CompTIA Server+ Practice Test CertMaster

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A user in a small IT-based startup noted some latency issues with their older cables. The user knows the network speed will increase workflow and profitability, and wants to suggest the best option for the company. A multimode fiber optic cable network with all LC connectors would be a good option, but the user cannot remember how fast the network can be on those cables with the Small Form Factor Plus (SFP+) used within the company. What is the fastest option that will work on this network that the user can suggest? GbE 40GbE 4GbE 10GbE

10GbE Multimode fiber optic cable with LC and SFP+ can only support up to a 10GbE network.

An administrator is configuring an internal lab to test software in. Which of the following addresses could the administrator use (assuming they are available)? (Select all that apply.) 2607:f0d0:1002:51::4 169.254.0.0 127.0.0.1 172.16.12.12

2607:f0d0:1002:51::4 172.16.12.12 172.16.12.12 would qualify as a Private Class B IP address and would be suitable for an internal testing lab. IPv6 addresses are 128 bits in length and address many shortcomings of IPv4 addressing.

A server maintaining 30 simultaneous station connections operates with 3 dual-core CPUs. How many per-server licenses would this system require? 3 30 1 6

30 A per-server license provides client access licenses (CALs) installed on the server the corresponding number of simultaneous connections. In this case, 30 connections would mandate 30 licenses.

A system administrator is setting up a new Redundant Array of Independent Disks (RAID) storage solution for a server and wants the maximum fault tolerance available for a set of four Hard Disk Drives (HDDs). Which RAID level would be sufficient for this storage solution? 5 10 1 6

6 The RAID 6 design distributes data across a minimum of four Hard Disk Drives (HDDs) to parity information across two disks. The result is that a RAID 6 array can recover data even with the failure of two HDDs.

An administrator has difficulty flashing a system BIOS and receives an error. The administrator did not read the error message before powering off the server. Upon rebooting the server after the failed attempt, everything functions properly. What did the administrator likely experience during the attempt to flash the BIOS? A firmware upgrade A firmware downgrade A firmware incompatibility A firmware factory reset

A firmware incompatibility Firmware incompatibility occurs when you flash a component, such as a system BIOS, and the correct firmware file is not being used.

An administrator is tasked with configuring a server cluster for their company. Performance is not a concern; however, in addition to availability, backup servers must be able to seamlessly handle the workload of the active server and, if desired, subsequently return to a passive state after an afflicted server returns to service. Additionally, the administrator should give preference to the least expensive option possible. Which configuration would make the most sense in this situation? Active-passive failover Active-active failover Active-passive failback Active-active failback

Active-passive failover Active-passive does not provide a performance boost, but it does maintain high availability. With a failover setup, the server could return to its previous role once the active server returned to operation.

A systems administrator attempts to restore a differential backup of a shared folder to a server. A backup of the data for the requested date is not present in the backup catalog. What does the administrator conclude to be the cause of the issue? A restore failure An unsuccessful backup An unavailable server drive Data corruption on the drive

An unsuccessful backup As there is no backup present in the backup catalog for the specified time, an unsuccessful backup for the specific backup job has likely occurred.

A recent group policy update failed to go out. After briefly troubleshooting, the administrator finds an issue with the Active Directory functionality. Which server type controls this functionality? Application Print File Web

Application Microsoft Active Directory (AD) is often co-located with DNS functionality on the AD Domain controllers.

A server technician has been given a diagram that shows switch interfaces grouped by individual storage area networks. Which of the following would most accurately describe this documentation? Inventory management Architectural diagram Logical diagram BIA

Architectural diagram Architectural diagrams are design documents that are used to describe hardware and software specifications, often found within storage area networks.

A lawyer contacts a system administrator to implement a solution that will assist with file retention timeframes. The lawyer states that files need to be available for seven years before removal. Which of the following is the specialist likely to recommend? Snapshot Open file Archive Full backups

Archive The administrator is likely to recommend an archive option as it's specifically designed to retain data for long periods of time and is optimized to store these files efficiently.

A company is updating the number of hot sites to include a secondary failover site to go with the first site. The first site will be utilized as a regular work environment at this point with the database actively engaged but will not have a standard direct tunnel to the existing site, so the databases will update separately and will need to be combined. What type of replication would be best to implement here? File locking replication Application consistent replication Bi-directional replication Mirroring

Bi-directional replication Bi-directional replication would be a great fit for the database being accessed in two locations and updated regularly. It allows data to sync both ways and copy all changes between them.

A server at a manufacturing firm crashes every few days. Review the symptoms and determine which would be specific to a Windows server. Blue screen Kernel panic Power-on self-test (POST) errors Predictive failures

Blue screen A blue screen is a Windows crash screen that provides some clues as to the problem on screen or via a memory dump file that can help identify problems leading up to the crash.

A server crash results in the need for an engineer's review of a memory dump file. Which problem produces such a file? System lockups Backplane failure Cooling failures Blue screen

Blue screen A blue screen is a Windows crash screen that provides some clues as to the problem on screen or via a memory dump file that can help identify problems leading up to the crash.

