Server+ Final Assessment

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A sysadmin needs to order a new server. The server has to have a vast amount of storage space and run fast, but try to be as cost-effective as possible. What type of hard drive is best to purchase? A.5400 RPM Traditional Hard Drive B.15,000 RPM Traditional Hard Drive C.Solid State Drive (SSD) D.Thumb Drive

15,000 RPM Traditional Hard Drive

Placeholder 3

24U-KVM Console 23U-KVM Switch 22U-Layer 3 Switch 21U-Layer 3 Switch 20U-Server 19U-Server 18U-Server 17U-Server 16U-Server 15U-Server 14U- 13U- 12&11U-NetApp Storage 10&9U-NetApp Storage 8&7U-NetApp Storage 6-1U- 2 120v 3000VA UPS with network cards

A sysadmin is troubleshooting an issue with connectivity. The sysadmin gets an Automatic Private IP Addressing (APIPA) address. What is most likely the cause of the issue? A.A device fails to connect to DHCP. B.There is a disconnected ethernet cable. C.Wireless Access Point has lost power. D.There is an update pending.

A device fails to connect to DHCP.

A sysadmin is setting up a server cluster. The sysadmin is setting up a load balancer to distribute server requests to increase availability and performance. What variation of server cluster is best for this? A.Active-active B.Active-passive C.Failover-failback D.Five nines

Active-active

For regulatory reasons, backups must be kept for seven years at a financial company. A sysadmin needs to keep these backups but needs to free up physical space to continue to create new backups. What should the sysadmin do? A.Archive offsite. B.Remove full backup. C.Move a snapshot. D.Create incremental backup.

Archive offsite.

A sysadmin is setting up a new wireless access point (WAP). When a device connects to the WAP, it cannot connect to the internet. The sysadmin runs ipconfig and sees the Internet Protocol (IP) Address 169.254.0.13. What kind of address is this? A.Physical Layer B.Automatic Private IP Addressing (APIPA) C.Dynamic Host Configuration Protocol (DHCP) D.Loopback

Automatic Private IP Addressing (APIPA)

A sysadmin has to set up a new server farm that allows for easy replication of Virtual Machines to scale the company's web application. They need to choose two types of hypervisor to allocate resources for this server farm. What are the two types of hypervisor? (Select all that apply.) A.Bare-metal B.Windows 10 C.Hosted D.Virtualization Guest

Bare-metal Hosted

A sysadmin is looking to choose between bare metal and virtualized server installations. What is one benefit of bare metal installations? A.Better security B.Cost effective C.Efficient use of hardware D.Shared resources

Better security

A company has a dedicated network operations center. They have several server enclosures to manage their consumer-facing web applications. These server enclosures consume less horizontal space and are easily secured. What form factor of server do they have? A.Tower B.Rack C.Crash cart D.Blade

Blade

A server is being set up with 4 terabytes (TB) of storage in one partition, but the operating system only sees 2 terabytes. What type of hard disk table configuration is being used? A.GUID Partition Table (GPT) B.Solid State Drive (SSD) C.Master Boot Record (MBR) D.New Technology File System (NTFS)

C.Master Boot Record (MBR)

A sysadmin is receiving numerous tickets about Remote Desktop Services sessions showing the wrong time and date. This is a reoccurring issue that happens every time the server reboots. During troubleshooting, the sysadmin identified the cause. What is one possibility as to why the time and date are wrong? A.CMOS battery failure B.Windows update C.Application update D.Hard drive failure

CMOS battery failure

A new form of disaster recovery service has cropped up recently. It is more cost-effective than a traditional multi-site solution and can be set up to be geographically diverse in location. What form of site is this? A.Warm site B.Hot site C.Cold site D.Cloud site

Cloud site

A fundamental concept of device access and security is the administration of user accounts. Permissions for accessing file shares are typically assigned by security group. Users are then added to security groups as necessary. In what ways can a sysadmin manage local user accounts in Windows? (Select all that apply.) A.Computer Management B.System Configuration C.Services D.cmd

Computer Management cmd

A senior system administrator is looking to automate the creation of virtual machines. Imaging is one solution found. What are the benefits of imaging? (Select all that apply.) A.Consistent B.Very efficient C.Need for repeated manual configuration D.Cannot be used in a self-service environment

Consistent Very efficient

A sysadmin created a virtual machine to use as a template. The sysadmin wants to automate the deployment of new servers with this template. What should the sysadmin do to create this template? A.Create a backup. B.Restore a backup. C.Create an archive. D.Create a snapshot.

