Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA SK0-005 Dumps Questions Answers

Page: 1 / 35
Total 470 questions

CompTIA Server+ Certification Exam Questions and Answers

Question 1

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

Options:

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Buy Now
Question 2

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

Options:

A.

Implement rollback procedures.

B.

Upgrade the drivers.

C.

Reinstall the OS.

D.

Reboot the server.

Question 3

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Options:

Question 4

An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

Options:

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Question 5

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Question 6

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Question 7

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

Options:

A.

The UPS batteries were overcharged.

B.

Redundant power supplies require 220V power

C.

Both power supplies were connected to the same power feed

D.

The power supplies were not cross-connected

Question 8

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?

Options:

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Question 9

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

Options:

A.

A full, weekly backup with daily open-file backups

B.

A full, weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Question 10

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

Options:

A.

Print

B.

File

C.

Database

D.

Messaging

Question 11

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

Options:

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Question 12

A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?

Options:

A.

Reinstall the OS.

B.

Wipe the drives.

C.

Degauss the drives.

D.

Update the IP schema.

Question 13

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

Options:

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Question 14

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

Options:

A.

21

B.

22

C.

443

D.

3389

Question 15

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

Options:

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Question 16

An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

Options:

A.

Modifying the MAC used on the DHCP reservation

B.

Updating the local hosts file with the correct IP address

C.

Modifying the WWNN used on the DHCP reservation

D.

Updating the NIC to use the correct WWNN

Question 17

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

Options:

A.

A firewall blocking the ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entries for the print server are incorrect.

D.

The hosts file misconfigured.

Question 18

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

Options:

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Question 19

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

Options:

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Question 20

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

Options:

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Question 21

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Question 22

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

Options:

A.

rsync

B.

copy

C.

scp

D.

robocopy

Question 23

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

Options:

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Question 24

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Question 25

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

    HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Question 26

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Question 27

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

Options:

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Question 28

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Question 29

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Question 30

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

Options:

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Question 31

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

Options:

A.

The boot log

B.

The BIOS

C.

The HCL

D.

The event log

Question 32

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

Options:

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Question 33

Which of the following script types uses commands That start with sec-?

Options:

A.

Batch

B.

Bash

C.

PowerShell

D.

JavaScript

Question 34

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

Options:

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Question 35

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

Options:

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Question 36

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

Options:

A.

0

B.

1

C.

5

D.

6

E.

10

Question 37

An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?

Options:

A.

Replace one drive, wait for a rebuild, and replace the next drive.

B.

Shut down the server and replace the drives.

C.

Replace both failed drives at the same time.

D.

Replace all the drives in both degraded arrays.

Question 38

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

Options:

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Question 39

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

Options:

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Question 40

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

Options:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Question 41

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

Options:

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Question 42

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Question 43

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

Options:

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Question 44

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Question 45

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

Options:

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Question 46

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

Options:

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Question 47

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

Options:

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Question 48

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Question 49

A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights. Which of the following is most likely the issue?

Options:

A.

A single-mode fiber cable is used in place of multimode.

B.

The switchport is on the wrong virtual SAN.

C.

The HBA driver needs to be installed on the server.

D.

The zoning on the fiber switch is wrong.

Question 50

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Question 51

A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).

Options:

A.

Floor load limitations

B.

Rack balancing

C.

Proper lifting techniques

D.

Power connector type

E.

KVM placement

F.

Cable management

G.

UPS power requirements

Question 52

A datacenter has ten 40U racks in a hot/cold aisle configuration. The room has adequate air conditioning, but servers located near the top of the racks are shutting down due to issues with heat. Which of the following should be used to reduce issues with heat?

Options:

A.

Rack balancing

B.

Higher-capacity PDUs

C.

Rail kits

D.

Blanking panels

Question 53

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Question 54

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

Options:

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Question 55

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

Options:

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Question 56

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

Options:

A.

Simulated

B.

Tabletop

C.

Live

D.

Non-production

Question 57

Which of the following should a technician verify first before decommissioning and wiping a file server?

Options:

A.

The media destruction method

B.

The recycling policy

C.

Asset management documentation

D.

Document retention policy

Question 58

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

Options:

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Question 59

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

Options:

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Question 60

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

Options:

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Question 61

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

Options:

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Question 62

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?

Options:

A.

Give the user "read and execute" rights to the file.

B.

Give the user "modify" rights to the file.

C.

Give the user "list folder contents" rights to the folder.

D.

Give the user "full control" rights to the folder.

Question 63

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

Options:

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Question 64

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

Options:

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216.176.128.10

Question 65

Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?

Options:

A.

Loop

B.

Variable

C.

Comparator

D.

Conditional

Question 66

An administrator notices a server is offline. Upon checking the console, the administrator discovers the server is stuck at:

Configuring Memory.............

After a reboot, the server still exhibits the same behavior. The administrator is able to log in to the OOB remote management but is unable to log in to the server. Which of the following is the most likely cause of this issue?

Options:

A.

A DIMM has failed

B.

The VRAM is insufficient

C.

The RAID cache has failed

D.

The BIOS needs to be updated

Question 67

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

Options:

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

Question 68

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

Options:

A.

Most recently used

B.

Heartbeat

C.

Link aggregation

D.

