Review for final (SERVER+)
This type of disaster recovery testing should produce reports from the alternate site that agree with the same reports at the existing processing site. a. Parallel b. Structured walk through c. Full interruption d. Checklist
a. Parallel
In this type of multitasking, the OS gives a slice of the operating time to the requesting program. a. Pre-emptive b. Cooperative c. Co-emptive Redundant
a. Pre-emptive
Memory leaks are commonly the result of: a. Programming errors b. Boot problems c. CMOS errors d. Network errors
a. Programming errors
A user reports that they cannot access certain websites during their lunch hour. You remind the user about the acceptable use policy that prohibits certain sites from being accessed due to their material. What type of network service is being used? a. Proxy b. Radius c. NAC d. NAP
a. Proxy
Which of the following is not true about a SAN: a. SAN is a specialized network b. SAN attached storage appears as a remote or networked drive to the server that is attached to it c. SANs are normally on a network that only the server can connect to d. SANs are shared among many network servers
b. SAN attached storage appears as a remote or networked drive to the server that is attached to it
__________ cameras can monitor continuously, or they can use motion detection. a. Cell phone b. Surveillance c. SLR d. Digital
b. Surveillance
Which of the following is not true about UPS systems? You Answered a. The batteries are replaceable b. UPS systems switch from battery to line power when the batteries are low on charge c. Parallel UPS systems for redundancy are a good idea d. Power line filters protect against power surges
b. UPS systems switch from battery to line power when the batteries are low on charge
What should you perform a baseline? a. After a system has been upgraded b. all of the above c. During normal usage d. None of the above
b. all of the above
Replication improves reliability, fault tolerance, and _________? a. Synchronicity b. Replicatibility c. Accessibility d. Assessibility
c. Accessibility
A server's CPU performance has dropped considerably and you are investigating the problem. You perform a current baseline and compare it to the baseline from when the server was running properly. You can see that the CPU is now running at around 25% of what it was before. What could be causing this problem? a. Network traffic caused by a worm b. Hard disk corruption c. CPU cache failure d. USB 2.0 device plugged into a USB 1.0 port
c. CPU cache failure
All of the following are true about Remote Desktop except: a. Very popular b. Uses TCP/IP networking to connect using NetBIOS or IP address c. Can only be used on a Windows operating system d. Uses TCP port 3389
c. Can only be used on a Windows operating system
What phase of the pre-install planning includes the financial, security and failure risk assessment documents? a. Building b. Stabilizing c. Envisioning d. Planning
c. Envisioning
Which of the following is not a step in the Scientific Method a. Gather information b. State the problem c. Formulate a random solution d. Repeat as necessary
c. Formulate a random solution
A typical SAS system has four basic components: a. Sender, Receiver, Delivery, and Message b. Requester, Responder, Delivery, and Communicators c. Initiator, Target, Service Delivery Subsystem, and Expanders d. Initiator, Receiver, LUNs, and Communicators
c. Initiator, Target, Service Delivery Subsystem, and Expanders
What classification of data is defined as when the location Is known but it is not loaded or readily accessible? a. Hybrid b. Offline c. Nearline d. Online
c. Nearline
What type of security is needed at the basic level? Without this your higher-level security such as firewalls are of little use. a. Mantrap b. Data c. Physical d. SSL / TLS Certificate
c. Physical
The troubleshooting equation is: a. Scientific Method + OSI Model = Troubleshooting b. Solution + Diagnosis = Problem c. Problem + Diagnosis = Solution d. Problem + Solution = Diagnosis
c. Problem + Diagnosis = Solution
This type of hang is caused by a software issue. The keyboard and mouse move, but only intermittently. a. Hard hang b. Malware c. Soft hang d. BSOD
c. Soft hang
Which of the following is not true about what is included in a backup plan? a. Includes what to backup and what type of backup b. How long it takes to perform a backup and restore c. The type of backup tools needed is not important because the OS includes these d. The amount of data and its degree of critical-ness
c. They type of backup tools needed is not important because the OS includes these
When implementing a solution, if you start at the Application layer of the OSI model first you are using the: a. Divide and conquer approach b. Spot the difference approach c. Top down approach d. Bottom up approach
c. Top down approach
A proper planning exercise in developing a data center _________________________________? a. Should be done in the deployment phase of the MSF b. Only includes servers c. Is not necessary d. Begins with determining the size of the critical load that must be served and protected
d. Begins with determining the size of the critical load that must be served and protected
What component is still functioning if you can hear beep codes but your server will not power on? a. Hard disk b. Memory c. Floppy disk d. CPU