Create a snapshot.

A major part of a sysadmin's role is to troubleshoot issues in a consistent manner that can eliminate possible future reoccurrences. What should a sysadmin do throughout the troubleshooting process? A.Establish a plan of action B.Test the theory C.Identify the problem D.Document findings, actions, and outcomes

Document findings, actions, and outcomes

During a normal audit of software installed on users' workstations, a sysadmin found a user with a piece of unauthorized software installed on their computer. The sysadmin needs to set up a way to prevent this from happening in the future. What should the sysadmin implement? A.Enable user access controls B.Enable encryption C.Install antivirus D.Disable secure shell (SSH)

Enable user access controls

There are various ways to protect data from unauthorized access and distribution. A sysadmin is looking to protect a company's data. The protection method must ensure confidentiality, integrity, and non-repudiation. What method would best solve this need? A.Retention policies B.File auditing C.Backups D.Encryption

Encryption

A server's file share is running out of storage space, and the server does not currently have any additional disk space available to expand the file share. The server has a few additional hard drive slots available. A sysadmin has just finished testing a theory on how to resolve the issue. However, before a sysadmin can make changes, what do they need to do, according to the fifth step in the troubleshooting methodology? A.Perform root analysis B.Verify full system functionality C.Establish a plan of action D.Implement preventative measures

Establish a plan of action

There are many parts to take into account when using cloud services. As such, this complicates the troubleshooting of issues as they arise. A sysadmin is troubleshooting a company's email service outage and verifies that the internet connection, software, and end-user devices are working perfectly fine. What type of an issue is this? A.Internal B.Standard Operating Procedure (SOP) C.External D.Scripting

External

A sysadmin is participating in an office remodel, adding an additional floor of workspace. They are running network cabling to that floor, but it is 125 meters away from the main network closet. The connection must not be accessible by people outside of the two floors the company occupies. What is one type of media that can run between the two network closets? A.Wireless access point B.RJ-45 Cat6a C.Fiber optic D.Gateway

Fiber optic

A company needs to run cabling from one building to the next. The only available piping that runs where they need it also contains high voltage power. They are worried about high attenuation caused by signal noise leaking into the cable. What form of cabling should they use? A.Twisted pair cable B.Fiber optic cable C.Wireless access point (WAP) D.Coaxial Cable

Fiber optic cable

A sysadmin is researching an issue where files on the shared drive are going missing. It is not believed that the issue is malicious, but awareness of what is causing the issue is important to a company to prevent data loss. What function can be enabled on a server to accomplish this? A.File auditing B.Password lockouts C.Policy of least access D.Backups

File auditing

A sysadmin needs to set up a backup scheme that is relatively simple and easy to manage. The sysadmin is not looking to keep backups for archiving purposes. What backup scheme should the sysadmin use? A.First-In, First-Out (FIFO) B.Grandfather-father-son C.Full D.Tower of Hanoi

First-In, First-Out (FIFO)

A sysadmin needs to set up a complete backup of the system. The sysadmin is going to run it at night to not impact end-users. What type of backup is the sysadmin running? A.Incremental B.Full C.Synthetic full D.Differential

Full

A sysadmin needs to prepare the server architecture to ensure business continuity in case of a device failure. Part of that may require automation to simplify restoration. What are potential automations that can speed up restoration in the case when there are no backups available? (Select all that apply.) A.Group policy B.Patch hardening C.Snapshot D.Hardware hardening

Group policy Snapshot

A sysadmin needs to protect a server by disabling features such as Universal Serial Bus (USB) ports, extra Network Interface Cards (NICs), and the Digital Video Disk (DVD) drive. By doing this, the sysadmin helps prevent some physical access to the server. What is this a concept of? A.Updating B.Segmentation C.Hardware hardening D.Patch hardening

Hardware hardening

placeholder 2

High Priority: -Antivirus -Multiple Channel Alerts -Alerts for Failed Logins Consider Changing: -Hire a cyber security specialist -Install Data Loss Prevention Software -Hire a team of Netadmins Don't Change: -Don't Install new Server -Continue using unique passwords -No training is needed for the employees

