A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?
A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?
A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?