A network administrator is designating a location for a server room within a new building purchased by the company. What are two items that would assist in stopping signal interference and physical risks? (Select all that apply.) Bollards around the exterior Reflective glass Trees surrounding the exterior Deceptive signage

Bollards around the exterior Reflective glass Bollards are columns that would help prevent the risk of physical damage through vehicle crashes or other motion-based exterior issues. They are small and sturdy. Reflective glass has signal reflecting properties, aside from being a more private option as compared to traditional windows.

A systems administrator is configuring a DNS server but must do so using a virtual machine to function as the server. Which of the following would be the best configuration choice? Host-Only NAT Local Bridged

Bridged Bridged access (or direct access) is best when using virtual machines as main production servers, such as a Domain Name System (DNS) server or a webserver.

A server has built-in redundancy for every major component. As a best practice, dual power supplies are split between two power sources. One power supply tests as healthy but always loses power. What troubleshooting steps should be taken to remedy the problem? (Select all that apply.) Check the BIOS. Check the power cable. Check the power supply. Check the power source.

Check the power cable. Check the power source. Checking the power source would be a good first troubleshooting step. The power supply may be connected to an unreliable source or a source that can be accidentally switched off with a wall switch. Checking the power cable is a good troubleshooting step. It is possible the cable is faulty or is not rated for the power throughput.

When considering direct-attached storage (DAS), which of the following is true? Consider SATA for cost, NVMe for a balance of cost and performance, and SAS for performance when cost is no issue. Consider SAS for cost, NVMe for a balance of cost and performance, and SATA for performance when cost is no issue. Consider SATA for cost, SAS for a balance of cost and performance, and NVMe for performance when cost is no issue. Consider NVMe for cost, SATA for a balance of cost and performance, and SAS for performance when cost is no issue.

Consider SATA for cost, SAS for a balance of cost and performance, and NVMe for performance when cost is no issue. An administrator should always consider Serial ATA (SATA) disks when on a budget. However, these disks are of low performance and are not sufficient for rack servers. SATA disks are common for desktop computers.

Upon trying to boot an aging server, IT staff recognize the server is at the end of life when the operating system will not load. The system BIOS displays the drive as present in the system. What does IT determine the issue to be? Device mounting problems An unavailable drive Bad sectors Corrupt boot sector

Corrupt boot sector A corrupt boot sector would prevent the system from booting into an OS. The boot sector would contain the master boot record, which points to boot loader files for the OS.

A line of business applications no longer functions properly on a server. The systems administrator mentions that a rollup was applied without a problem to the OS overnight. What does the administrator determine the issue to be? Incompatible driver in the OS Insecure dependency in services Incorrect architecture Downstream failures due to updates

Downstream failures due to updates A downstream failure due to updates can negatively impact software that an upstream failure may impact. This includes applications that rely on a platform that receives updates or an update server that receives updates from an upstream server.

Servers with a previous version of an operating system are replaced with servers with a current operating system. The old operating system worked fine and did not cause any problems. Why did engineers decide to replace the servers? End of life Slow performance System lockup System file corruption

End of life As the old operating system was replaced with a new version by the developer, it would likely be entering an end of life and end of support period.

A network administrator is implementing a web page that has the ability to handle customer orders. In order to maintain necessary Security Standards, the web page must implement some form of Split Encryption. What is a common method used in today's technology when dealing with customer credit cards in an attempt to keep customer data safe and customers satisfied? Credit card numbers are stored and encrypted via a hash string. Credit cards are not accepted. Credit card numbers are not stored and encrypted during transactions. Credit card numbers are not stored and are not encrypted.

Credit card numbers are stored and encrypted via a hash string. Credit card numbers are typically offered to be stored for customer convenience. Card information is required to be encrypted to stay security compliant. Most companies accomplish this by hashing the information where only the server can decrypt this information.

A file database is running out of storage quickly, inhibiting workflows and adversely impacting performance. Which of the following might alleviate this issue? (Select all that apply.) Create a new logical partition inside the server Data compression Reset the network Enable data deduplication

Data compression Enable data deduplication When enabled, data deduplication can help reduce the amount of storage consumed by eliminating redundant data across storage blocks. Data compression re-encodes the data to use less total space than the original file. Programs accomplish this using a specialized algorithm.

A network administrator sends out an email warning of a possible phishing attack to the company's email addresses, explicitly targeting the sales department. What two mitigation techniques did the administrator most likely use to identify the problem? (Select all that apply.) Data retention Redundancy Data monitoring Log analysis techniques

Data monitoring Log analysis techniques Data monitoring would have alerted the administrator of new data coming in, and it's a potential threat. Log analysis would have alerted the administrator of an influx of emails containing similar subjects and contents, as well as which email addresses the emails are being sent to.

An administrator is implementing a file-level backup solution on a local application server. The backup solution is unable to overwrite "Open Files." Which of the following two application types are likely to have problems backing up due to this? (Select all that apply.) Database applications Word document applications Email applications File based applications

Database applications Email applications Database applications will have issues backing up with the proposed solution, as these servers consistently have a database file that is regularly in use. Email applications will have issues backing up with the solution, as the mailbox file is consistently receiving data and updating.

