Advanced Network Administration Using Microsoft Windows Server: Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A server technician wants to list the cache of NetBIOS names and IP addresses. Which of the following utilities will he use?

nbtstat

A server technician is informed that all four hard disks in a server enclosure have failed. Which of the following is the most likely cause for this failure?

Backplane failure

Which of the following are the possible causes of Internet connectivity failure? Each correct answer represents a complete solution. Choose all that apply.

Bad cables Failure of ISP Improper IP Configuration

Which command-line utility enables a user to manage objects by using scripts or direct input at a command prompt?

diskpart

In Windows Server 2012 R2, which of the following MS-DOS-based utilities has been replaced by the diskpart command?

fdisk

Which of the following is the IPv6 prefix of a link local address?

fe80::/64

Which server could be the source of an inability to connect to a local host by name?

DNS server

What command is used to connect to shared drives?

net use

Which of the following commands is used to connect or disconnect from shared resources?

net use

Smith, a server technician, detects that destination host is unreachable. Which of the following are the causes of this issue?

Failure of the NIC card Incorrect destination IP address

Which of the following are switches used with the ipconfig command? Each correct answer represents a complete solution. Choose all that apply.

renew release flushdns

When the default gateway address is incorrect on the router, which connections will succeed?

From a local device to a local device

Which of the following is the most common cause of backup failures?

Human error

Which of the following combinations of factors indicates an I/O issue?

I/O is high, use of swap is low, and the use of memory is high

Angelina works as a technician for uCertify Inc. John, a user, complains that his CD drive is not working. Angelina needs to ensure that the power coming to the CD drive is correct, and therefore, she has to check its voltage. Which of the following tools will she use?

Multimeter

Which of the following is used for measuring voltage, current, and resistance of a device?

Multimeter

Which of the following is used to test a power supply?

Multimeter

Which of the following tools is used to measuring voltage, current, and resistance?

Multimeter

Which of the following do not need to be matched correctly?

Multiple network cards

Which of the following would not be a cause of an inability to connect to the Internet?

The MAC address of the computer

What is the code number of a destination unreachable message when it indicates the destination host is unreachable?

1

What command can be used in Linux to detect bad sectors?

badblocks

Which of the following addresses is used to test the functionality of the NIC?

127.0.0.1

Which of the following is an APIPA-generated IP address?

169.254.5.9

When using an air compressor to remove dust in a server, what is the maximum pounds per square inch (PSI) you should use?

40

What should the humidity be in the server room?

50 percent

What should the ambient temperature inside a server?

60-90 degrees

Which IPv6 loop back address is used to test the functionality of the NIC?

::1

You receive a destination unreachable message with a source IP address. Where is it coming from?

A remote router

Which of the following is a feature used to automatically configure IP-based hosts that are unable to reach a DHCP server?

APIPA

Which of the following terminators does the Low Voltage Differential (LVD) mode use?

Active

How should you use compressed air inside the case?

By short bursts

How are POST issues reported during startup when the display is not functional?

Beep code

Which of the following starts by using a preselected minimal set of drivers and startup programs?

Clean boot

Which security tool is used to view and alter the encryption of files on an NTFS partition?

Cipher

Max, a server administrator, found that an older server has performance issues on writing files to a RAID array. After checking for failed drives, no problems were found. Which of the following should he check next?

Cache battery

For security concern, a server administrator wants to verify integrity of data retrieved from servers. Which of the following security tools should the server administrator use?

Checksum

Which of the following events is caused by a cycle of overheating and cooling inside of a system?

Chip creep

Which of the following will result from an L2 cache failure?

Degraded performance

Rose is examine her organization's event logs and observes various instances of ex-employees accessing the company's assets and resources. As she continues to investigate, she notices that it happens at random intervals throughout the day. Which of the following will she do to mitigate this issue?

Disable unnecessary accounts

What is the last step in the CompTIA troubleshooting model?

Document findings, actions, and outcomes throughout the process

What can be the result of low humidity?

ESD

You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, what will be your next step?

Establish a plan of action to resolve the problem and notify impacted users

Which of the following is not a source of slow hard drive performance?

Excessive interrupts

Which of the following allows a server to communicate on internal or external networks using technologies such as SCSI, Fiber Channel, and SATA?

HBA

Which of the following provides input/output processing and physical connectivity between a server and a storage device?

Host bus adapter

What is the first step of the troubleshooting model?

Identify the problem and determine the scope

A server technician wants to troubleshoot problems affecting a server. What are steps in the troubleshooting process? Each correct answer represents a complete solution. Choose all that apply.

Identify the problem and determine the scope Establish a theory of probable cause Test the theory to determine the cause

Max, a server administrator, has informed about a database server that creases at random times. He identifies that no changes have been made either to the server's software or hardware. Which of the following is the first step he should take towards resolving this issue?

Identify the problem and scope

Rex works as a network administrator for uCertify Inc. The company has a Linux-based network. He configures a new Linux computer and installs it in the network. He wants to determine if the network interface is working properly. Which of the following commands will he use to accomplish the task?

Ifconfig

You work as a network administrator for a company. Due to specific security concerns of your company, you need to prevent sensitive data from being sent out of your network without authorization. You've blocked and monitored ports (as many as you can) on your firewall, and run an anti-spyware package. Which of the following is another step you should take?

