SERVER+

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The asset management database

A company is planning to replace old hardware and needs to budget accordingly. Which of the following is likely to contain a list of end of life servers?

Replace the straight-through cable with a crossover cable.

Aaron is a network technician linking two older Ethernet switches together with a straight-through network cable. He later realizes the interswitch connection is not working. What should Aaron do?

99.999%

An ISP is currently drafting and compiling a Service Level Agreement that states there should only be 5.26 minutes of downtime per year, 25.9 seconds per month, and 6.05 seconds per week. Which of the following percentages should be used to meet these metrics?

Synchronous

An SLA guarantees that user data will be available in at least one data center. What type of replication is needed between data centers?

Less than the RPO

An organization's BCP stipulates that the RPO is five hours. How often should backups be performed?

LDAP

Clients cannot connect to the network. A technician determines that port 68 is not open. Which of the following protocols is being blocked?

KVM

How can servers be remotely managed when network connectivity is unavailable?

DMZ

Network devices between two firewalls are included in which of the following?

hard disk.

Swap space or page file is reserved on the:

3.5″

What is the height of a 2U system?

SATA

Which of the following allows a cable to be a maximum of 1 meter in length?

172.32.63

Which of the following is not a private IP address?

Asset management documentation

A company is being audited by its operating system vendor. The company needs to report the number of operating systems in use, the versions of the operating systems, and the product keys. Which of the following will be MOST helpful in passing the audit?

Service level agreement

A customer reports that connectivity to their web server has been sporadic throughout the morning. An administrator has applied OS patches periodically throughout the morning and rebooted the server. Which of the following has the administrator MOST likely violated?

Check the application logs.

A database server stops responding to requests, and the administrator suspects that the server is experiencing memory faults during heavy network traffic and database access. Which of the following is the FIRST troubleshooting step?

Mantrap

A datacenter audit finds that a number of personnel are not using access cards when entering a secured area with a coworker. Which of the following security methods could be implemented to help prevent this behavior?

Solid state drives

A datacenter is in a geologically active area and has no earthquake abatement installed. Which of the following drive types is BEST for general server use?

115v 30 amp

A datacenter technician encounters a power receptacle labeled NEMA L5-30. Which of the following powers is this socket rated for?

The drive was initialized as MBR

A new 4TB drive is added to a server. You notice that the server operating system can use only 2TB. What is the most likely cause of the problem?

Backplane failure

A server administrator is notified that all three hard disks in a server array have failed. Which of the following is the MOST likely cause?

SMS messages

A server unexpectedly shut down as a result of overheating. An alert was sent to the administrator's email address but the administrator was away from the workstation when the alert arrived. Which of the following would have been a more effective method for sending the alert notification?

NTFS

A system administrator is tasked to set up a file server. The file server must be able to support access control lists and logging for auditing purposes. To meet these requirements, with which of the following file system types should the administrator format the file system?

ECC

A technician is concerned about memory data corruption in a server. Which of the following memory types should be considered?

Multimode fiber

A technician is configuring switches with SFP ports on multiple floors in a building. A switch on the first floor must be connected to a switch on the second floor for trunking VLAN traffic. Which of the following would be the MOST appropriate cable type for the technician to use?

Check system board cables

A technician receives an error message when trying to boot the server stating the operating system was not found. Change management logs indicate a new hard drive backplane was installed in the server last night. Which of the following should the technician do FIRST when troubleshooting the issue?

Add the w permission for the users

After a migration to a new server, users report that they are unable to save files to their home directories. A check of the permissions on the home directories indicate that the permissions are set as follows: User: r-x Group: r-- Other: r-x A server administrator verifies the correct user and group ownership of the home directories. Which of the following will MOST likely resolve the issue?

Prioritize assets

After identifying assets in a BIA, what should be done next?

Modify the device boot order in the BIOS

After starting an operating system installation from DVD, a system administrator goes to work on another task and comes back to find the server back at the installation start screen. Which of the following should be done to correct this problem?

SSH

After successfully authenticating to a remote server, a server administrator is presented with an interactive command line with no graphical interface. Which of the following protocols did the administrator MOST likely use to securely connect to the remote server?

