Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CompTIA SK0-005 Dumps

Page: 1 / 46
Total 458 questions

CompTIA Server+ Certification Exam Questions and Answers

Question 1

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

Options:

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Question 2

A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?

Options:

A.

Unattended scripted OS installation

B.

P2V

C.

VM cloning

Question 3

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Question 4

A server administrator notices the /var/log/audit/audit.log file on a Linux server is rotating loo frequently. The administrator would like to decrease the number of times the leg rotates without losing any of the information in the logs. Which of the following should the administrator configure?

Options:

A.

increase the audit. log file size in the appropriate confutation file.

B.

Decrease the duration of the log rotate cycle tor the audit. log file.

C.

Remove the tog rotate directive from the audit .log We configuration.

D.

Move the audit. leg files to a remote syslog server.

Question 5

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

Options:

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Question 6

Which of the following backup types should be chosen for database servers?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Question 7

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

Options:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Question 8

Which of the following should a technician verify FIRST before decommissioning and wiping a file server?

Options:

A.

The media destruction method

B.

The recycling poke?

C.

Asset management documentation

D.

Non-utilization

Question 9

Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?

Options:

A.

Per-server

B.

per-seat

C.

Per-concurrent user

D.

per-core

Question 10

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

Options:

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Question 11

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

Options:

A.

Rack

B.

Virtual

C.

Tower

D.

Blade

Question 12

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

Options:

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Question 13

Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?

Options:

A.

Humidity control system

B.

Sensors

C.

Fire suppression

D.

Heating system

Question 14

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Question 15

A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?

Options:

A.

Alerting

B.

Retention

C.

Shipping

D.

Rotation

Question 16

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

Options:

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Question 17

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

Options:

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Question 18

A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do NEXT?

Options:

A.

Reinstall the server OS in repair mode while maintaining the data.

B.

Flash the BIOS with the most recent version.

C.

Reverse the latest change made to the server and reboot.

D.

Restart the server into safe mode and roll back changes.

Question 19

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

Options:

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Question 20

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

Options:

A.

Print

B.

File

C.

Database

D.

Messaging

Question 21

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

Options:

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Question 22

Which of the following is the MOST secure method to access servers located in remote branch offices?

Options:

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Question 23

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

Options:

A.

Remove all the data from the server drives using the least destructive method.

B.

Repurpose and recycle any usable server components.

C.

Remove all the components from the server.

D.

Review all company polices.

Question 24

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

Options:

A.

The keyboard is defective and needs to be replaced.

B.

The system failed before the display card initialized.

C.

The power supply is faulty and is shutting down the system.

D.

The NIC has failed, and the system cannot make a network connection.

Question 25

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

Options:

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Question 26

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Question 27

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Question 28

A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?

Options:

A.

Build a warm site and perform a fail over of the application.

B.

Build a cloud laaS and perform a fail over of the application.

C.

Build a hot site and perform a fail over of the application.

D.

Build a cold site and perform a fail over of the application.

E.

Perform a tabletop fail over of the application.

Question 29

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

Options:

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Question 30

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

Options:

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Question 31

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

Options:

A.

Private

B.

Hybrid

C.

Community

D.

Public

Question 32

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

Options:

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Question 33

Which of the following should be configured in pairs on a server to provide network redundancy?

Options:

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Question 34

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

Options:

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

Question 35

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

Options:

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Question 36

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

Options:

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Question 37

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Question 38

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 39

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

Options:

A.

Close unneeded ports.

B.

Disable unneeded physical ports.

C.

Set a BIOS password.

D.

Install a SIEM.

E.

Disable unneeded services.

F.

Install a HIDS.

Question 40

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Question 41

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Question 42

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Question 43

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

as

Options:

Question 44

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

Options:

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Question 45

A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?

Options:

A.

Reinstall the OS.

B.

Wipe the drives.

C.

Degauss the drives.

D.

Update the IP schema.

Question 46

Which of the following asset management documents is used to identify the location of a serves within a data center?

Options:

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Question 47

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

Options:

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Question 48

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Question 49

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Question 50

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

Options:

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Question 51

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

Options:

A.

Power cycle the storage arrays and rescan RAID on the server.

B.

Boot the OS into recovery mode and rescan the disks.

C.

Restore the default RAID configuration and reboot.

D.

Perform a rescan on the server's RAID controller.

Question 52

Which of the following should be created to understand how long data is stored and how frequently data backups should be scheduled?

Options:

A.

Retention policies

B.

Service-level agreement

C.

Life-cycle management

D.

Mean time to recover

Question 53

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

Options:

A.

0

B.

1

C.

5

D.

10

Question 54

A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?

Options:

A.

MTBF

B.

RTO

C.

MTTR

D.

RPO

Question 55

An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconf ig:

The application server is reading the following output from ipconf ig:

Which of the following most likely contains an error?

Options:

A.

IP address

B.

DHCP

C.

Gateway

D.

Subnet mask

Question 56

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Question 57

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.

VPN

B.

TFTP

C.

SSH

D.

HTTP

Question 58

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

Options:

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Question 59

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

Options:

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Question 60

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 61

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

Options:

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Question 62

Which of the following authentication types defines credentials as "something you have"?

Options:

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Question 63

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

Options:

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216.176.128.10

Question 64

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

Options:

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Question 65

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

Options:

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Question 66

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

Options:

A.

Most recently used

B.

Heartbeat

C.

Link aggregation

D.

Round robin

Question 67

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 68

Which of the following documents would explain the consequences of server downtime?

Options:

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Question 69

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

Options:

A.

SD card

B.

Optical

C.

Network

D.

