March Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA SK0-005 CompTIA Server+ Certification Exam Exam Practice Test

Page: 1 / 41
Total 414 questions

CompTIA Server+ Certification Exam Questions and Answers

Question 1

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

Options:

A.

rsync

B.

copy

C.

scp

D.

robocopy

Question 2

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

Options:

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Question 3

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Question 4

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

Options:

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Question 5

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Question 6

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

Options:

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Question 7

An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the MINIMUM number of disks needed for this application?

Options:

A.

6

B.

7

C.

8

D.

9

Question 8

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

Options:

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

Question 9

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

Options:

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Question 10

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 11

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

Options:

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Question 12

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Question 13

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

Options:

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Question 14

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?

Options:

A.

Encrypt all network traffic

B.

Implement MFA on all the servers with encrypted data

C.

Block the servers from using an encrypted USB

D.

Implement port security on the switches

Question 15

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

Options:

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Question 16

An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?

Options:

A.

Replace one drive, wait for a rebuild, and replace the next drive.

B.

Shut down the server and replace the drives.

C.

Replace both failed drives at the same time.

D.

Replace all the drives in both degraded arrays.

Question 17

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Options:

A.

Encrypt the data that is leaving the SAN

B.

Encrypt the data at rest

C.

Encrypt the host servers

D.

Encrypt all the network traffic

Question 18

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Question 19

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Question 20

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Options:

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Question 21

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

Options:

A.

Connect the server to a KVM

B.

Use cable management

C.

Connect the server to a redundant network

D.

Connect the server to a UPS

Question 22

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

Options:

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Question 23

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 24

Which of the following licensing concepts is based on the number of logical processors a server has?

Options:

A.

Per core

B.

Per socket

C.

Per instance

D.

Per server

Question 25

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

Options:

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Question 26

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

Options:

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Question 27

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Question 28

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

Options:

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Question 29

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

Options:

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Question 30

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

Options:

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Question 31

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

Options:

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Question 32

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Question 33

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

Options:

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Question 34

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163 mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

Options:

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Question 35

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Question 36

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Question # 36

Which of the following caused the issue?

Options:

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Question 37

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Question 38

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

Options:

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Question 39

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Question 40

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

Options:

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Question 41

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

Options:

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning

Question 42

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Question 43

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Options:

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Question 44

An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes. Which of the following would BEST help answer the server performance question9

Options:

A.

Server performance thresholds

B.

A server baseline

C.

A hardware compatibility list

D.

An application service-level agreement

Question 45

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

Options:

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Question 46

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

Options:

A.

Network

B.

Embedded

C.

Optical

D.

USB

Question 47

A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps. Which of the following testing methods is the administrator MOST likely performing?

Options:

A.

Backup recovery

B.

Simulated

C.

Tabletop

D.

Live failover

Question 48

Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.

Which of the following types of authentications is described in this scenario?

Options:

A.

MFA

B.

NTLM

C.

Kerberos

D.

SSO

Question 49

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Options:

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Question 50

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

Options:

A.

Unplug the power cables from the redundant power supplies, leaving just the minimum required.

B.

Convert the physical servers to the hypervisors and retire the ten servers.

C.

Reimage the physical servers and retire all ten servers after the migration is complete.

D.

Convert the ten servers to power-efficient core editions.

Question 51

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?

Options:

A.

Management port

B.

Crash cart

C.

IP KVM

D.

KVM

Question 52

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Options:

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Question 53

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

Options:

A.

Direct access

B.

Overprovisioning

C.

Link aggregation

D.

Component redundancy

E.

Scalability

Question 54

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Question 55

Which of the following script types would MOST likely be used on a modern Windows server OS?

Options:

A.

Batch

B.

VBS

C.

Bash

D.

PowerShell

Question 56

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

Options:

A.

set-service

B.

net

C.

sc

D.

services.msc

Question 57

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Question 58

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

Options:

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Question 59

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

Options:

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Question 60

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

Options:

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Question 61

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

  • HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Question 62

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

Options:

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Question 63

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

Options:

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Question 64

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

Options:

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Question 65

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

Options:

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Question 66

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

Options:

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Question 67

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

Options:

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Question 68

Which of the following backup types should be chosen for database servers?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Question 69

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Question 70

A technician has received tickets responding a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?

Options:

A.

Log rotation

B.

Alerts

C.

Reports

D.