Mantrap

All critical systems, such as servers, should be placed in a secure location such as a server room. Access to the server room should be limited to authorized personnel only. You are tasked with preventing people from following you into the server room behind you once you have unlocked the door. Which physical security concept would eliminate this issue?

multicore server.

An administrator purchases a new server, which contains only one Xeon processor. This server is also known as a:

port 443 is closed

An administrator receives multiple reports that users cannot access a secure website hosted on a server the administrator manages. The administrator investigates and discovers that the reason users cannot access the secure site is because:

Hurts performance

RAID 6 writes parity information across the drives as is done in RAID 5, but it writes two stripes. What is the effect of writing two stripes?

RAID 5

RAID allows for multiple physical disks to be grouped together in a single volume. RAID volumes are designed for data redundancy or improved performance. You are configuring a new server with three hard disks and you wish to provide fault tolerance. Which RAID configuration should you use?

RAID 1

RAID allows you to group multiple disks together into one logical volume. A RAID configuration is normally used for fault tolerance, but can be used to improve read and write times as well. Which RAID configuration uses a minimum of two disks and copies the same data to both disks?

icacls

Which Windows command can be used to view and troubleshoot file system ACLs?

ipconfig /all

Which Windows command shows DHCP lease information?

wevtutil

Which command-line utility can be used to manage the size of log files?

traceroute tracert

Which commands are used on a router to identify the path taken to a destination network? (Choose two.)

rsync

Which common Linux tool synchronizes file systems between remote hosts?

KVM

Which device allows you to plug multiple PCs (usually servers) into the device and to switch easily back and forth from system to system using the same mouse, monitor, and keyboard?

SAS

Which disk interface standard is the most common in servers?

Rotational latency

Which disk speed factor does not apply to SSDs?

BCP

Which document provides the information necessary to create the DRP?

Synchronous replication

Which factor enables up-to-date hot site data?

Encryption Auditing

Which features do NTFS file systems offer beyond FAT32 file systems? Choose two.

ZFS

Which filesystem was created by Sun Microsystems?

UEFI

Which firmware standard supports the Secure Boot feature?

Multiple network cards

Which if the following does not need to be matched correctly?

UEFI

Which if the following is designed to replace the BIOS?

CAS Latency

Which if the following is the time to access a memory address column if the correct row is already open?

Memory leak

Which if the following occurs when an application is issued some memory to use and does not return the memory?

PDU

Which of the following is a device that looks much like a simple power strip with multiple outlets but can provide case alarms and environmental monitoring as well?

PCI-X

Which of the following is a double-wide version of the 32-bit PCI local bus?

EIU-64 format

Which of the following is a method of spreading the 48-bit MAC across 64 bits so that it can be used as the last 64 bits of the 128-bit IPv6 address?

Assigning a BIOS password

Which of the following is a physical hardening technique?

It provides a company with a backup location to install the necessary equipment to restore critical services.

Which of the following is a reason to have a remote cold site readily available in case of a disaster in the primary datacenter?

Processors that support virtualization

Which of the following is a requirement for a server to allow guests to be installed on a hypervisor host?

Mantrap

Which of the following is a series of two doors with a small room between them?

Sag

Which of the following is a short-term voltage drop?

One double port HBA

Which of the following is a single point of failure?

802.1ax-2008

Which of the following is a standard method of implementing NIC teaming?

SAS

Which of the following is a type of SCSI that uses serial operation rather than parallel as the original SCSI did?

SPI

Which of the following is a type of table that tracks IPsec security associations?

fe80::883b:ced4:63f3:f297

Which of the following is a valid IPv6 link-local address?

MBSA

Which of the following is a vulnerability scanner for Windows only?

RAID 1

Which of the following is also called disk mirroring?

169.254.5.6

Which of the following is an APIPA address?

iSCSI

Which of the following is an IP-based networking storage standard method of encapsulating SCSI commands?

Sharing is made easier by the fact that the SAN is not connected directly to any network or server.

Which of the following is an advantage of a SAN?

Lower cost

Which of the following is an advantage of software RAID over hardware RAID?

FE80::2237:06FF:FECF:67E4/64

Which of the following is an example of a link local IPv6 address?