A sysadmin has decommissioned a server and needs to properly dispose of the data. A third party has suggested multiple options. Which highly reliable option should the sysadmin choose to completely obliterate the data on the hard drives? A.Incinerate drives B.Shred drives C.Format drives D.Smash drives

Incinerate drives

A sysadmin is setting up a backup system to run backups every 1 hour. The sysadmin needs the backup to not take a long time, because if it takes longer than the interval, the backups will start to fail. What type of backup should the sysadmin set up after the first initial backup? A.Differential B.Synthetic full C.Full D.Incremental

Incremental

A supervisor requires a bit more control over how updates and patching are handled at both the hardware and software levels. The supervisor suggested that patches need testing before being applied to the Content Relationship Management (CRM) software production environment. However, Capital Expenses (CapEx) need to be limited. The CRM provider sells a service that meets these requirements. What type of business model do they have? A.Software-as-a-Service B.Infrastructure-as-a-Service C.Virtualization D.Redundancy and High Availability

Infrastructure-as-a-Service

A sysadmin is installing a new Wireless Access Point (WAP). Devices cannot find the WAP to connect to it. The sysadmin tests the ethernet connection the WAP connects to, and it has connectivity. This issue is most likely at which layer of the Open Systems Interconnect (OSI) model? A.Layer 1 B.Layer 2 C.Layer 3 D.Layer 5

Layer 2

An employee approaches a sysadmin with issues sending an email. The employee reports that the email client is failing to connect to the server even though the computer connects to the internet and everything else seems normal. What layer of the Open Systems Interconnect (OSI) model is the most likely cause of the issue? A.Layer 1 B.Layer 3 C.Layer 6 D.Layer 7

Layer 7

A company wants to reduce Capital Expenses (CapEx) and total cost of ownership (TCO). They want to ensure the company does not have to maintain obsolete equipment. They do not want to move to a cloud provider and, instead, want to keep servers on-premise. What is an attractive option for this company? A.Leasing B.Private cloud C.Infrastructure-as-a-service D.Not replacing the equipment

Leasing

A boss asks a sysadmin to justify why the company needs to implement data retention for their email system. The firm is in a highly regulated industry. What is an important reason for data retention? A.Legal consideration B.Unwanted publication C.Unwanted access D.Encryption

Legal consideration

A recently hired junior sysadmin is filling a position that was left vacant for over a year. During the time that position was left vacant, nothing was added to the previously implemented asset tracking system. What are some of the risks associated with not tracking assets? (Select all that apply.) A.License violations B.Lower capital expenses C.Lower total cost of ownership D.Misinformed purchasing decisions

License violations Misinformed purchasing decisions

A company approaches their sysadmin to give an assessment of the physical security of the corporate office and its data center. They ask the sysadmin to recommend a couple options to deter criminals. What are two examples of physical security? (Select all that apply.) A.Lighting B.Antivirus C.Host-based intrusion detection system D.Fencing

Lighting Fencing

A sysadmin is setting up a Remote Desktop Services server and needs a way to connect a user's shared drives. What is one method to accomplish this consistently while signing in? A.Login script B.Logout script C.Simple Mail Transfer Protocol (SMTP) D.Dynamic Host Configuration Protocol (DHCP)

Login script

A sysadmin needs to create a backup script that will check if a specific folder path on 1000s of servers needs to be backed up or not. What type of code should the sysadmin use? A.Bash B.cmd C.Loop D.PowerShell

Loop

A sysadmin fixed a date and time issue. Now, the server has kernel panics and crashes upon boot. The server has redundant power supply cables plugged into two separate battery backups. What may be the cause that the sysadmin should investigate? A.Cloud service provider's website is down B.Memory failure C.Power outage D.Network cable unplugged

Memory failure

An employee is trying to access an internal website. That employee reports that there is a "web page not found" error message. What is most likely the cause? A.Secure sockets layer (SSL) B.Multifactor authentication C.Misconfigured firewall D.Principle of least privilege

Misconfigured firewall

A junior sysadmin is approached by the owner of an organization. The owner wishes to cut down on using proprietary-licensed software, because the owner heard it is the easiest way to cut down on costs. The sysadmin needs to explain to the owner that proprietary licensed software may have its benefits over free and open-source software that are worth the associated purchase cost. Choose all benefits of the proprietary software licensing model (Select all that apply). A.More reliable vendor support B.Easier to modify and redistribute C.More reliable documentation D.No cost

