00:00

QUESTION 16

From which attack does TPM protect information that is stored in hardware?

Correct Answer: B

QUESTION 17

A server administrator must monitor a Dell PowerEdge server without installing any additional software. Which management tool must they use?

Correct Answer: B

QUESTION 18

In ECC memory, how many extra bits are used for every 64-bit value to facilitate single-bit error correction, based on Hamming code?

Correct Answer: C

QUESTION 19

What is the primary function of the Silicon Root of Trust in Dell PowerEdge servers?

Correct Answer: B

QUESTION 20

A company operating a medium-sized business needs a server for virtualization and advanced computing but also values quiet operation for an office setting.
Which specific type of tower server configuration should they consider balancing these needs?

Correct Answer: A