Grant appropriate permissions to only users in the Accounting department for both the share and NTFS

Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?

PXE

Which of the following is an industry standard client-server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator?

System state

Which of the following is another name for the system configuration data?

Cold spare

Which of the following is attached to the system but cannot replace a bad disk without manual intervention?

Storage space

Which of the following is conceptually like a virtual disk?

JBOD

Which of the following is defined as the use of multiple disks, which operate independently of one another?

It increases the risk of vandalism or theft of the backup media.

Which of the following is false with regard to using offsite storage for backup media?

Memory

Which of the following is frequently the source of the error message Data_Bus_Error ?

Halon

Which of the following is no longer legal to use in a fire suppression system?

tmcmillan

Which of the following is not a FQDN?

The drives should be placed back in the reversed order of removals.

Which of the following is not a best practice when manually rebuilding RAID arrays?

The tag signal can only go a few feet.

Which of the following is not a drawback of using active RFID chips?

Ensuring sufficient processing power

Which of the following is not a part of hardening the system?

Excessive interrupts

Which of the following is not a source of slow hard drive performance?

RPMs

Which of the following is not a specification of an SSD?

A NAS has lower latency and higher reliability than a SAN.

Which of the following is not an advantage of NAS?

Ability to do disk duplexing

Which of the following is not an advantage of hardware RAID over software RAID?

Impervious to network congestion

Which of the following is not an advantage of iSCSI?

RADIUS server

Which of the following is not an example of an authenticator in an 802.1x architecture?

Implementing strong authentication to log into the server

Which of the following is not an example of physical hardening of the server?

The amount of data

Which of the following is not an issue that affects retention time?

Pagefile

Which of the following is not one of the four major resources?

An HIDS monitors all traffic that goes through it looking for signs of attack on any machine in the network.

Which of the following is not true of an HIDS?

It does not provide support for drives larger than 2.2 terabytes (TB).

Which of the following is not true with respect to UEFI?

VSS

Which of the following is required to be supported to perform an open file backup?

FE80: :/64

Which of the following is the IPv6 prefix of a link local address?

FE80::

Which of the following is the IPv6 prefix of an autoconfigured address?

Liquid cooling units

Which of the following is the MOST complex way to directly reduce heat for computing components?

48V DC

Which of the following is the MOST energy efficient way of powering equipment within a datacenter with a large UPS battery bank?

Store the information encrypted and offline in a storage safe.

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g. administrative passwords, trusted signing keys)?

Degaussing

Which of the following is the MOST secure to erase data before disposal of server hard drives?

Memory\Available Mbytes

Which of the following is the amount of physical memory, in megabytes, available for running processes?

A folder accessed on average once a year

Which of the following is the best candidate for compression in the server?

Hypervisor

Which of the following is the core software application that manages computer virtualization?

24 amps

Which of the following is the de-rated value of a PDU with a maximum input value of 30 amps?

1.75 inches (4.4 cm)

Which of the following is the height of 1U of space in a server rack?

::1

Which of the following is the loopback address in IPV6?

Human error

Which of the following is the most common cause of backup failures?

Fibre Channel

Which of the following is the most costly to implement?

10

Which of the following is the number of 7-inch high servers that can be installed in a 42U rack?

Processor\% Processor Time

Which of the following is the percentage of time the CPU spends executing a non-idle thread?

25

Which of the following is the port number for SMTP?

For synchronizing clocks on network devices

Which of the following is the purpose of an NTP server?

Seek time

Which of the following is the time it takes for the actuator arm to arrive at the proper location where the read or write will occur?

Latency

Which of the following is the time it takes for the platter to spin the disk around so the actuator arm is over the proper section?

They can be a single point of failure.

Which of the following is true of server backplanes?

The web server must have a certificate.

Which of the following is true of the requirements to use SSL on a website?

World Wide Names

Which of the following is used as identifiers for host bus adapters?

IKE

Which of the following is used to generate each session key in IPsec?

Rail kits

Which of the following is used to make maintenance easier with a rack server?

diskpart

Which of the following is used to manage storage in Windows Server 2012 R2 at the command line?

Multimeter

Which of the following is used to test a power supply?