A technician views reports that a server is able to ping devices inside the local intranet, but is not receiving a reply when pinging external devices. Which of the following is most likely the cause? DNS Server Default Gateway NIC MAC Address

Default Gateway The default gateway is an IP configuration that locates the router and acts as the connection between the local subnet and the wider internet. A fault here will preclude any connections outside the intranet.

A technician views reports that a server is able to ping devices inside the local intranet, but is not receiving a reply when pinging external devices. Which of the following is most likely the cause? NIC DNS Server Default Gateway MAC Address

Default Gateway The default gateway is an IP configuration that locates the router and acts as the connection between the local subnet and the wider internet. A fault here will preclude any connections outside the intranet.

A systems administrator is configuring a new server for virtualization, but the virtual machine fails to load. Which of the following is the most likely cause of the problem? Disabled hypervisor No 64 bit OS installed Faulty virtual switch Insufficient VM partition size

Disabled hypervisor Hypervisors serve as the manager when it comes to virtual machines. A hypervisor will allocate resources, so are thus required to start a VM.

A system administrator is configuring a server for data security purposes. The administrator has already disabled services that are not utilized and closed the related ports. What other two actions would assist in this goal? (Select all that apply.) Disabling USB ports Disabling remote access rules Disabling roles which are no longer used Disabling the network interface card (NIC)

Disabling USB ports Disabling roles which are no longer used Disabling roles no longer used would assist in data security by securing unwarranted access to the server directly from old and new employees. In this case, disabling the USB ports would assist in securing the server by protecting the hardware from loading attached USB flash drives and other harmful plug and play components.

A sysadmin would like to partition a newly installed SSD in a Windows server. Which tools are available to the administrator? (Select all that apply.) cat /var/partitions diskpart Disk management df -h

Disk management Disk management is a graphical user interface tool found on Windows systems. This tool allows for numerous disk-based options, including the ability to partition a drive.

A systems technician is building a test system for a company tech refresh. They have selected many components to ensure the systems will maintain operations and accommodate a significant number of man-hours of work. What should the technician ensure there is enough of should the systems need extra components to add to the hardware baseline? Memory Expansion Slots Central Processing Units (CPU) Graphics Processing Units (GPU)

Expansion Slots Expansion slots will allow a system admin to add increased capabilities to any individual computers above and beyond the company-wide baseline associated with this tech refresh.

What components of a server cannot be repaired via the virtual administration console? (Select all that apply.) Fans Internet Protocol (IP) configuration Drives Power Supply

Fans Power Supply It is possible to troubleshoot a power supply issue over remote access, but any repairs of the device have to be completed physically due to the nature of the device. It is possible to troubleshoot a fan issue over remote access, but any repairs of the device have to be completed physically due to the nature of the device.

An engineer employs monitoring, checksums, detection, and enforcement strategies. What management and troubleshooting area is the engineer focusing on? Service management Group policies User access control File integrity

File integrity File integrity can be managed by using monitoring, checksums, detection, and enforcement strategies. This approach is used to ensure that files have not changed unexpectedly.

A system administrator is looking into a new replication method for a lawyer's office. The employees often work with documents and leave the document open when stepping away. Which type of replication would be best to ensure files are backed up without missing data? Application consistent replication File locking replication Bi-directional replication Mirroring

File locking replication File locking replication would adjust the ability to edit so only one employee has access to edit a document at a time, meaning the file always backed up is up to date with changes.

An administrator is weighing the pros and cons of various backup solutions. Which two of the four methods would be the fastest to restore data from in the event of an issue? (Select all that apply.) Full backup Synthetic full backup Incremental backup Differential backup

Full backup Synthetic full backup A full backup would be one of the fastest methods to restore data from in the case of an issue. Full backups take a long time to create, but its restoration requires only one backup job. A synthetic full backup would be one of the fastest restoration methods. It combines the initial backup with snapshots of new changes, resulting in the need for only one backup job.

A server administrator is configuring a web server file system and needs to ensure that the data being sent to the client and received from the client is secure. What encryption protocol is used for securing web traffic? Packet analyzing SSH (Secure Shell) RDP (Remote Desktop Protocol) HTTPS (Hypertext Transfer Protocol Secure)

HTTPS (Hypertext Transfer Protocol Secure) Hypertext Transfer Protocol Secure (HTTPS) is used when dealing with web traffic and encrypts the data from point A to point B. It is the standard solution in this particular case.

How can a support technician best troubleshoot an issue that a user can not clearly describe? Have the user try to replicate the problem. Try changing the user's system settings. Create a backup of the system to capture the issue. Reboot the system.

Have the user try to replicate the problem. Attempting to replicate the problem by asking a user to show you what they were doing when the problem was encountered is a useful troubleshooting approach. Changing the system settings is not necessary.

A server has difficulty booting. An administrator discovers that an error message appears stating that the operating system is not found. A check of the disk finds no bad sectors. Which cause does the administrator suspect is the problem? Host bus adapter failure Optical media failure Disk cache failure Disk drive failure

Host bus adapter failure There are many reasons as to why an operating system may not boot. Of the options given, a host bus adapter (HBA) can cause a system to not find a valid disk drive to boot from.

