Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA SK0-005 CompTIA Server+ Certification Exam Exam Practice Test

Page: 1 / 47
Total 470 questions

CompTIA Server+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

Options:

A.

The VLAN Is improperly configured.

B.

The DNS configuration Is invalid.

C.

The OS version is not compatible with the network switch vendor.

D.

The HIDS is preventing the connection.

Question 2

Which of the following is typical of software licensing in the cloud?

Options:

A.

Per socket

B.

Perpetual

C.

Subscription-based

D.

Site-based

Question 3

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

Options:

A.

Configure a firewall

B.

Close the unneeded ports

C.

Install a HIDS

D.

Disable unneeded services.

Question 4

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

Options:

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Question 5

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Question 6

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Question 7

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

Options:

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Question 8

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Options:

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Question 9

Hosting data in different regional locations but not moving it for long periods of time describes:

Options:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Question 10

Which of the following describes the installation of an OS contained entirely within another OS installation?

Options:

A.

Host

B.

Bridge

C.

Hypervisor

D.

Guest

Question 11

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

Options:

A.

Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.

B.

Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.

C.

Use the longest cables possible to allow for adjustment of the server rail within the rack.

D.

Install an Ethernet patch panel and a PDU to accommodate the network and power cables.

Question 12

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

Options:

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Question 13

Which of the following techniques can be configured on a server for network redundancy?

Options:

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Question 14

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

Options:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Question 15

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

Options:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Question 16

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 17

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?

Options:

A.

Disable port 389 on the server

B.

Move traffic from port 389 to port 443

C.

Move traffic from port 389 to port 637

D.

Enable port 389 for web traffic

Question 18

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Question 19

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

Options:

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Question 20

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Question 21

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

Options:

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Question 22

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 23

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Options:

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Question 24

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

Options:

A.

Install security cameras

B.

Utilize security guards

C.

Install bollards

D.

Install a mantrap

Question 25

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

Options:

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Question 26

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

Options:

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Question 27

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Options:

A.

Encrypt the data that is leaving the SAN

B.

Encrypt the data at rest

C.

Encrypt the host servers

D.

Encrypt all the network traffic

Question 28

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Options:

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Question 29

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

Options:

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Question 30

Which of the following server types would benefit MOST from the use of a load balancer?

Options:

A.

DNS server

B.

File server

C.

DHCP server

D.

Web server

Question 31

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Question 32

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Question 33

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Options:

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Question 34

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

Options:

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Question 35

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Question 36

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 37

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

Options:

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Question 38

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

Options:

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Question 39

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Question 40

An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).

Options:

A.

21

B.

22

C.

53

D.

67

E.

69

F.

110

G.

123

Question 41

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Question 42

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

Options:

A.

/root.ssh/sshd/config

B.

/etc.ssh/sshd_config

C.

/root/.ssh/ssh_config

D.

/etc.sshs_shd_config

Question 43

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?

Options:

A.

echo /newdisk >> /etc/fstab

B.

net use /newdisk

C.

mount –o remount, rw /newdisk

D.

mount –a

Question 44

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

Options:

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Question 45

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Question 46

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Options:

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Question 47

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 48

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

Options:

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

Question 49

A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?

Options:

A.

Check the firewall rules.

B.

Replace the CMOS battery in the server.

C.

Restart the time servers.

D.

Manually correct the time.

Question 50

An administrator received an alert that a backup job has been unsuccessful in the previous three attempts. The administrator discovers the issue occurred while backing up a user's data on a network share. Which of the following actions would be best to allow the job to complete successfully?

Options:

A.

Enabling open file backups in the backup job

B.

Moving the user's data off the network share

C.

Excluding the user's data from the backup

D.

Changing the backup job to exclude certain file types

Question 51

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

Options:

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Question 52

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

Options:

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Question 53

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Question 54

Which of the following documents would explain the consequences of server downtime?