Poor performance

Which of the following issues can be caused by a cable with a cut in the outer covering?

End of life

Which of the following means that the device is no longer supported by the vendor?

Zero all block sectors

Which of the following methods should a technician perform to properly clear a hard drive before disposal?

Whole disk encryption

Which of the following methods should be used when classified or sensitive data is stored on a server?

Bypass

Which of the following modes removes a UPS from between the device and the wall output conceptually, without disconnecting it?

Architecture

Which of the following must match when adding drives to a set of existing drives?

Security guards

Which of the following offers the most flexibility in reacting to security events?

A packet from 192.168.1.6/24

Which of the following packets will be allowed according to the iptables rule that follows?

OUI

Which of the following parts of a MAC address identify the manufacturer of the interface?

Twist lock

Which of the following power plug types would MOST likely be found in a medical facility?

RDP SSH

Which of the following protocols can be used to perform configuration management on a remote server using the MOST secure methods? (Select TWO).

LDAP

Which of the following protocols can be used to query for host, user, and group information for clients?

HTTP

Which of the following protocols is considered stateless and utilizes TCP when communicating between a server and client?

SNMP

Which of the following protocols is used primarily for monitoring and managing network devices?

SMTP

Which of the following protocols is used when mail servers send email?

LDAP

Which of the following provides a mechanism to access and query directory services systems?

RAID 0

Which of the following provides no fault tolerance?

Bank card and PIN.

Which of the following provides two-factor authentication?

Site to site

Which of the following replication methods is MOST appropriate when integrating data from multiple remote offices?

Disk to disk

Which of the following replication methods is also called array-based replication?

Site to site

Which of the following replication methods is the most expensive?

Counters

Which of the following represents aspects of the workload the resource is undergoing?

FIFO

Which of the following rotation schemes does not protect against data errors?

Directory

Which of the following server roles is used to authenticate users to the network?

Directory server

Which of the following server types is commonly used for authentication and credential storage?

Database server

Which of the following server types requires the LARGEST amount of available hard drive space?

Directory

Which of the following server types stores the list of network usernames and passwords required for authentication?

DNS

Which of the following server types translates FQDNs to IP addresses?

DNS WINS

Which of the following services provide hostname to IP address resolution? (Select TWO).

LDAP

Which of the following services provides users with directory services?

SFTP

Which of the following services uses port number 22?

Subnet mask

Which of the following should be the same on all devices in the same subnet?

Cold

Which of the following site types contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring?

Clean boot

Which of the following starts by using a preselected minimal set of drivers and startup programs?

All safes are fireproof.

Which of the following statements is false with respect to safes?

Make one change at a time.

Which of the following statements is true with regard to troubleshooting?

Group membership changes take effect while affected users are logged in.

Which of the following statements regarding Active Directory groups is false?

Document findings, actions, and outcomes throughout the process.

Which of the following steps in the CompTIA troubleshooting method come last?

SATA

Which of the following technologies supports hot swapping inherently?

fdisk

Which of the following tools cannot be used to mount a volume on a basic disk in Windows Server 2012 R2?

Device Manager

Which of the following tools is used to set the speed and duplex of an interface in Windows?

Document findings

Which of the following troubleshooting methods would be performed after resolving an issue?

SAN

Which of the following uses the Fibre Channel protocol?

VNC

Which of the following uses the Remote Framebuffer (RFB) protocol?

GFS

Which of the following uses three sets of backup tapes?

Tape backup

Which of the following will protect data loss against catastrophic multiple physical drive failure?

Degraded performance

Which of the following will result from an L2 cache failure?

Sally's public key

Which of the following would Joe use to encrypt a message that only Sally could decrypt?

The MAC address of the computer

Which of the following would not be a cause of an inability to connect to the Internet?

255.255.0.0

Which of these is the default mask of a Class B network?

Mantrap

Which physical security control prevents tailgating?

SSH

Which remote management technology is not graphical in nature?

Low RTO

Which requirement justifies the cost of a hot site?

CPU

Which resource is stressed the most on an application server?

802.1x

Which security standard controls port-level access to a network?

DNS server

Which server could be the source of an inability to connect to a local host by name?