Log stopping

Question 71

An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

Options:

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Question 72

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

Question # 72

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Question 73

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

Options:

A.

Rack

B.

Virtual

C.

Tower

D.

Blade

Question 74

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

Options:

A.

PKI

B.

SSL

C.

LDAP

D.

DNS

Question 75

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 76

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 77

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

Options:

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Question 78

A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)

Options:

A.

Remote desktop

B.

IP KVM

C.

A console connection

D.

A virtual administration console

E.

Remote drive access

F.

A crash cart

Question 79

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Question 80

A site is considered a warm site when it:

  • has basic technical facilities connected to it.

  • has faulty air conditioning that is awaiting service.

  • is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Question 81

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Question 82

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

Options:

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Question 83

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

Options:

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Question 84

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

Options:

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Question 85

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Question 86

An administrator is working locally in a data center with multiple server racks. Which of the following is the best low-cost option to connect to any server while on site?

Options:

A.

Crash cart

B.

IPKVM

C.

Remote console access

D.

IPMI

Question 87

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

Options:

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Question 88

A staff member who a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?

Options:

A.

Installing blanking panels in all the empty rack spaces

B.

installing an additional POU and spreading out the power cables

C.

Installing servers on the shelves instead of sliding rails

D.

installing front bezels on all the server’s m the rack

Question 89

Which of the following refers to the requirements that dictate when to delete data backups?

Options:

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Question 90

Which of the following licenses would MOST likely include vendor assistance?

Options:

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Question 91

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

Options:

A.

Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.

B.

Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.

C.

Use the longest cables possible to allow for adjustment of the server rail within the rack.

D.

Install an Ethernet patch panel and a PDU to accommodate the network and power cables.

Question 92

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Question 93

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Question 94

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Question 95

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Question 96

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

Options:

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Question 97

A technician needs maximum power redundancy while configuring a new server rack. Which of the following should be specified? (Select two).

Options:

A.

Separate circuits

B.

Rack balancing

C.

Blanking panels

D.

High-voltage PDUs

E.

KVM placement

F.

Multiple UPSs

Question 98

Which of the following open ports should be closed to secure the server properly? (Choose two.)

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 99

A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?

Options:

A.

An ACL

B.

Antivirus

C.

DLP

D.

A firewall

Question 100

A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen.

Which of the following is the next step the administrator should take to diagnose the error without opening the machine?

Options:

A.

Perform a cold reboot.

B.

Listen for POST code beeps.

C.

Call technical support.

D.

Check the monitor connection.

Question 101

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

Options:

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Question 102

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

Options:

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Question 103

A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?

(Choose two.)

Options:

A.

Adware is installed on the users’ devices

B.

The firewall rule for the server is misconfigured

C.

The server is infected with a virus

D.

Intrusion detection is enabled on the network

E.

Unnecessary services are disabled on the server

F.

SELinux is enabled on the server

Question 104

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

Options:

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Question 105

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Question 106

A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?

Options:

A.

nslookup

B.

nbtstat

C.

telnet

D.

netstat -a

Question 107

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

Options:

A.

Document the findings and actions.

B.

Escalate the issue to the management team.

C.

Implement the solution.

D.

Establish an action plan.

Question 108

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

Options:

A.

21

B.

22

C.

23

D.

443

Question 109

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Question 110

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

Options:

A.

Chmod +w startup.sh

B.

Chmod 444 startup.sh

C.

Chmod+x startup.sh

D.

Chmod 466 startUp,sh

Question 111

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Question 112

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Question 113

An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?

Options:

A.

1000BASE-LX 1Gb single-mode plenum fiber connection

B.

10GBASE-T 10Gb copper plenum Ethernet connection

C.

1000BASE-T 1Gb copper non-plenum Ethernet connection

D.

10GBASE-SR 10Gb multimode plenum fiber connection

Question 114

Which of the following should be configured in pairs on a server to provide network redundancy?

Options:

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Question 115

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

Options:

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Question 116

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 117

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

Options:

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Question 118

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Question 119

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

Options:

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Question 120

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

Options:

A.

0

B.

1

C.

5

D.

6

E.

10

Question 121

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

Options:

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Question 122

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

Options:

A.

Replace all the array drives at once and then expand the array.

B.

Expand the array by changing the RAID level to 6.

C.

Expand the array by changing the RAID level to 10.

D.

Replace the array drives one at a time and then expand the array.

Question 123

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 124

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

Options:

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Page: 1 / 41
Total 414 questions