Options:

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Question 55

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

Options:

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Question 56

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

Options:

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Question 57

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Question 58

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

Options:

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Question 59

A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,

copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to

narrow down the issue?

Options:

A.

Disk IOPS

B.

CPU utilization

C.

RAM utilization

D.

Network latency

Question 60

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Question 61

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Question 62

Which of the following backup methods can be performed while a server is running, will not interrupt files in use, and can be used to fully restore the server if needed?

Options:

A.

Snapshot

B.

Archive

C.

Open file

D.

Differential

Question 63

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

Options:

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Question 64

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Question 65

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

Options:

A.

Check the power cables

B.

Clean the fans.

C.

Replace the RAM.

D.

Reattach the CPU heat sink

Question 66

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 67

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

Options:

A.

Intrusion detection is blocking the port.

B.

The new application's DNS entry is incorrect.

C.

The application should be changed to use port 443.

D.

The core switch has a network issue.

Question 68

Following a recent power outage, a server in the data center has been constantly going offline and losing its configuration. Users have been experiencing access issues while using

the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would most

likely cause this issue? (Select two).

Options:

A.

The server has a faulty power supply.

B.

The server has a CMOS battery failure.

C.

The server requires OS updates.

D.

The server has a malfunctioning LED panel.

E.

The servers have NTP configured.

F.

CPU frequency scaling is set too high.

Question 69

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

Options:

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Question 70

A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?

Options:

A.

MTBF

B.

RTO

C.

MTTR

D.

RPO

Question 71

Several mobile users are reporting intermittent performance issues when attempting to access network shares on the file server. After some investigation, the server administrator notices the server resources are running at maximum capacity, even during non-peak usage times. A recent port scan of the network identified this server as having too many unnecessary ports open to the public. Which of the following is the most likely cause of the performance issues?

Options:

A.

Incorrect share permissions for mobile users

B.

Improper privilege escalation

C.

A virus infection

D.

A misconfigured firewall rule

Question 72

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

Options:

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Question 73

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

Options:

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

Question 74

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

Options:

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Question 75

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

Options:

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Question 76

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

Options:

A.

Most recently used

B.

Heartbeat

C.

Link aggregation

D.

Round robin

Question 77

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?

Options:

A.

Give the user "read and execute" rights to the file.

B.

Give the user "modify" rights to the file.

C.

Give the user "list folder contents" rights to the folder.

D.

Give the user "full control" rights to the folder.

Question 78

An administrator connects a server to an external gigabit switch, but the server can only get a speed of 100Mbps. Which of the following is the most likely cause of this issue?

Options:

A.

Defective network cable

B.

Port security

C.

Incorrect IP subnet

D.

Wrong VLAN

Question 79

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 80

A technician needs to replace two RAID controllers on a database server as part of an upgrade. The server has six external storage arrays and eight internal disks that are controlled by the two RAID controllers. The technician completes the replacement and powers the systems back on, but the server OS detects several missing disks in the configuration. Which of the following steps should the technician take first to resolve this issue?

Options:

A.

Reboot to the RAID controller BIOS and rescan for attached disks and arrays

B.

Start the motherboard UEFI and confirm the RAID controller start order is correct

C.

Turn off the external arrays and reboot the server to redetect the internal disks first

D.

Turn off all components and confirm all external and internal cables before rebooting

Question 81

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Question 82

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.

VPN

B.

TFTP

C.

SSH

D.

HTTP

Question 83

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

Options:

A.

SD card

B.

Optical

C.

Network

D.

USB

Question 84

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

Options:

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Question 85

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Question 86

A new 40GB NIC has just been installed in a server but is not detected within the Windows server OS. Which of the following would most likely fix the issue?

Options:

A.

Update the firmware on the NIC.

B.

Update the server OS.

C.

Update the remote management console.

D.

Update the switch firmware.

Question 87

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

Options:

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Question 88

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 89

A datacenter has ten 40U racks in a hot/cold aisle configuration. The room has adequate air conditioning, but servers located near the top of the racks are shutting down due to issues with heat. Which of the following should be used to reduce issues with heat?