DHCP

Which server role automates the process of providing an IP configuration to devices in the network?

NTP

Which server role is critical to the operation of digital certificates?

DNS

Which server role resolves hostnames to IP addresses?

Web

Which server role uses HTTP as its transfer mechanism?

Load balancing

Which type of fault tolerance is recommended for servers running applications that do not have long-running in-memory state or frequently updated data?

Synchronous

Which type of replication provides a near-zero RTO?

Bare metal

Which type of restore should be used for operating system, data, and configuration settings that can be applied to different servers?

Capacity

What is the maximum amount of power a UPS can supply at any moment in time?

3

What is the minimum number of disk required for RAID 5?

traceroute

Which Linux command reports each router crossed when communicating with a remote host?

HBA

What type of NIC acts as both a host bus adapter (HBA) for the SAN and also as the network card for the server?

MAC

What type of address applies to Layer 2 switches?

IP

What type of address applies to Layer 3 switches?

top

Which Linux tool should you use to troubleshoot CPU resource utilization in real-time?

iostat

Which Linux tool should you use to view disk device read and write statistics?

Repair-volume

Which PowerShell cmdlet can fix corrupt filesystems?

Enter-PSSession

Which PowerShell cmdlet opens an interactive session with a remote host?

RAID 0

Which RAID level offers the best performance?

RAID 5

Which RAID type increases fault tolerance and performance?

RAID 1

Which RAID type is also called mirroring?

RAID 0

Which RAID type provides no fault tolerance?

USB 2

Which USB standard supports transmission rates up to 480 Mbps?

Key fob

Which VPN authentication tool uses a changing numeric code synchronized with the VPN appliance?

Password

Which of the following authentication methods is not an example of biometrics?

TACACS RADIUS

Which of the following authentication protocols could be used to authenticate network administrators at a datacenter to manage switches over a remote SSH connection? (Select TWO).

Interference

Which of the following behaviors affects a WLAN but not a wired LAN?

The maximum amount of tolerable downtime

Which of the following best describes RTO?

Different speeds Different manufacturers

Which of the following can be mixed when installing memory? Choose two.

Application-level proxy

Which of the following can read the individual commands of the protocols that are being served?

Set the minimum number of MAC addresses that can be seen on a port

Which of the following cannot be accomplished using port security?

I/O is high, use of swap is low, and use of memory is high

Which of the following combinations of factors indicates an I/O issue?

ipconfig/flushdns

Which of the following commands clears the local DNS cache?

telnet 192.168.5.65 80

Which of the following commands could be used to see if HTTP is working on a server?

top

Which of the following commands in Linux can be used to diagnose a memory issue?

sudo fdisk -l

Which of the following commands lists the partitions in a Linux system?

Spyware

Which of the following could not be reason why a user cannot logon?

TCP 3389

Which of the following default ports should be open on a server for remote administration?

Virtual machines and storage can be rapidly provisioned. SLAs provide guaranteed uptime.

Which of the following demonstrates an advantage of cloud computing? Choose two.

Encapsulates Fibre Channel traffic within Ethernet frames

Which of the following describes FCoE?

Cold pluggable

Which of the following describes a drive that needs to be disconnected from the software in the server before begin changed out and then reconnected after the swap is done?

3.5 inches (8.89 cm)

Which of the following describes a rack mounted server that is 2 rack units (2U) in height?

Cold site

Which of the following describes an alternate site where only the infrastructure (building, power, cooling) has been established?

IOPS

Which of the following describes how fast the drive can read and write to the disk?

Runtime

Which of the following describes the amount of time a UPS can provide a given level of power?

MTTR

Which of the following describes the average length of time it takes a vendor to repair a device or component?

BIA

Which of the following describes who and what are affected by the loss of each business process or function?

Proxy firewall

Which of the following devices can also provide web caching services?

resolv.conf

Which of the following do you edit to affect a DNS suffix search list in Linux?

Overheating

Which of the following events causes chip creep?

Cost

Which of the following factors would cause a technician to select a hard drive over an SSD as a primary storage medium?

CIDR

Which of the following features can administrators use to create smaller networks called subnets by manipulating the subnet mask of a larger classless or major network?