A systems administrator cannot ping one Windows server from another by hostname. All servers use static IP addresses. What does the administrator need to troubleshoot? DHCP failure Host file failure DNS failure Link light failure

Host file failure The host file on a system is an optional file that can contain IP address to hostname mappings. An error or typo in the file would interfere with proper name resolution.

A system administrator has proposed to a company a separate location to set up the company's assets which will mirror the current on-site configuration. This location will be used as an immediate failover in the event of a problem. What type of site would this be? Hot site Cloud site Cold site Warm site

Hot site A hot site is a location that has the necessary equipment and data in place to be an immediate failover in the event of a mass failure at the primary location. This proposal would meet that requirement.

A startup company must implement a cloud solution that utilizes a third-party data center. Cost savings are the highest concern, but the company would like to maintain at least some level of data security for internal practices. Which solution would best serve this company? Community cloud Private cloud Hybrid cloud Public cloud

Hybrid cloud Hybrid clouds combine elements of the other cloud models. Organizations may store private or internal data in a private cloud but deploy a public cloud for customer services.

A server administrator needs a protocol to connect the users with network storage that is both cost-effective and easy for training the IT staff. Which is the best solution for these requirements? Fibre Channel NAS ISCSI SAN

ISCSI The administrator should choose Internet Small Computers Systems Interface (iSCSI) because it is cheaper and less complex than a Fibre Channel solution. Training IT staff about Fibre Channel will be more challenging.

An organization recently purchased time on a cloud-based service that provides a hardware platform to bolster its operation. The provider supplies no additional software, however. Which of the following best describes this solution? SaaS PaaS STaaS IaaS

IaaS Infrastructure as a Service (IaaS) solutions provides hardware that is made available and maintained by the service provider. Consumers manage the software and applications run on the hardware.

An engineer troubleshoots a known issue on a server cluster implementation. The engineer has found a fix by reading a technical document in an online forum. Which approaches can the engineer take to remedy the problem? (Select all that apply.) Replicate the problem. Implement a solution. Escalate the issue. Perform a root cause analysis.

Implement a solution. Escalate the issue. When implementing a solution, it is important to follow a plan of action established earlier in the troubleshooting process. It is also important not to deviate from the plan. When implementing a solution, the knowledge required by a technician might be lacking. In this case, escalate the problem to the vendor's support team or other members of the internal team.

A server administrator must configure an in-office server for special purpose use. The server should be configured for maximum performance and will only be used by the administrator. Which of the following would be the best way to do this? Utilize an unattended installation to automate the task. Install the VM directly onto a hard disk. Update to the latest operating system and then install the VM to the OS. Use remote administration.

Install the VM directly onto a hard disk. As the virtual machine (VM) will only be used by a single tenant and is primarily concerned with performance, a bare-metal installation directly onto a hard disk would be the best choice.

A special server is installed in an organization to hold archived files for quick access. Of great importance is that files are not altered in any way. What concerns administrators of the server as it relates to the availability of reliable data? Infections Malware Integrity Access

Integrity Integrity pertains to the reliability of a file and that it has not been altered in any way. Integrity is a concern for data both at rest and in transit.

Which of the following does a server admin use while remoting into a device? Keyboard-Video-Mouse (KVM) Crash Cart Cages Internet Protocol Keyboard-Video-Mouse (IP KVM)

Internet Protocol Keyboard-Video-Mouse (IP KVM) An Internet Protocol Keyboard-Video-Mouse (IP KVM) allows a server administrator to interact with connected devices remotely.

Shortly after installing new servers, the system administrator noted that storage was almost full, and they needed to expand quickly to keep up with demand. Which of the following is the best solution to add to the existing servers to increase storage capacity? High capacity servers Hybrid drives USB drives JBOD

JBOD Just a Bunch of Disks (JBOD) is a term for a collection of hard drive disks (HDDs), often of different sizes and specifications that can be added to existing servers to increase overall storage capacity.

A network admin walks into the server room to access one of the devices. Which devices is the admin about to interact with? (Select all that apply.) Keyboard-Video-Mouse (KVM) Virtual Administration Console Remote Console Access Internet Protocol Keyboard-Video-Mouse (IP KVM)

Keyboard-Video-Mouse (KVM) Internet Protocol Keyboard-Video-Mouse (IP KVM) A Keyboard-Video-Mouse (KVM) is a group of devices or an all-in-one device that is physically connected to servers in a rack and other devices via a USB or serial connection. An Internet Protocol Keyboard-Video-Mouse (IP KVM) is a device that allows for physical access to a server just like a traditional KVM but with a network connection for remote access capabilities.

A company is examining decommissioning policies related to company equipment. Which items are considered to be a possible external risk as opposed to internal equipment? (Select all that apply.) Desktop workstations Laptops Cell phones Monitors

Laptops Cell phones Laptops are primarily used for mobile performance of work duties. Most individuals who are given laptops would be taking them outside the company, making them a possible external risk. Cell phones are provided by the company for use outside of the office in most cases. This could contain sensitive company information and would be considered an external risk.

A user is writing a script that contains #!/bin/bash as the first line in the file. Based on this, which OS is being used? Chrome OS Linux Windows VBScript

Linux As its command-line environment, Bash is the shell for Linux and Unix operating systems. A standard bash script will contain commands, variables, constructs, and other components.