More reliable vendor support More reliable documentation

A sysadmin is configuring a server with Windows Server operating system. What is the file system typically used for security and stability? A.XFS B.ext4 C.ZFS D.NTFS

NTFS

A new network was set up with the Internet protocol (IP) range of 192.168.13.2-192.168.13.100. The internet service provider has set up a static IP address of 104.215.148.63. How are devices able to connect to the internet with this connection? A.Network Address Translation B.Internet Protocol Reservation C.Segmentation D.Virtual Local Area Network

Network Address Translation

A small organization reaches out to a junior sysadmin to recommend a centralized storage solution for its users to save files to outside their workstation. They are concerned that a device may break down or be stolen. If that happens, they will lose important and confidential data. However, they are very price conscious. What recommendation would allow for centralized data storage, may include redundancy, but is relatively inexpensive? A.Network Attached Storage (NAS) B.Blade server C.Cloud backup for all workstations D.External Universal Serial Bus (USB) drive

Network Attached Storage (NAS)

A sysadmin set up a server with multiple network interface cards combining them into one single Internet Protocol address connection. This is what concept? A.Active-active B.Active-passive C.Network Interface Card (NIC) teaming D.Redundant Array of Inexpensive Disks (RAID)

Network Interface Card (NIC) teaming

Many parts of a server require time to be precise to function. If, at any time, the time is no longer accurate, those parts may fail or present error messages. A sysadmin needs to ensure all devices within a domain have the proper time and date. What protocol should be used to ensure proper time and date? A.Network Time Protocol (NTP) B.Dynamic Host Connection Protocol (DHCP) C.Secure Sockets Layer (SSL) D.Kerberos

Network Time Protocol (NTP)

A new systems administrator at an organization is working on a new project. The organization requires control over security and data, as the data they store is highly sensitive. They are willing to bear the increased costs and maintenance. What kind of deployment are they looking for? A.Software-as-a-Service B.Infrastructure-as-a-Service C.On-premise D.Cloud

On-premise

A server recently crashed and refuses to boot back up. The company's shared drives are not affected. A sysadmin is running a system state backup restore. The sysadmin is not worried about replacing existing data during the restoration. What type of restoration should the sysadmin do? A.Overwrite B.Side-by-side C.Alternate location D.Bare-metal

Overwrite

A user complains that their password has expired and they are unable to set a new password. What reasons may be preventing the user from setting a new password? (Select all that apply.) A.Password complexity B.Multifactor authentication C.Single sign-on D.Password reuse

Password complexity Password reuse

A sysadmin needs to protect a server by updating the Operating System, updating hardware firmware, and updating applications. Doing this may eliminate many surfaces of attack by outside hackers. What is this a concept of? A.Patch hardening B.Hardware hardening C.File auditing D.Segmentation

Patch hardening

The office manager for a company is upset that the file server was down while the sysadmin was on paid time off (PTO). They demand that they get a key to the door to the server room in order to restart the file server. What type of security is this? A.Physical security B.Firewall C.Local area network D.Network Security

Physical security

A sysadmin is wiring a new office for internet access and needs to ensure that proper building codes and connectivity quality expectations are followed when wiring network connectivity in the overhead space in the ceiling. What type of cable should the sysadmin use that will be the most reliable method to accomplish this? A.Plenum B.Coaxial C.Unshielded twisted pair D.Ethernet over power

Plenum

A sysadmin receives a support ticket stating that an employee is causing trouble after going through the Human Resources folder on the company shared drive. How does the sysadmin efficiently resolve the issue? A.Use data encryption B.Principle of least privilege C.Multifactor authentication D.Use single sign-on

Principle of least privilege

A junior sysadmin in a small organization needs to order equipment. The small organization is looking to replace their aging hardware and does not know what to order. What are the four major subsystems needed for server specifications? A.Graphics Processor, Network, Memory, Storage B.Processor, Memory, Storage, Network C.Power Supply, Processor, Network, Storage D.Cooling Fan, Processor, Storage, Memory

Processor, Memory, Storage, Network

A server just failed to boot. A sysadmin did a diagnostic test, and one of the hard drives has failed. Some data has been lost. What type of redundancy did the storage have? A.RAID 1 B.RAID 0 C.RAID 6 D.RAID 5