Port security

Which of the following features can be used to prevent unauthorized devices from connecting to a switch?

APIPA

Which of the following features will assign a host with an address in the 169.254.x.x range with a subnet mask of 255.255.0.0?

C:\windows/winsxs

Which of the following folders is the component store directory?

Dataflow diagram

Which of the following graphically depicts the movement of information within a system?

Telnet

Which of the following has lost favor to SSH because it sends data—including passwords—in plain-text format?

LUN

Which of the following identifies a device addressed by the SCSI protocol or protocols that encapsulate SCSI?

Root cause analysis

Which of the following involves finding and correcting the MOST important reason for performance issues?

NTFS

Which of the following is a Microsoft filesystem?

DAS is directly connected to a server; NAS is connected via IP networking.

Which of the following is a basic difference between DAS and NAS?

To provide for heat dissipation using forced air through the sub-floor

Which of the following is a benefit of using raised floors with specially configured tiles in a server room?

There is increased hardware support since there is an OS layer.

Which of the following is a benefit of utilizing a type 2 hypervisor to manage guests?

4

A blade chassis can hold 16 half-height blades or eight full-height blades. Which of the following is the MAXIMUM number of half-height blades that can be installed in the chassis if six full height blades are already installed?

Fault Tolerance

A blade server chassis has two power supplies. Which of the following is a benefit of a technician connecting each power supply to a separate UPS unit?

Backplane

A blade server indicates it has a failed hard disk in Slot 0. This is the third instance of Slot 0 disk failure in three months. Which of the following is the MOST likely cause of the failed hard disk in Slot 0?

call an electrician to see if 3-phase power can be brought into the room.

A certain rack mounted blade server chassis needs 3-phase power for operation. There is currently only single-phase power coming into the room. The administrator needs to:

Virtualize the servers in the datacenter

A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology Officer issued a memorandum to the IT department with a directive to reduce power and cooling consumptions by 50% in the datacenters. Which of the following should the system administrators recommend?

Establish a plan of action to implement the solution in production.

A company has hired a consultant to review the production storage infrastructure and provide suggestions on improving performance. The consultant has identified a bottleneck in the production switching fabric and successfully tested the solution in a lab environment. Which of the following should the consultant perform NEXT, according to best practices?

Disable any unused physical ports until needed

A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?

5

A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a technician realizes that a different RAID level can be used to compensate for a limited number of available disks. Which of the following is the closest RAID level the technician should deploy while minimizing the number of disks and maintaining fault tolerance?

Check the DRP and BCP and talk to the company stakeholders before making the decision.

A hardware failure affects a server in a datacenter. The server is critical to company operation, and the hardware vendor is out of stock on the parts needed to repair the server. A network technician suggests replacing it with a server from the warm site. Which of the following should the technician do FIRST?

The guest will not have network access to the host or network resources

A host server in a small business environment does not have virtual switching configured. The NIC on a guest is configured with an IP address that is on a different subnet from the host server. Which of the following would MOST likely happen in this case?

Develop a plan to build a test server.

A line-of-business software patch notification is received. The notification indicates that version 5.0 of the software has new features that the accounting department has been expecting. The update requires a new version of the OS and new version of SQL on the server. Which of the following should the administrator perform FIRST?

33 MHz 3.3V PCI

A mission critical server has faulted with a dead 66 MHz 3.3V PCI-X network interface card. The system administrator has been directed to get the server functional as soon as possible, even if it is connected with less bandwidth. There are no onsite spare cards available and the vendor does not expect to have the parts for at least a week. Which of the following immediately available NICs could be substituted instead?

Assign at least one IP address to each port

A network administrator installs a new web server and notices that the server was configured with one quad-port NIC. In order to properly provision the hardware resources, how should the NIC be configured?

Increase the size of the DHCP scope for the network segment in question.

A network administrator is installing additional devices on the network. Currently, the network segment is utilizing all allocated IP addresses. If there are additional addresses available, which of the following would be BEST for the network administrator to perform to accommodate the new network devices?

iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT

A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?

Multiple HBAs

A network administrator is tasked to set up zoning for a SAN infrastructure that requires redundancy. Which of the following types of hardware should the administrator implement?