d. CPU
This type of disaster recovery testing ensures that the organization complies with the requirements of the disaster recovery plan. a. Simulation b. Parallel c. Structured walk through d. Checklist
d. Checklist
This type of replication provides a continuous backup and occurs in real time. a. Clustering b. Active-Active c. Active-Passive d. Disk to Disk
d. Disk to Disk
_____________ can slow down the read/write process if the disk head has to move all over the hard disk platter. a. RAID b. Memory dump c. Baselining d. Fragmentation
d. Fragmentation
_________ provides the ability to remove the drive and replace it without significant interruption to the server. a. Cold swappable b. Non-hot swappable c. Warm swappable d. Hot swappable
d. Hot swappable
Which statement is true about the power circuit for your servers? a. The size of the power supplies in your servers is not important b. It is not necessary to have a dedicated circuit c. It can be shared with other functions to keep costs down d. It is an industry standard to have a dedicated power circuit
d. It is an industry standard to have a dedicated power circuit
What is the most common cause of extended problems and outages? a. Poor documentation b. Hard drive failure c. Power supply failure d. Lack of information
d. Lack of information
_________can be defined as the rate at which work is done. a. Resistance b. Voltage c. Current d. Power
d. Power
Why is hot swappable technology important for servers? a. Requires the server to be powered down to replace a drive thereby saving energy b. Will increase the downtime c. Makes the server unavailable to the users d.Provides redundancy
d. Provide redundancy
All of the following are true about backups except: a. Log files from backup operations should be inspected b. A full backup is the same as a normal backup c. An incremental backup changes the archive bit from 1 to 0 d. RAID and backup are synonymous
d. RAID and backup are synonymous
You are working on Server1. Server1 can ping Server2 by IP address but not by its Netbios name. You can ping Server3 by both the IP address and Netbios name from Server1. Server3 can ping Server2 by both its IP address and Netbios name. What do you think is the problem? a. Server2 has an APIPA address and should be statically assigned a new IP address b. Server1 has a problem with DNS - run Ipconfig /flushdns c. Server2 has a problem with its Netbios name d. Server1 has a hosts file entry for Server2 with an erroneous Netbios name.
d. Server1 has a hosts file entry for Server2 with an erroneous Netbios name.
SAS drives can be connected to a SATA controller, and SATA drives can be connected to a SAS controller. a. True b. False
b. False
System performance should remain the same over time. a. True b. False
b. False
There has not been any new SCSI technology development due to the advent of IDE technology. a. True b. False
b. False
Troubleshooting is an innate skill that you are born with or without. a. True b. False
b. False
When naming servers, clever, current and comical names are always preferred. a. True b. False
b. False
You do not need to worry about disk failures if you deploy a RAID solution. a. True b. False
b. False
Slow file access can be caused by all of the following except. a. Fragmentation b. File system mismatch c. Malware d. Hard drive failure
b. File system mismatch
This sometimes overlooked network service uses UDP port 123. a. TFTP b. NTP c. FTP d. NAP
b. NTP
What component is the most common part to fail? a. Hard drive b. Power Supply c. CPU d. Memory
b. Power Supply
One of the issues that a server administrator must be aware of when defining the project scope is _____________. a. All of the answers are correct b. Scope creep c. Schedule d. Have the early versions been changed or modified e. Who is affected
a. All of the answers are correct
You have just installed a security update to your server and when it restarts you see a message that says that the Operating System cannot be found. Which of the following could be the cause? a. All of these could be causes b. Damaged boot sector c. USB device is hanging the boot process d. Mechanical failure of the hard drives
a. All of these could be causes
KVMs are: a. All the answers are correct b. Can support both USB and PS/2 devices c. Commonly rack mounted d. Allow multiple servers to be controlled by a single keyboard, monitor and mouse
a. All the answers are correct
Which statement is not one of the 10 physical security measures every organization should take? a. Avoid using rack mount servers b. Protect the portables c. Setup surveillance d. Lock up the server room
a. Avoid using rack mount servers
Server application software can also grow over time with each new version requiring more hard disk space. This is known as ____________. a. Code bloat b. Server bloat c. Bloat ware d. Server sprawl
a. Code bloat
All of the following backup methodologies change the archive bit except? a. Copying files from one location to another b. Incremental c. Normal d. Full
a. Copying files from one location to another
_________________ refers to the process of recovering data in the event of a disaster. a. Disaster recovery b. Backups c. Replication d. Business continuity
a. Disaster recovery