Every time a user logs into their desktop, their email application runs automatically. Identify which function enables this process. Startup script Login script Shutdown script Service script

Login script Login scripts execute when a user logs in. This function can apply to the desktop environment, hard disk mapping, or applications.

A network administrator is performing a security audit and notices that many users are writing down their passwords after changing them. What commonly used policies could be causing this? (Select all that apply.) Minimum password length Password complexity Password history Password age

Minimum password length Password complexity Password complexity plays a role in this assumption, as many users will be tempted to write down more complicated passwords. Password length has been shown to correlate to this behavior directly: the longer the password, the more likely a user will be unable to remember it.

Users at a finance company have difficulty trying to upload data to a server in the company's DMZ. The connection uses an IP address with the FTP protocol. IT verifies that the correct ports are available and that the user's PC is configured properly. What does IT discover the problem to be? Misconfigured edge router Misconfigured DNS Misconfigured software firewall Misconfigured DHCP

Misconfigured edge router An edge router would sit at the perimeter of the network. Of the list of items, IT did not check that the route to the server was correct.

A systems administrator troubleshoots a server that experiences random lockups. The administrator devises a plan to discover the issue in real-time as part of a troubleshooting approach. What action does the administrator take? Review Event logs. Be aware of auditory cues. Monitor utilization. Be aware of olfactory cues.

Monitor utilization. System utilization can often contribute to poor server performance and potential crashes. High utilization could be caused by factors including malicious activity or a lack of resources. Monitoring utilization can give a clue as to what may be happening at any given time.

A Sr. Engineer assigns a daily server health check schedule to a new technician. The new technician is to quickly observe a server's current status without any system interaction to obtain multiple data values for metrics recording. Determine which solution the technician uses. Auditory techniques Monitoring tools Physical inspections System logs

Monitoring tools The use of monitoring tools would allow the technician to quickly view a server's health without any interaction. Data for CPU, memory, network, and disk usage, for example, could be easily left on the screen.

A network administrator is setting up a router to connect two networks via virtualization software. To ensure efficient IP management between the networks, what should the administrator configure? MAC filtering QoS NAT Direct access bridging

NAT Network address translation (NAT) substitutes public and private IP addresses in IPv4 packet headers. The network address translation runs on routers or within virtualization hypervisors to provide valid addressing between networks.

A server admin needs to know which system works better on which operating system. Which of the following is correct about Network File System (NFS) and Server Message Block (SMB)? (Select all that apply.) SMB is the standard Unix directory sharing protocol. NFS is the standard Unix directory sharing protocol. NFS is the standard Windows folder sharing protocol. SMB is the standard Windows folder sharing protocol.

NFS is the standard Unix directory sharing protocol. SMB is the standard Windows folder sharing protocol. NFS is the standard Unix-based directory sharing protocol. NFS is configured in Linux by using the /etc/exports file. The NFS daemon must be reloaded after making changes to this file. SMB is the standard Windows folder sharing protocol. It can share out folders from a network attached storage (NAS) as well as from a traditional file server.

After researching which file-sharing protocol to use, the Linux administrator decides to use the one that is more closely related to the admin's specialty. Which protocol was used? Server Message Block (SMB) Network Attached Storage (NAS) Common Internet File System (CIFS) Network File System (NFS)

Network File System (NFS) Network File System (NFS) is a Unix-based protocol that can easily share files with a Windows-based system through the NFS Client for Windows.

A support technician travels to different locations servicing various servers using a USB device that has a specialized software program on it. What kind of license would the technician require for this software? Subscription Virtual Per-instance Node-locked

Node-locked Node-locked licenses are typically stored on a single node or a USB device. This would make sense in this scenario, as a single license would be stored on one device that could be transported.

A lack of Internet connectivity results after a technician installs new software on a Windows server. After checking that the server's IP configuration is valid, the technician discovers that an incorrect path is being used to reach the Internet. What does the technician find to be the problem? Network ports DHCP failure DNS failure OS routing table

OS routing table An operating system routing table can be created for a system's particular routing needs. Routes can be temporary or permanent. In this case, an invalid route to the subnet has been created.

A lack of Internet connectivity results after a technician installs new software on a Windows server. After checking that the server's IP configuration is valid, the technician discovers that an incorrect path is being used to reach the Internet. What does the technician find to be the problem? OS routing table DHCP failure DNS failure Network ports

OS routing table An operating system routing table can be created for a system's particular routing needs. Routes can be temporary or permanent. In this case, an invalid route to the subnet has been created.

An engineer notices a distinct burning smell upon entering a server room. What may have occurred? (Select all that apply.) Overheating GPU An olfactory cue Blue screen Malfunctioning fan

Overheating GPU Malfunctioning fan An overheating GPU would cause a video card to malfunction. As a result, the card may put off a distinct odor if it begins to burnout and fail. A malfunctioning fan in a system would cause a system to overheat. As a result, components may put off a distinct odor if they begin to burnout.

An encrypting crypto-locker virus has attacked a file server, and the system administrator is restoring it using a recent backup. Which type of restoration method is the administrator going to use to restore the files and maintain any specific pathing? Instant recovery Overwrite Alternate location Side-by-side

Overwrite The crypto locker virus has encrypted all the available data, in this particular case the administrator would use an overwrite backup to restore the data over all the encrypted data.