Round robin

Question 69

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Question 70

A bad actor leaves a USB drive with malicious code on it in a company's parking lot. Which of the following describes this scenario?

Options:

A.

Hacking

B.

Insider threat

C.

Phishing

D.

Social engineering

Question 71

An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?

Options:

A.

1000BASE-LX 1Gb single-mode plenum fiber connection

B.

10GBASE-T 10Gb copper plenum Ethernet connection

C.

1000BASE-T 1Gb copper non-plenum Ethernet connection

D.

10GBASE-SR 10Gb multimode plenum fiber connection

Question 72

Which of the following will protect critical data during a natural disaster?

Options:

A.

Off-site storage

B.

Life-cycle management

C.

Environmental controls

D.

Data-at-rest encryption

Question 73

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

Options:

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Question 74

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Question 75

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Question 76

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

Options:

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Question 77

Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?

Options:

A.

Overprovisioning

B.

Scalability

C.

Thin clients

D.

Resource Monitor

Question 78

Which of the following actions should the server administrator perform on the server?

Options:

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Question 79

A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?

Options:

A.

Check the firewall rules.

B.

Replace the CMOS battery in the server.

C.

Restart the time servers.

D.

Manually correct the time.

Question 80

A new 40GB NIC has just been installed in a server but is not detected within the Windows server OS. Which of the following would most likely fix the issue?

Options:

A.

Update the firmware on the NIC.

B.

Update the server OS.

C.

Update the remote management console.

D.

Update the switch firmware.

Question 81

Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?

Options:

A.

Bolting door lock

B.

Combination door lock

C.

Electronic door lock

D.

Biometric door lock

Question 82

Which of the following documents would explain the consequences of server downtime?

Options:

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Question 83

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

Options:

A.

Close unneeded ports.

B.

Disable unused services.

C.

Set a BIOS password.

D.

Apply driver updates.

Question 84

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Options:

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Question 85

A startup is migrating a stand-alone application that stores Pll to the cloud. Which of the following should be encrypted?

Options:

A.

Datain transit

B.

Dataat rest

C.

Databackups

D.

Dataarchives

Question 86

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 87

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

Options:

A.

Intrusion detection is blocking the port.

B.

The new application's DNS entry is incorrect.

C.

The application should be changed to use port 443.

D.

The core switch has a network issue.

Question 88

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

Options:

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Question 89

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

Options:

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Question 90

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

Options:

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Question 91

An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?

Options:

A.

The user accounts are locked out

B.

The NTP on the client side is misconfigured

C.

MFA is not working

D.

The wrong time zone was set in the remote office

Question 92

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Question 93

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

Options:

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

Question 94

A junior administrator reported that the website used for anti-malware updates is not working. The senior administrator then discovered all requests to the anti-malware site are being redirected to a malicious site. Which of the following tools should the senior administrator check first to identify the potential cause of the issue?

Options:

A.

Data loss prevention

B.

File integrity monitor

C.

Port scanner

D.

Sniffer

Question 95

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

Options:

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Question 96

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Question 97

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

Options:

A.

Network connectivity on the server

B.

LVM status on the server

C.

Disk space in the /var directory

D.

YUM dependencies

Question 98

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

Options:

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Question 99

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Question 100

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

Options:

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 101

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Options:

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Question 102

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Options:

A.

SSO

B.

LDAP

C.

TACACS

D.

MFA

Question 103

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Question 104

Which of the following backup types only records changes to the data blocks on a virtual machine?

Options:

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthetic full

Question 105

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Options:

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Question 106

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Options:

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Question 107

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

Options:

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Question 108

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Question 109

Which of the following techniques can be configured on a server for network redundancy?

Options:

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Question 110

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

Options:

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Question 111

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Which of the following caused the issue?

Options:

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Question 112

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Options:

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Question 113

Which of the following can be used to map a network drive to a user profile?

Options:

A.

System service

B.

Network service

C.

Login script

D.

Kickstart script

Question 114

Which of the following BEST describes the concept of right to downgrade?

Options:

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Question 115

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

Options:

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Question 116

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

Options:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Question 117

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Question 118

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

Options:

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Question 119

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Question 120

Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?

Options:

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Question 121

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

Options:

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Question 122

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Question 123

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Question 124

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Question 125

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Options:

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

Question 126

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

Options:

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Question 127

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

Options:

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Question 128

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

Options:

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Question 129

Winch of the following is a type of replication in which all files are replicated, all the time?

Options:

A.

Constant

B.

Application consistent

C.

Synthetic full

D.

Full

Question 130

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Question 131

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

Options:

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Question 132

After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:

The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?

Options:

A.

Network port security

B.

An improper VLAN configuration

C.

A misconfigured DHCP server

D.

A misconfigured NIC on the server

Question 133

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

Options:

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Question 134

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Question 135

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Question 136

Which of the following policies would be BEST to deter a brute-force login attack?

Options:

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Question 137

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Question 138

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 139

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

Options:

A.

the correct firewall zone is active

B.

the latest firmware was applied

C.

NTP is running on the database system

D.

the correct dependencies are installed

Question 140

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?

Options:

A.

echo /newdisk >> /etc/fstab

B.

net use /newdisk

C.

mount –o remount, rw /newdisk

D.

mount –a

Question 141

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

Options:

A.

21

B.

22

C.

23

D.

443

Page: 1 / 35
Total 470 questions