Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she
notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select two.)
Correct Answer:
BD
The following three hosts are being put into a virtualization cluster for a new project initiative:
As more VMs are deployed to the cluster, which of the following virtualization technologies is MOST
likely to report an error with this configuration?
Correct Answer:
B
A company has purchased two new servers to host several virtualized database servers. Each server
has two 3GHz quad-core processors each, 64GB RAM each, 200GB DAS, and two 10GbE NICs each. Which of the following is the MOST likely bottleneck for these systems?
Correct Answer:
D
Which of the following generally has better performance when accessing larger databases?
Correct Answer:
B
The requirements for a web application state that it must be architected for high availability. The web application consists of front-end web server and back-end database server components respectively. Which of the following describes a solution that meets this requirement, while minimizing costs?
Correct Answer:
D