The DHCP relay agent was not configured on the adjacent network segment.

A new DHCP server is placed on a network segment during off hours. When work resumes, users on a different network segment report connectivity issues. Users on the same network segment report no connectivity issues. Which of the following is the MOST likely reason for the connectivity issues?

The users' workstations do not support IPv6.

A new file server is added to an existing network. Some users are able to connect to this server, while others are not. A partial network configuration on the server shows the following: Link local: fe80::3000:aff:dea6:f8c/64 Which of the following BEST explains why some users cannot connect to the server?

RAID 0

A new server has two drives and a RAID controller. Which of the following is an option for configuring the storage on this server?

Port scanner

A new version of the primary operating system used by a company has been released. Due to some significant changes in the OS, a system administrator wants to see which remotely accessible services are enabled by default to assess the security risk prior to upgrading to the new version. Which of the following utilities should the administrator use?

80

A new web server is installed with an Intranet web site. User authentication to the site is not required. Your boss asks you to configure the firewall appliance to enable people to browse to the new site. Which port should you open on the firewall appliance?

Roll back the driver.

A newly installed NIC driver on your Windows server has rendered the system unstable. What should you do?

PCIe versus PCI

A newly installed tower server will function as a packet-filtering firewall. Currently, the server has three NICs, each connected to separated VLANs. A fourth NIC is required for connectivity to a perimeter network. When choosing a new NIC, what factor should be considered?

Add an additional hard drive, and convert the volume to a RAID 6 configuration.

A number of users are indicating that access to a network file server is responding very slowly when reading or writing to the share. The server administrator notes that a drive has failed in a four-disk RAID 5 array. The array is running in a degraded state because no hot spare was configured. After replacing the failed disk, which of the following steps would be BEST to take to prevent slow response after a drive failure?

Voltage

A processor failure can occur while upgrading or replacing the current processor. There are several steps you can take to both troubleshoot and prevent processor failure. You have just changed your server's processor, and it appears to not be working correctly. Which diagnostic check involves confirming the motherboard jumpers and/or the CMOS settings are properly configured?

Private key

A public key infrastructure (PKI) is a set of procedures surrounding the hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which part of the PKI infrastructure can validate entities without being able to issue certificates?

IOPS Seek time and latency

A server administrator has been asked to make recommendations for purchase of a new database server that will be processing all of the company accounts. One area of concern from prior experience is the storage type used by the database server. The server is expected to have a large number of transactions that occur, but will not require a large amount of capacity for the data storage. Given these requirements, which of the following storage criteria are MOST important? (Select TWO).

199.90.10.47, 255.255.255.240

A server administrator has been given the following information from the network team in order to configure IP addresses on a new server: Network Address: 199.90.10.32/28 The network team also instructed the server administrator to use the LAST usable address on the given network. Which of the following IP address/subnet mask combinations should the server administrator use?

DAS

A server administrator implements external storage for a file server. At a later time, another administrator wants to extend this storage to a second server but is unable to connect to two servers simultaneously. Which of the following storage types was implemented by the first administrator?

Default gateway

A server administrator is bringing a new host online. After the initial OS installation and configuration, the administrator is unable to reach hosts on another subnet. The administrator is able to ping and access other hosts on the same subnet. Which of the following should the administrator check FIRST?

The server should have at least two NICs: one configured with an IP address on the inside network, and one with an IP address on the outside network.

A server administrator is configuring a new server for an organization. The server will function as a firewall and proxy server, as well as provide NAT services for other devices on the network. Which of the following BEST describes how the network hardware on the server should be configured?

RBAC

A server administrator is configuring access control on a file server for an organization. The Human Resources manager is taking a leave of absence for three months, during which time an interim Human Resources manager will take over the duties of the position. Which of the following types of access control should be configured on the file server?

Active/Active

A server administrator is creating a design for a new datacenter. The servers should be configured for maximum availability and also provide caching for user information requests. Which of the following techniques should be used?

RAID 1

A server administrator is implementing disk redundancy in all database servers. Which of the following RAID configurations should the administrator use so that a MINIMUM number of disks are required?