A company considers the cost differential of repurposing older servers with aged hardware components to run VMs and purchase new servers. Which phase of the server life cycle does this correspond with? Usage Disposal/Recycling Procurement EOL

Procurement The procurement process considers business requirements, identifies hardware, and determines pricing. The cost-benefit analysis of how to deploy its servers would fall under this phase.

A recent server cluster failure resulted in a sizable portion of the company's data being lost. After an analysis of the situation and subsequent recovery efforts, an administrator has determined that the failure has rendered nearly half the data unrecoverable. When building a new disaster recovery strategy, what should the company account for in case of a repeat scenario? RTO RPO Warranty MTTR

RPO Recovery Point Objective (RPO) is a disaster recovery component that defines the maximum time that can tolerate lost data becoming rendered unrecoverable. To mitigate future instances, the company should calculate this and redefine its backup cycle.

Which of the following are correct about rack-mounted servers and tower servers? (Select all that apply.) Rack-mounted servers consume space vertically Rack-mounted servers consume space horizontally Towers consume space horizontally Towers consume space vertically

Rack-mounted servers consume space horizontally Towers consume space vertically Tower servers cost less per unit, are less space-efficient than rack-mounted servers, and consume space vertically. Rack-mounted servers cost more per unit, plus the cost for the rack and peripherals required to make them fully functional. They use space more efficiently than towers and consume space horizontally.

A network administrator is working with a client to install new Category 5e Specification (CAT5e) network cables in an existing building. The administrator does note that the cables are made using plenum and appear to be CAT5e. The client suggests repurposing some of the existing wiring from before. What are two potential problems that could result from this idea? (Select all that apply.) Reliability concerns Security issues Network performance issues Fire concerns

Reliability concerns Security issues The existing media could pose a security concern where the old company left it behind. The administrator cannot assume the standard it was installed with. The existing media could have reliability concerns despite appearing the same in specification and fire safety standards. It would be best to replace.

A tower form factor server has remote access enabled. What would an admin need to remotely access the server for general configuration changes? Remote console access Remote drive access BIOS Remote on/off

Remote console access Remote Console, such as Remote Desktop and Secure Shell, allows an administrator to remotely access a server for troubleshooting or configuration.

A network technician is having difficulty fixing a bus error in a particular system. Which of the following approaches would NOT work to correct the issue? Ensure the PCI devices are seated. Replace the server's CPU. Unplug and reinsert a USB device. Upgrade the PCIe module.

Replace the server's CPU. The Central Processing Unit (CPU) is a component of a system that plays a significant role in the functionality of a networked device, but it is not a bus type.

A company has two representatives in the IT department. In order to use time more effectively when handling users, what two access control duties would be best in terms of user management? (Select all that apply.) Role-based access controls Scope-based access controls Rule-based access controls Delegation of access controls

Role-based access controls Rule-based access controls Role-based access controls control user groups and roles, granting user's permissions to certain entities on the network. Traditionally, an administrator is delegated to handle this portion of the network. Rule-based access controls are file and folder level permissions. These rules determine a user's level of access. Traditionally, an administrator is designated to handle this set of access rules.

A security team performs an audit on a Linux server and determines that access controls need attention to fix an excessive access issue. Which tool do the engineers use? User account control SELinux Routing table Group policy

SELinux SELinux is a solution that prevents excessive access to a system. Like the User Account Control feature in Windows, it can avoid system changes by monitoring and alerting potential changes to system settings.

A technician is configuring a storage area network to support upcoming business expansion efforts. Which documents will include the necessary specifications for managing this configuration? (Select all that apply.) Workflow diagram SOP Architectural diagram Baseline testing

SOP Architectural diagram Architectural diagrams facilitate understanding the components of a service solution and data flow. Such information is essential for troubleshooting, capacity planning, and scalability demands. They typically include hardware and software specifications. Standard Operating Procedures (SOPs) document detailed instructions for how to complete a specific task. These instructions are clear enough for all organizational members to follow and produce consistent results. SOPs should always be consulted when performing operational tasks.

A server technician manages a server in a remote location. What would be the most efficient way for the technician to log in and configure the machine to use the least amount of computing resources? SSH Load the configurations from a USB drive VNC PXE

SSH SSH, or secure shell, offers remote, secured command-line administration. Being a command line, as opposed to a graphical user interface, allows this method to operate quicker while using fewer total resources.

A Windows technician would like to restrict remote access to an out-of-state company server. Which of the following tools would best provide this functionality? RDP scp SSH Console connection

SSH Secure Shell (SSH) provides encrypted connections to devices remotely via command-line. An administrator could easily manage the access control list or modify permissions remotely utilizing this tool.

A Windows administrator must set up a lab environment to begin testing software applications. The lab should maintain high performance while using the least resources possible. Which option should the administrator choose? HCL Server Core Virtual Network Computing Template deployment

Server Core Server Core is a Windows command-line OS that utilizes less hardware and computing resources while offering performance improvements.