USB

Question 70

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Question 71

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Question 72

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

Options:

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Question 73

A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?

Options:

A.

Check the firewall rules.

B.

Replace the CMOS battery in the server.

C.

Restart the time servers.

D.

Manually correct the time.

Question 74

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

Options:

A.

Drive

B.

Database

C.

Folder

D.

File

Question 75

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

Options:

A.

Network

B.

Embedded

C.

Optical

D.

USB

Question 76

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

Options:

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Question 77

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 78

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

as

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Question 79

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

Options:

A.

Increasing IOPS by implementing flash storage

B.

Implementing deduplication on the storage

C.

Extending capacity by installing a 4TB SATA disk

D.

Reformatting the disk as FAT32

Question 80

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Question 81

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

Options:

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Question 82

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

Options:

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Question 83

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Question 84

Which of the following is a benefit of failover NIC teaming?

Options:

A.

Decreased latency

B.

Increased transmission size

C.

Increased system resources

D.

Increased fault tolerance

Question 85

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

Options:

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Question 86

Which of the following factors would most likely impact the selection of an organization's cloud provider?

Options:

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

Question 87

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

Options:

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Question 88

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Question 89

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

Options:

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

Question 90

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Options:

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Question 91

A new 40GB NIC has just been installed in a server but is not detected within the Windows server OS. Which of the following would most likely fix the issue?

Options:

A.

Update the firmware on the NIC.

B.

Update the server OS.

C.

Update the remote management console.

D.

Update the switch firmware.

Question 92

A technician replaces a single faulted disk in the following array RAID 10, Four 15K SAS HDD The technician replaces it from a disk in spare parts, and the array rebuilds the data in a few minutes. After the array rebuild is complete, the system reports the IOPS on the disk array have dropped by almost 60% Which of the following should the technician investigate first?

Options:

A.

Check the RAID controller (or background rebuild tasks

B.

Check the firmware version on the newly replaced disk.

C.

Check the RPM speed on the newly replaced disk-

D.

Check the cache settings on the RAID controller.

Question 93

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

Options:

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Question 94

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

Options:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Question 95

A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue?

Options:

A.

A S.M.A.R.T. error is a predictive failure notice. The drive will fail in the near future and should be replaced at the next earliest time possible

B.

A S.M.A.R.T. error is a write operation error. It has detected that the write sent to the drive was incorrectly formatted and has requested a retransmission of the write from the controller

C.

A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly

D.

A S.M.A.R.T. error is an ECC error. Due to error checking and correcting, the drive has corrected the missing bit and completed the write operation correctly.

Question 96

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

as

as

Options:

Question 97

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

Options:

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Question 98

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

Options:

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Question 99

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Question 100

Which of the following policies would be BEST to deter a brute-force login attack?

Options:

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Question 101

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Question 102

A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution?

Options:

A.

Copy the fileshare to an LTO-4 tape drive

B.

Configure a new incremental backup job for the fileshare

C.

Create an additional partition and move a copy of the fileshare

D.

Create a snapshot of the fileshare

Question 103

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

Options:

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Question 104

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

Options:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Question 105

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Question 106

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

Options:

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Question 107

After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:

as

The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?

Options:

A.

Network port security

B.

An improper VLAN configuration

C.

A misconfigured DHCP server

D.

A misconfigured NIC on the server

Question 108

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

Options:

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Question 109

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Question 110

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Question 111

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

Options:

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Question 112

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Question 113

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

Options:

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Question 114

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

Options:

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Question 115

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Question 116

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

Options:

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Question 117

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

Options:

A.

The server has a faulty power supply

B.

The server has a CMOS battery failure

C.

The server requires OS updates

D.

The server has a malfunctioning LED panel

E.

The servers do not have NTP configured

F.

The time synchronization service is disabled on the servers

Question 118

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?

Options:

A.

Disable port 389 on the server

B.

Move traffic from port 389 to port 443

C.

Move traffic from port 389 to port 637

D.

Enable port 389 for web traffic

Question 119

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent

unauthorized server access? (Choose two.)

Options:

A.

Audit all group privileges and permissions

B.

Run a checksum tool against all the files on the server

C.

Stop all unneeded services and block the ports on the firewall

D.

Initialize a port scan on the server to identify open ports

E.

Enable port forwarding on port 80

F.

Install a NIDS on the server to prevent network intrusions

Question 120

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Options:

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Question 121

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Options:

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Question 122

A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?

Options:

A.

Crash cart

B.

Out-of-band console

C.

IP KVM

D.

RDP

Question 123

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

Options:

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Question 124

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

Options:

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Question 125

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Question 126

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

Options:

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Question 127

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

Options:

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Question 128

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

Options:

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Question 129

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

Options:

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Question 130

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

Options:

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Question 131

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Question 132

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 133

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Options:

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Question 134

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

Options:

A.

Schedule a mandatory reboot of the server

B.

Wait for the load average to come back down on its own

C.

Identify the runaway process or processes

D.

Request that users log off the server

Question 135

A recent power Outage caused email services to go down. A sever administrator also received alerts from the datacenter’s UPS.

After some investigation, the server administrator learned that each POU was rated at a maximum Of 12A.

INSTRUCTIONS

Ensure power redundancy is implemented throughout each rack and UPS alarms are resolved. Ensure the maximum potential PDU consumption does not exceed 80% or 9.6A).

a. PDU selections must be changed using the pencil icon.

b. VM Hosts 1 and 2 and Mail Relay can be moved between racks.

c. Certain devices contain additional details

as

Options:

Question 136

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Question 137

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

Options:

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Page: 1 / 46
Total 458 questions