Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA SK0-005 CompTIA Server+ Certification Exam Exam Practice Test

Page: 1 / 41
Total 414 questions

CompTIA Server+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

Options:

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

Question 2

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

Options:

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Question 3

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

Options:

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Question 4

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

Options:

A.

0

B.

1

C.

5

D.

6

Question 5

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

Options:

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Question 6

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Question 7

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Question 8

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Question 9

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Question 10

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Question 11

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

Options:

A.

Replace all the array drives at once and then expand the array.

B.

Expand the array by changing the RAID level to 6.

C.

Expand the array by changing the RAID level to 10.

D.

Replace the array drives one at a time and then expand the array.

Question 12

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

Options:

A.

Document the findings and actions.

B.

Escalate the issue to the management team.

C.

Implement the solution.

D.

Establish an action plan.

Question 13

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 14

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

Options:

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Question 15

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Question 16

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

Options:

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Question 17

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

Options:

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Question 18

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Question 19

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

Options:

A.

rsync

B.

copy

C.

scp

D.

robocopy

Question 20

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

Options:

A.

RAIDO

B.

RAID1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Question 21

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Question 22

The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.

One of the alerts contains the following information:

Exploit Alert

Attempted User Privilege Gain

2/2/07-3: 09:09 10.1.200.32

--> 208.206.12.9:80

This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two).

Options:

A.

Disable all services on the affected application server.

B.

Perform a vulnerability scan on all the servers within the cluster and patch accordingly.

C.

Block access to 208.206.12.9 from all servers on the network.

D.

Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.

E.

Enable GPO to install an antivirus on all the servers and perform a weekly reboot.

F.

Perform an antivirus scan on all servers within the cluster and reboot each server.

Question 23

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

Options:

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Question 24

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

Options:

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Question 25

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 26

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

Options:

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216,176,128.10

Question 27

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full incremental

D.

Full differential

Question 28

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

Options:

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Question 29

A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)

Options:

A.

Remote desktop

B.

IP KVM

C.

A console connection

D.

A virtual administration console

E.

Remote drive access

F.

A crash cart

Question 30

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Options:

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Question 31

An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

Options:

A.

Modifying the MAC used on the DHCP reservation

B.

Updating the local hosts file with the correct IP address

C.

Modifying the WWNN used on the DHCP reservation

D.

Updating the NIC to use the correct WWNN

Question 32

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

Options:

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Question 33

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

Options:

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Question 34

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.

VPN

B.

TFTP

C.

SSH

D.

HTTP

Question 35

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

Options:

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

Question 36

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

Options:

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Question 37

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Question 38

A snapshot is a feature that can be used in hypervisors to:

Options:

A.

roll back firmware updates.

B.

restore to a previous version.

C.

roll back application drivers.

D.

perform a backup restore.

Question 39

Which of the following asset management documents is used to identify the location of a serves within a data center?

Options:

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Question 40

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

Options:

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

Question 41

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

Options:

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Question 42

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

Options:

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Question 43

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

Options:

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Question 44

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Question 45

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Question 46

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Question 47

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

Options:

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Question 48

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Question 49

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

Options:

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Question 50

Which of the following BEST describes overprovisioning in a virtual server environment?

Options:

A.

Committing more virtual resources to virtual machines than there are physical resources present

B.

Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion

C.

Allowing a virtual machine to utilize more resources than are allocated to it based on the server load

D.

Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure

Question 51

IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three).

Options:

A.

Run a vulnerability scanner on the server.

B.

Repartition the hard drive that houses the database.

C.

Patch the vulnerability.

D.

Enable a host firewall.

E.

Reformat the OS on the server.

F.

Update the antivirus software.

G.

Remove the database software.

Question 52

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Question 53

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

Options:

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Question 54

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

Options:

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Question 55

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

Options:

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Question 56

Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?

Options:

A.

Per-server

B.

per-seat

C.

Per-concurrent user

D.

per-core

Question 57

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

Options:

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Question 58

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

Options:

A.

The keyboard is defective and needs to be replaced.

B.

The system failed before the display card initialized.

C.

The power supply is faulty and is shutting down the system.

D.

The NIC has failed, and the system cannot make a network connection.

Question 59

After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?

Options:

A.

Remove the original network card and attempt to boot using only the new network card.

B.

Check that the BIOS is configured to recognize the second network card.

C.

Ensure the server has enough RAM to run a second network card.

D.

Verify the network card is on the HCL for the OS.

Question 60

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

Options:

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Question 61

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

Options:

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Question 62

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

Options:

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Question 63

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Question 64

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

Options:

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Question 65

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 66

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

Options:

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Question 67

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

Options:

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Question 68

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Question 69

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 70

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

Options:

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Question 71

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

Options:

A.

Close unneeded ports.

B.

Disable unneeded physical ports.

C.

Set a BIOS password.

D.

Install a SIEM.

E.

Disable unneeded services.

F.

Install a HIDS.

Question 72

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Question 73

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

Options:

A.

A full, weekly backup with daily open-file backups

B.

A full, weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Question 74

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Question 75

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

Options:

A.

set-service

B.

net

C.

sc

D.

services.msc

Question 76

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

Options:

A.

eSATA

B.

FCoE

C.

CIFS

D.

SAS

Question 77

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

Options:

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Question 78

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 79

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

Options:

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Question 80

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

Options:

A.

A firewall

B.

An antivirus

C.

AHIDS

D.

User account control

Question 81

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

Options:

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Question 82

Which of the following licensing models was created by software companies in response to the increasing density of processors?

Options:

A.

Per-instance

B.

Per-server

C.

per-user

D.

per-core

Question 83

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

Options:

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Question 84

Which of the following refers to the requirements that dictate when to delete data backups?

Options:

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Question 85

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Question 86

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

Options:

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Question 87

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

Options:

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Question 88

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Question 89

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

Options:

A.

0

B.

1

C.

5

D.

6

E.

10

Question 90

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Question 91

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

Options:

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

Question 92

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

Options:

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Question 93

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Question 94

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

Options:

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Question 95

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 96

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Question 97

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

Options:

A.

Link aggregation

B.

Heartbeat

C.

Most recently used

D.

Active-active

Question 98

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

Options:

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Question 99

A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?

Options:

A.

Alerting

B.

Retention

C.

Shipping

D.

Rotation

Question 100

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Options:

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Question 101

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Question 102

Which of the following script types would MOST likely be used on a modern Windows server OS?

Options:

A.

Batch

B.

VBS

C.

Bash

D.

PowerShell

Question 103

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Question 104

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

Options:

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Question 105

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Question 106

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

Options:

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Question 107

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

Options:

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Question 108

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Question 109

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Question 110

A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?

Options:

A.

Off-site backups

B.

Full backups

C.

Differential backups

D.

Incremental backups

Question 111

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Question 112

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

  • HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Question 113

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

Options:

A.

A firewall blocking the ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entries for the print server are incorrect.

D.

The hosts file misconfigured.

Question 114

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

Options:

A.

Connect the server to a KVM

B.

Use cable management

C.

Connect the server to a redundant network

D.

Connect the server to a UPS

Question 115

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

Options:

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Question 116

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

Options:

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Question 117

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Question 118

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

Options:

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Question 119

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

Options:

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Question 120

A technician has received tickets responding a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?

Options:

A.

Log rotation

B.

Alerts

C.

Reports

D.

Log stopping

Question 121

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

Options:

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Question 122

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

Options:

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Question 123

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Question 124

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

Options:

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Page: 1 / 41
Total 414 questions