Which direction should the aisles in a server room point to properly maintain the optimal operating temperature for the racks? Server fronts should face towards the COLD aisle/Server. Server backs should face towards the HOT aisle. All server fronts should face the direction of the air conditioning system. Server fronts should face towards the HOT aisle. Server backs should face towards the COLD aisle. All server fronts should face towards the main door.

Server fronts should face towards the COLD aisle/Server. Server backs should face towards the HOT aisle. The server racks should face the cool aisle to best draw in cool air from the AC unit and blow the hot exhaust towards the AC to be re-cooled in the hot aisles. This is back-to-back/front-to-front which creates the hot and cold aisles.

A one-year-old database server recently malfunctioned and went offline. As this machine serves a highly active role for the afflicted organization, management requires the server to come back online quickly. Which of the following documents would provide management with specific details regarding potential replacement parts and installation? Change Management updates EOL Asset tags Service Plan

Service Plan Vendors typically offer tiered service plans, or warranties, that help to ensure the availability and functioning of servers. Replacement components may be included, as well as installed by the vendor.

When referencing failover testing types, which two names are synonymous with the same type of testing procedure? (Select all that apply.) Simulated failover Tabletop failover Live failover Parallel recovery

Simulated failover Tabletop failover Tabletop failover is a term used to describe a testing type where disaster recovery steps are implemented on a limited basis to test using role-playing, much like a simulated failover. A simulated failover is a term used to describe a testing type where disaster recovery steps are implemented on a limited basis to test using role-playing, much like a tabletop failover.

A server with a Redundant Array of Independent Disks (RAID) 5 disk array has a failed disk. After replacing this disk, the RAID array passes all checks, but the rebuild of the array takes much longer than anticipated. What causes the slow rebuild? Slow file access Database corruption Slow I/O performance Sector block errors

Slow I/O performance Slow I/O access can cause a variety of performance issues, including the slow rebuild of a disk array. A bottleneck in the throughput of a disk controller is one cause of slow IO access.

A technician has been dispatched to locate a specific individual by name within an organization. The employee's profile must be removed from an automatic update list that is run via script. Which of the following input types would allow the technician to quickly locate the individual? String Integer Function Array

String A string is a combination of alphanumeric characters. In this case, the strong would be a name.

A recent installation of updates to a Windows server was not completed due to a power outage. What problem does this update failure cause on the server? System file corruption Slow performance Freezing Memory leaks

System file corruption System file corruption can occur when updates and patches are not properly applied. Any files that were in process during the outage have likely been damaged.

The sysadmin needs to update to the newest server OS but wants to make sure that the current hardware is compatible. What can a sysadmin look to for information on what components would work in the new OS? The server's Graphics Processing Unit (GPU) The server's memory The server's Hardware Compatibility List (HCL) The server's Central Processing Unit (CPU)

The server's Hardware Compatibility List (HCL) A device's Hardware Compatibility List (HCL) is the best place to find which devices are compatible with the new OS that is being installed.

An organization with several thousand employees requires a licensing solution for one of its departments that consistently possesses a fixed number of workers. Which licensing solution would make the most sense for this organization? Backwards-compatible license Forward compatible license Signature-based Volume licensing

Volume licensing Volume licensing provides a single license to cover a specified number of installations. This model simplifies license management for the convenience of the organization.

An electrician recently worked on the server room's isolated circuit and one of the building's connections to a secondary power supplier. A quarterly test of the redundant power systems is about to take place. What is another system the technician should check before the test? The server's storage controller The server's uninterruptible power supply (UPS) The server's hardware compatibility list (HCL) The server's central processing unit (CPU)

The server's uninterruptible power supply (UPS) Since the other redundant power capabilities were recently checked by an electrician, the uninterruptible power supply (UPS) is the next most significant power component that would be affected during a test of these systems along with power distribution units (PDU) built into the racks.

A technician is attempting to combine multiple NICs in a server to facilitate increased traffic. Despite no observed hardware issues, the virtual NIC does not appear to be supported. Which of the following is most likely the issue? The server is not configured for load balancing. SaaS patches are faulty. The switch is not configured for NIC teaming. The server is not a Linux server.

The switch is not configured for NIC teaming. The switch used to join the Network Interface Cards, or NICs, must be configured for NIC teaming to work properly. Not all switches support NIC teaming.

During a heatwave, a network administrator receives a notification that the server is experiencing higher than average temperatures. The whirring of fans can be heard when entering the room. Which part of the server's environment could most likely be causing this? The Central Processing Unit (CPU) heatsink The server's rack The thermostat The server's internal fans

The thermostat The thermostat may need to be adjusted to account for the unexpected temperature rise. This would require a quick spot check to verify, making it the most time-effective action.

A user states that they are unable to log into a Windows server and access any files on a small business network. Administrators troubleshoot the problem and find the cause. What is preventing the user from logging in? (Select all that apply.) The time on the server is incorrect. A database service is missing a dependency. There is a service provider failure. The user's computer is not joined to the domain.

The time on the server is incorrect. The user's computer is not joined to the domain. In a Windows domain environment, a computer must be a member of a domain. If for some reason, the computer is no longer trusted, this will cause a login problem for the user. A server requires having accurate time. If the time is substantially incorrect compared to other domain servers, availability and functionality will be impacted.