Options:

A.

Rack balancing

B.

Higher-capacity PDUs

C.

Rail kits

D.

Blanking panels

Question 90

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Question 91

Which of the following factors would most likely impact the selection of an organization's cloud provider?

Options:

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

Question 92

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Question 93

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

Options:

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Question 94

A startup is migrating a stand-alone application that stores Pll to the cloud. Which of the following should be encrypted?

Options:

A.

Datain transit

B.

Dataat rest

C.

Databackups

D.

Dataarchives

Question 95

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

Options:

A.

A firewall blocking the ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entries for the print server are incorrect.

D.

The hosts file misconfigured.

Question 96

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

Options:

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Question 97

A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?

Options:

A.

1U

B.

2U

C.

3U

D.

4U

Question 98

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 99

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

Options:

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Question 100

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

Options:

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Question 101

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

Options:

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Question 102

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

Options:

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Question 103

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Question 104

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

Options:

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Question 105

Which of the following script types would MOST likely be used on a modern Windows server OS?

Options:

A.

Batch

B.

VBS

C.

Bash

D.

PowerShell

Question 106

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Question 107

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Question 108

A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?

Options:

A.

Necessary dependencies were installed for multiple architectures.

B.

There is not enough hard drive space.

C.

The server is infected with a virus.

D.

Some modules are not compatible.

Question 109

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

Options:

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Question 110

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

Options:

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Question 111

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?

Options:

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Question 112

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Question 113

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

Options:

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Question 114

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

Options:

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Question 115

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Question 116

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

Options:

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Question 117

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

Options:

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Question 118

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

Options:

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Question 119

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

Options:

A.

The keyboard is defective and needs to be replaced.

B.

The system failed before the display card initialized.

C.

The power supply is faulty and is shutting down the system.

D.

The NIC has failed, and the system cannot make a network connection.

Question 120

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

Options:

A.

21

B.

22

C.

443

D.

3389

Question 121

A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?

Options:

A.

DHCP configuration

B.

Firewall rules

C.

DLP software

D.

Intrusion detection system

Question 122

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

Options:

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Question 123

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Question 124

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

Options:

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Question 125

Which of the following ensures a secondary network path is available if the primary connection fails?

Options:

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Question 126

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

Options:

A.

0

B.

1

C.

5

D.

6

Question 127

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Question 128

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

Options:

A.

Rack

B.

Virtual

C.

Tower

D.

Blade

Question 129

A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?

Options:

A.

Consult internet forums to determine which is the most common cause and deploy only that solution.

B.

Test each solution individually to determine the root cause, rolling back the changes in between each test.

C.

Implement the shortest solution first to identify the issue and minimize downtime.

D.

Test each solution in succession and restore the server from the latest snapshot.

Question 130

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

Options:

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Question 131

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

Options:

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Question 132

Which of the following asset management documents is used to identify the location of a serves within a data center?

Options:

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Question 133

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Question 134

A server technician arrives at a data center to troubleshoot a physical server that is not responding to remote management software. The technician discovers the servers in the data center are not connected to a KVM switch, and their out-of-band management cards have not been configured. Which of the following should the technician do to access the server for troubleshooting purposes?

Options:

A.

Connect the diagnostic card to the PCle connector.

B.

Connect a console cable to the server NIC.

C.

Connect to the server from a crash cart.

D.

Connect the virtual administration console.

Question 135

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

Options:

A.

Fibre Channel

B.

FCoE

C.

iSCSI

D.

eSATA

Question 136

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

Options:

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Question 137

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Question 138

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

Options:

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Question 139

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

Options:

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Question 140

Which of the following script types uses commands That start with sec-?

Options:

A.

Batch

B.

Bash

C.

PowerShell

D.

JavaScript

Question 141

Which of the following backup types should be chosen for database servers?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Page: 1 / 47
Total 470 questions