RAID 0

A sysadmin needs to set up a brand new server that protects against data loss, even if two disks fail. What type of Redundant Array of Inexpensive Disks (RAID) could this be? (Select all that apply.) A.RAID 10 B.RAID 1 C.RAID 0 D.RAID 6

RAID 10 RAID 6

Physical security can include mounting servers and locking them to prevent anyone from accessing the hard drives (HDDs) or inserting a removable media device. What are servers typically mounted in? A.Network closet B.Rack C.Mantrap D.Desk

Rack

A system architect has a project to implement: a web application that requires near-zero downtime. It is a business-critical application that would cost the company business and reputation if it failed. The system architect needs to make sure there is not one single point of failure. What is this idea called? A.Redundancy and high availability B.Virtualization C.Bare-metal install D.Software-as-a-Service

Redundancy and high availability

A senior sysadmin needs to ensure that a company's servers minimize single points of failure. The sysadmin is currently focusing on connectivity for their single server. What concept is this? A.Standard operating procedure (SOP) B.Virtualization C.Server redundancy D.Redundant networking

Redundant networking

A sysadmin needs to make a change to a Windows server remotely and securely. What administrative interface is best suited for this action? A.Kernel-based Virtual Machine (KVM) B.Remote Desktop Protocol (RDP) C.Secure Sockets Layer (SSL) D.Secure Shell (SSH)

Remote Desktop Protocol (RDP)

A sysadmin needs the ability to manage a server, even if it is turned off. The sysadmin learned that the server supports out-of-band management. What are some benefits of out-of-band management of a server? (Select all that apply.) A.Merges administrative and production traffic B.Remote power on and off of server C.Increased security D.Increased performance of server

Remote power on and off of server Increased security

Risks cannot be eliminated. A sysadmin is looking for ways to mitigate risks. Which of the following would prove least effective in mitigating risk? A.Conducting log analysis B.Monitoring data access C.Implementing Data Retention D.Removing Security Information and Event Management (SIEM)

Removing Security Information and Event Management (SIEM)

An employee was let go from a company and all the let-go employee's emails have been deleted. A sysadmin needs to prevent this from happening in the future. What type of policy should be set up to prevent data loss? A.Retention B.Encryption C.Backup D.Application hardening

Retention

A company purchased a new office building and needs to set up a network for employees to complete their work. What is a network device that operates on Layer 3 of the OSI model? A.Switch B.Network Access Control C.Router D.Media

Router

A junior sysadmin is currently ordering a new server to replace an aging server that received constant complaints about being slow. Once the server arrives, what should the sysadmin do to ensure normal behavior for that server, regardless of the specifications? A.Install Linux. B.Install Windows 10. C.Run performance baseline. D.Add more memory.

Run performance baseline.

A junior sysadmin is looking to set up a simple backup of a file server. The small company the sysadmin works for cannot afford to set up a full-fledged backup system, but has an unused network attached storage (NAS) device available. What is one option available to provide a consistent and scheduled way to accomplish this? A.Swapping hard disks B.Manual copy C.Scripting D.Updating

Scripting

A sysadmin needs to make a change to a Linux server remotely and securely. What administrative interface is best for this action? A.Remote Desktop Protocol (RDP) B.Kernel-based Virtual Machine (KVM) C.Secure Sockets Layer (SSL) D.Secure Shell (SSH)

Secure Shell (SSH)

A sysadmin needs to set up two separate networks within the same physical location and needs to use the same hardwired connections for both networks. However, the network equipment is very basic, and there is no budget. How would the sysadmin accomplish this? A.Wireless Access Point (WAP) B.Segmentation C.Server Message Block (SMB) D.Virtual Local Area Network

Segmentation

A server has multiple forms of internally attached storage. Which is a form of internal storage? A.Storage Area Network (SAN) B.Just a Bunch of Disks (JBOD) C.Serial Advanced Technology Attachment (SATA) D.Network Attached Storage (NAS)

Serial Advanced Technology Attachment (SATA)

A junior sysadmin must differentiate between devices supported in the organization. What type of device hardware is designed for high performance, redundancy, and may have multiple network interface cards? A.Server B.Workstation C.Firewall D.Processor