Implement an IDS

Which of the following behaviors affects a WLAN but not a weird LAN?

Interference

At what layer of the OSI model are devices in different VLANs separated?

Layer 2

Which of the following occurs when an application is issued some memory to use and does not return the memory?

Memory leak

In Linux, which of the following can cause an inability to locate the operating system?

Missing GRUB

Mark, a network administrator, wants to use a TCP/IP utility that shows the status of each active network connection. Which of the following TCP/IP utilities will he use?

Netstat

Andrew, a network administrator, wants to display the IP address of a host name, or the host name of an IP address. Which of the following utilities will he use?

Nslookup

Mark works as a network administrator for a company, which has a Windows-based network. The network has a DNS server installed. Mark experiences host name resolution problems on the network. To rectify the situation, he wants to troubleshoot DNS resolution problems on the network. Which of the following utilities will he use to do this?

Nslookup

Which of the following is a built-in diagnostic program that runs every time a server starts up?

POST

Andrew, a technician, wants to use a tool that can integrate diagnostic and reporting capabilities to provide a comprehensive view of an organization's network. Which of the following tools will he use?

Packet sniffer

Which of the following actions should be taken before making changes during troubleshooting?

Perform a backup

Which of the following will allow a technician to examine activities on different counters?

Performance Monitor

Which of the following TCP/IP utilities transmits a datagram to another host?

Ping

Smith, a server technician, has been given a task to identify, locate, and resolve security issues of the server. Which of the following tools will he use? Each correct answer represents a complete solution. Choose two.

Port scanner Protocol analyzer

Which of the following statements are true of a server backplane? Each correct answer represents a complete solution. Choose three.

Provides a connection point for the blade servers Provides data and control signal connectors for the hard drives Provides the interconnection for the system/component status LEDs

Which of the following steps to eliminate a zero-day attack issue helps a user prevent malware from propagating?

Quarantine

Leena, a server administrator, wants to maximize data availability and protect data from many of the common errors that can cause data loss. For achieving this, which of the following filesystems will she use?

ReFS

Which of the following file systems maximizes data availability?

ReFS

Mark, a technician, diagnoses that the application settings stored in the registry are damaged during troubleshooting server hardware components. Which of the following solutions should he use to resolve this?

Reinstall the operation system

What is typically the solution if an integrated component does badly?

Replace the motherboard

Which of the following provides real-time graphs and detailed information about CPU, hard disks, network, and memory?

Resource Monitor

Which of the following tools can track the use of the CPU, memory, disk system, and network card in real time?

Resource Monitor

Which of the following is a short-term voltage drop?

Sag

Jason works as a security administrator for a company. He needs to find out which system a specific user is trying to login at multiple times of the day. Which of the following log types will he check?

Security

Which power-related threat is a short increase in voltage that can do irreplaceable damage to equipment?

Spike

Which represents a short increase in voltage that can do irreparable damage to equipment?

Spike

Which of the following could not be a reason why a user cannot logon?

Spyware

Which of the following is conceptually like a virtual disk?

Storage space

Which of the following should be the same on all devices in the same subnet?

Subnet mask

Which of the following commands provides a computer security feature that helps to control system access and system exploits?

Sudo

Which of the following devices uses the port security feature to prevent the attachment of unauthorized devices?

Switch

Which of the following records information, warning, or error messages generated by system components?

System logs tool

Which of the following is the third step of the troubleshooting mythology?

Test the theory to determine cause

Which of the following is not a best practice when manually rebuilding RAID arrays?

The drives should be placed back in the reversed order of removals

What are you hiding when you disable SSID broadcast?

The network name

Which of the following is true of server backplanes?

They can be a single point of failure

Which of the following is the recognition, diagnosis, and resolution of problems affecting a server to restore it to its normal operation?

Troubleshooting

Which of the following is a standard firmware interface for PCs designed to replace the BIOS?

UEFI

Which of the following is designed to replace the BIOS?

UEFI

In Linux, which of the following commands is used to attempt filesystem or drive repairs?

fsck

In Linux, which file is used to mount partitions on boot?

fstab

Which of the following is a file used in Linux to mount partitions on boot?

fstab

Which of the following is used to locate an operating system in Linux?

grub

Which tool can be used to restore the boot sector in Linux?

grub

Which command is used to clear incorrect IP address-to-hostname mappings that exist in the devices?

ipconfig/flushdns

Which command generates the following output? Default Server: nameserver1.domain.com Address: 10.0.0.1

nslookup

What command is used on a router to identify the routes of which the router is aware?

show ip route

Which command can be used in Linux to identify performance information with respect to memory, CPU, and storage?

top

Which of the following commands in Linux can be used to diagnose a memory issue?

top

Which commands are used on a router to identify the path taken to a destination network? (Choose two.)

tracert traceroute


संबंधित स्टडी सेट्स

Exception Handling, Java collection 1.

View Set

Chapter 1: Contract Law Overview

View Set

EAQ 4- Comfort, Pain & Nutrition

View Set

MGT 370 Midterm Chapter 1,2,3,4,5 and 6

View Set

Chapter 2 : Accounting For Business Transactions (Learn Smart)

View Set