A typical corporate policy regarding data retention and handling will include stringent instructions for _________. a. Hard drive data removal (disk scrubbing) b. Quantitative value assessment (how much does it cost) c. Asset identification database instructions d. Service level agreements (SLA)
a. Hard drive data removal (disk scrubbing)
It is not considered an important function of the IT department to keep quality documentation, as there are much more important things to do. a. True b. False
b. False
Laptops and handheld computers pose little physical security risks. a. True b. False
b. False
Nameplate power ratings are typically the best case power consumption numbers and are well below the expected operating levels a. True b. False
b. False
This federal law sets a new standard for all U.S. publicly traded companies regarding their board reporting, management and public accounting. a. Sarbanes-Oxley Act b. ISO 27001 c. Glass-Steagall Act d. HIPAA
a. Sarbanes-Oxley Act
As servers take on more and more services, their overall performance will slow down. This is known as ____________. a. Server bloat b. Bloat ware c. Server sprawl d. Code bloat
a. Server bloat
Blue screens of Death can be cause by malicious software on your computer. a. True b. False
a. True
Dusty server rooms can lead to heating problems. a. True b. False
a. True
Fragmented drives can cause slow file access. a. True b. False
a. True
Server room keys are a controlled item and should be issued to only IT personnel that need access. a. True b. False
a. True
There are currently no federal laws regarding electronic waste. a. True b. False
a. True
There are many legal requirements regarding data retention. a. True b. False
a. True
Virtualization is an excellent way to test the design of your server project. a. True b. False
a. True
A server cluster is a group of ____________ servers, working together closely and deployed to improve performance and/or availability over that provided by a single server. a. two or more linked b. One high powered c. Linux only d. Passively active
a. two or more linked
You want to VNC into a server with 5 sessions running. What port should you setup your client to use to connect to the 3rd session? a. 5902 b. 5903 c. 5901 d. 5900
b. 5903
It is important to schedule your backups in the middle of the night because: a. You must ensure that there are as many users as possible in your system b. Backups should be scheduled when the systems have the least amount of usage, as system performance will be degraded during a backup c. Server administrators like to be left alone, so working at night helps them avoid other people. d. Backup software only runs based on the darkness of the night sky
b. Backups should be scheduled when the systems have the least amount of usage, as system performance will be degraded during a backup
This backup site is the most inexpensive to operate. a. Hot b. Cold c. Warm d. Mobile
b. Cold
Which phase of troubleshooting takes the most time? a. Documentation b. Establishing a probable cause c. Identifying the problem d. Testing the theory
b. Establishing a probable cause
A user just called the Help Desk because they forgot their password. The help desk reset their password and set it so they have to change their password the next time they logon. The user tries to access the company mail server using their smartphone. They should not have any problems. a. True b. False
b. False
Copiers and laser printers should be plugged into a UPS, as these devices use very little power. a. True b. False
b. False
Current is the potential difference or electromotive force. a. True b. False
b. False
Data that changes less frequently should be backed up the most frequently. a. True b. False
b. False
Experienced troubleshooters sometimes make multiple changes to a server in order to speed up the troubleshooting process. a. True b. False
b. False
Hot swappable always refers to a RAID solution. a. True b. False
b. False
If you are using replication you really do not need to use backup technologies. a. True b. False
b. False
In a network environment where the clients are rapidly changing, a longer DHCP lease time is recommended. a. True b. False
b. False
It is considered a best practice to only assign share permissions to user accounts. a. True b. False
b. False
A user cannot logon to their workstation. Which of the following is not a possible reason? a. Bad password b. Caps lock is on c. Bad username d. Using a USB keyboard instead of a PS/2 keyboard
d. Using a USB keyboard instead of a PS/2 keyboard
SAN can use all of the following transports except: a. FCIP b. iSCSI c. Fibre Channel d. VoIP
d. VoIP
How should dust be removed from a server? a. With compressed air blowing the dust into the server b. With a vacuum cleaner c. Dust provides a nice insulator from heat, and should not be worried about d. With compressed air blowing the dust out of the server
d. With compressed air blowing the dust out of the server
The highest priority asset of any enterprise is: a. Based on the insurance company's classification b. Backup systems c. The most mission critical server d. People
d. people
When identifying the team for a server deployment, which group is the most important? a. Pilot testers b. Users c. Programmers d. Stakehoders
d. stakehoders