A server administrator must set up a small lab to conduct initial stage application testing for new company software. To preserve costs while best conducting testing, the administrator plans to use a single server with multiple virtual machines. What would be the best option to use for this lab? Type 2 hypervisor Physical NIC Load balancer vNIC

Type 2 hypervisor A Type 2 hypervisor runs on the installed operating system and generally works best when applied in smaller environments that possess fewer resources. A testing environment would be a good example of this.

Which of the following should the system admin select as a standard external solution to temporarily add storage capacity to a rack server? SD card Hybrid drive eSATA drive USB drive

USB drive A Universal Serial Bus (USB) drive is a standard storage solution that can attach to a rack server to temporarily provide additional storage capacity for maintenance purposes or other needs.

A Windows server performs several reboots after receiving many operating system updates. After doing so, users report that they can no longer access a shared network drive. What does IT support conclude to be the problem? Unstable software Improper CPU priority Missing dependencies Incompatible drivers

Unstable software Unstable software, such as operating system patches and updates, can often be problematic. This is commonly due to unexpected or untested scenarios where updates have been applied.

A network administrator is decommissioning a company laptop. If the network administrator wanted to repurpose it for an alternative use, what's a good way to utilize the hardware without posing a risk? Decommission the laptop. Use it to host an application. Use the laptop in a crash cart. Reformat and give to another employee.

Use the laptop in a crash cart. Repurposing the laptop as a crash cart unit is a common way to utilize old hardware. This would be designated to the administrator who would troubleshoot all sorts of on-site issues with it.

A new server admin must replace a dead server on one of the racks. Uncertain of the rack names, the server admin pulled several servers out on the rails to determine which one needed replacement. After extending a few rails, the rack started to tilt forward, and the server admin had to quickly push them all in before the whole rack fell over. How did this happen? Users must be careful when sliding servers out of the rack on rails that it does not overbalance the rack. When mounting new servers, always ensure the rack enclosure is balanced completely. The floor panels in this server room are not rated for the weight of the full rack enclosures. Rail kits may be universal or proprietary, so check with the manufacturer of the rack to find the proper fit.

Users must be careful when sliding servers out of the rack on rails that it does not overbalance the rack. Be careful when sliding servers out of the rack on rails to avoid overbalancing the rack. For safety, the rack should also be anchored to the floor.

A server administrator is writing a script to calculate disk space requirements for daily backups. At certain points, other technicians or administrators within the organization should be able to log in and modify this operation as needed. Which of the following options would permit this operation to be modified by other authorized users? Loop Comment String Variable

Variable Variables are stored values that are not always constant. Users, for example, can be referenced as variables, rather than calling out specific user names. Depending on the system, they may change who is logged in, the current date and time, or other factors.

An administrator is troubleshooting a server application malfunction. Windows is not producing anything other than a generic error message. What built-in application can the administrator consult in order to find a log relating to the error? System information Performance monitor Computer management Windows event viewer

Windows event viewer The Windows event viewer contains several sets of logs relating to hardware and software performance errors and events. This would be the first place to check in regards to most generic application malfunctions.

A system administrator works to ensure a server is protected against the latest crypto-locker virus that encrypts data drives. The administrator utilizes Windows Defender for Servers on the 2019 server. In order to update this service, what two places could the administrator visit? (Select all that apply.) Windows server manager Windows updates Windows security app Microsoft's main website

Windows updates Windows security app Windows Update is where the administrator would go to update the program. Microsoft includes firewall and virus definition updates for the security platform in the traditional update rollout on modern Windows environments. The Windows Security application contains an Update Now button when reviewing virus definitions, and would be another location the admin could visit to update for the protections against the virus.

The server administrator team is setting up a new backup system with a Redundant Array of Independent Disks (RAID) storage solution. Each RAID solution specializes in different aspects of read, write, redundancy, storage, and cost effectiveness. The team decides that RAID 0 will get them the resulted priority they are looking for. What is the team's focus when using RAID 0? Neither read nor write-intensive Both read and write-intensive Write-intensive Read-intensive

Write-intensive A RAID 0 system provides a great deal of speed but no redundancy whatsoever. This team's focus is on a write-intensive backup.

An administrator needs to document the network address settings for a Windows server. Which command should the administrator use? ipconfig ip addr tracert traceroute

ipconfig The ipconfig command is used with a Windows system to list the current IP address. Using the command with switches provides even more detailed information.

A Linux administrator is running a system analysis on a server that has been intermittently dropping service. The administrator must analyze the current and recent workload of the server across the number of users connected. What would allow the administrator to perform this action? uptime Log shipping df Consult the reliability monitor

uptime The uptime command will show the current number of users and the CPU load for the most recent one, five, and fifteen-minute intervals.


संबंधित स्टडी सेट्स

unit 5&6 APA In-Text Citation and References List: A Basic Review

View Set

2.02 Innovation Nation US History

View Set

Chapter 1: The Role of Assessment in Teaching and Learning

View Set

Asceptic technique and sterile field

View Set

NCLEX Review Study Guide (Summer 2022)

View Set

Chapter 6: Extra Divisibility & Primes

View Set

Recurrent Neural Networks (RNNs)

View Set