Server

A sysadmin is advising the owners of a company on cloud computing. They are looking to revolutionize how Information Technology (IT) services are provided at their company. What is not something the admin will discuss based on the NIST? A.On-demand self-service B.Server Redundancy C.Measured Service D.Resource Pooling

Server Redundancy

As a company expands, various services may need to be integrated to cut down the number of accounts being managed by a sysadmin. What system can be set up to link accounts? A.Multifactor authentication B.Single sign-on C.Password auditing D.Password complexity

Single sign-on

A systems administrator is looking to cut down on Capital Expenses (CapEx) and to limit the cost of on-premise installing, maintaining, patching, and upgrading the Content Relationship Management (CRM) software. The CRM provider sells a service that meets these requirements. What type of business model do they have? A.Infrastructure-as-a-Service B.On-Premise C.Platform-as-a-Service D.Software-as-a-Service

Software-as-a-Service

Upper management wants to set up a server architecture that allows for rapid deployment of servers for future expansion needs. The sysadmin wants to ensure that the servers are set up correctly, even if someone else has to do the setups on their own. What kind of document should be created that is available and usable across the entire department? A.Standard Operating Procedure (SOP) B.Design documentation C.Inventory management D.Service manual

Standard Operating Procedure (SOP)

A system administrator set up a backup for the company shared drives. That sysadmin wants to also set up another backup to specifically target essential operating system configurations. What kind of backup should run? A.File-level B.Incremental C.Full D.System state

System state

A traditional Network Operations Center is not available. A sysadmin needs to order a server that may be more useful in a small office. What form factor of a server should be bought? A.Blade B.Laptop C.Tower D.Crash cart

Tower

There are multiple backup schemes. A sysadmin wants the backup scheme to be effective for archiving and allow for recovery of older information. What backup scheme should the sysadmin use? A.First-In, First-Out (FIFO) B.Tower of Hanoi C.Grandfather-father-son D.Full

Tower of Hanoi

A sysadmin is looking to contract a third-party vendor for disaster recovery in case the main corporate office goes down. The sysadmin wants to balance cost with speed of recovery. However, they want a more traditional multi-site option. What is the best type of site to have the vendor set up? A.Cold site B.Hot site C.Warm site D.Cloud site

Warm site

As part of an organization's change management process, a system needs to be set up to manage patching. A sysadmin has a Windows environment and wants to ensure that all devices on the domain are updated according to a schedule and a set of criteria. What type of system should the sysadmin set up? A.Time Management B.Application Hardening C.Windows Update D.Windows Server Update Service

Windows Server Update Service

A hardware firewall is having issues completing Virtual Private Network (VPN) connections. A sysadmin needs to determine what step of the connection process it fails. What software can sniff the traffic and display the contents of that transmission? A.Wireshark B.Antivirus C.Card reader D.Ethernet

Wireshark

A server is being set up with a Linux operating system. It needs to have its hard disks partitioned to support very large partitions, ACL permissions, and compression. What file system should be used? A.Ext4 B.ZFS C.New Technology File System (NTFS) D.XFS

ZFS

A server is running out of space, which is starting to cause problems for users. A sysadmin is managing the Linux server's file system to see what is consuming much of the disk space. They used a standard storage management command but need it in a more human-readable format. What command and option should they use? A.df -h B.du -h C.diskpart -d D.fdisk

df -h

A sysadmin deployed a RemoteApp to each employee's computer in the Human Resources group. However, a user reports that they do not see the RemoteApp. What command should the sysadmin run on that user's computer to investigate the issue? A.fdisk B.ipconfig C.gpedit D.cmd

gpedit

A sysadmin has a brand new server that has a Linux Operating System installed. They need to manage the disk partitions. What commands could be used? (Select all that apply.) A.Disk management B.parted C.fdisk D.diskpart

parted fdisk

A system administrator is troubleshooting issues in their environment. What is one command line tool that can assist in intercepting network traffic? A.nslookup B.ipconfig C.ip addr D.tcpdump

tcpdump


Set pelajaran terkait

JMC 348 Principles of Advertising- Exam one

View Set

Chapter 37: Caring for Clients with Central and Peripheral Nervous System Disorders -

View Set

Shifting the Aggregate Demand & Aggregate Supply Curve

View Set

FDR's Policies (thanks ecolowdown)

View Set

CompTIA Security+ 701 Study Guide

View Set

Midterm Discussion Questions (13,14,15)

View Set