restore
OS Restore
Snapshot
第7题:
Take an image backup nightly while the server is online.
Take an incremental backup while the server is offline.
Take a monthly snapshot backup while the server is online.
Take a differential backup while the server is online.
第8题:
chfs
chlv
mklvcopy
mkfscopy
第9题:
System image
Incremental backup
System state restore
Differential backup
第10题:
Determine backups available, restore backups, and verify data.
Restore applications, restore data, and verify data.
Restore OS, restore system applications, and restore data.
Contact end users of outage, restore backup data, and verify data.
第11题:
The supporting documentation
The vendors website
The Internet
The servers event logs
第12题:
Templates
RIS
Ghost
Slipstreaming
第13题:
Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()
第14题:
An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()
第15题:
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
第16题:
VPN
KVM over IP
Telnet
Remote Desktop
第17题:
It lets the administrator know which hardware will work with a particular OS.
It sets the bare minimum hardware requirements for specified software.
It allows the administrator to verify software compatibility amongst various vendors.
It verifies that hardware is fit for certain overclocking performance metrics.
第18题:
WPA-PSK encryption
SSID broadcast
Port forwarding
MAC filtering
第19题:
ping
netstat
nbtstat
telnet
第20题:
Network management
Protocol analyzer
Network monitoring
System diagnostic
第21题:
NIPS
Honeypot
DMZ
NIDS
第22题:
Determine backups available, restore backups, and verify data.
Restore applications, restore data, and verify data.
Restore OS, restore system applications, and restore data.
Contact end users of outage, restore backup data, and verify data.
第23题:
Factory Recovery Partition
Use Safe Mode
Last Known Good Configuration
Purchase a copy of the original OS
第24题:
The supporting documentation
The vendor website
The Internet
The server event logs