ServerA-23TB, ServerB-36TB

A server administrator is researching the purchase of SSD for a server. The administrator receives a report from the datacenter technician detailing current storage requirements and future growth planning estimates as follows: ServerA: Current-15TB-Future-50% growth ServerB: Current-20TB-Future-80% growth Based on this report,

/26

A server administrator is setting up a new set of hosts for an application that requires communication between all the hosts on a dedicated private subnet. Initially, the configuration consists of four hosts and is expected to grow to 48 total as the application is implemented for the entire company. When configuring the private subnet, which of the following CIDR netmasks would allow for the full number of hosts once the application is fully in production with the least number of unused addresses allocated?

LUN masking

A server administrator wants to isolate a SAN hosted LUN to be visible to only a single host. Which of the following methodologies would be used to present the LUN to only that host?

Slots A2 and B2

A server administrator wants to upgrade the memory of the server using two memory modules. The server has two banks of memory with the following slots available: A2, A3, A4, B2, B3, and B4. In which of the following two slots should the administrator install the additional RAM?

Hot swappable

A server has a faulty hard drive, and the administrator needs to replace the hard drive while it is running. The server needs to support which of the following drives?

SMTP

A server has been assigned a role of mail server. Which of the following services will be installed as a result of this selection?

Allow TCP port 22 Allow TCP port 3389

A server has recently been configured as a network firewall. After the firewall was configured, users could no longer access a remote server. Which of the following, if properly configured on the firewall, will allow users to have secure access to the remote server? (Select TWO).

The server's hard drive is out of space.

A server in a small company functions as a print server. Suddenly it stops sending print jobs to the printers. A technician verifies that the printers are working correctly. Additionally, the print spooler had been restarted and is running on the server, it is accessible from workstations, and it shows as being ready to accept print jobs. Which of the following has MOST likely caused the print server to stop processing print jobs?

Web server

A server is composed of software capable of accepting requests from a client, and responding accordingly. Servers operate in a client-server architecture performing tasks on behalf of a client. Which server role allows users to share and distribute information over the Internet or intranet?

Attach ESD protection, open server case, replace module, close server case, baseline configuration

A server is giving a fault code indicating that a RAM chip is producing errors and should be replaced. According to best practices, which of the following is the proper sequence of steps to replace the faulty module?

Memory

A server repeatedly crashes with a BSOD when running an application that uses a high amount of system resources. Which of the following hardware components MOST likely needs to be checked by a technician?

Straight through Ethernet cable and RJ-45 connectors

A server technician has been tasked with purchasing cables and connectors for a new server room. The server room consists of one switch, two servers, and one IP telephone. Which of the following types of cables and connectors should the technician purchase?

Perform a test on the UPS batteries

A server technician in a datacenter configures a daemon to monitor the battery health in a UPS. Over a two day time period, the daemon generates a warning message. Which of the following represents the FIRST action that should be taken by the server technician?

CAT6 straight-through cable

A server technician is connecting a server to a switch in the server room. Both the server and the switch are equipped with 10 Gigabit Ethernet adapters. Which of the following cable choices would produce the BEST throughput?

Port scanner

A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access. Which of the following could validate this hypothesis?

DNS WINS

A server technician is performing a server installation. This server must be able to resolve host names for users running a variety of client operating systems. At a minimum, which of the following services should be enabled on the new server? (Select TWO).

The NIC's should be placed into a team with one MAC address

A server technician is replacing a web server in an organization. The new server has two integrated NICs. Which of the following describes how the NICs should be configured for fault protection?

Review service manuals

A server technician is tasked to replace a RAID controller battery on a server. The server technician has no prior experience replacing a RAID controller battery. Which of the following should the server technician do to obtain the required knowledge or procedures to replace the battery?

WINS

A server technician is updating the operating system on a server. Currently, the server is running the following services: DHCP WINS DNS HTTP The updated server will be used to allow clients to access Web services, resolve host names to IP addresses for mobile iOS clients, and provide network access to thin clients running a Linux operating system. Which of the following services can be removed?

TCP 22

A server technician needs to access a remote Unix server for administration. The technician has requested that ports 23, 25, and 161 be opened on the router. After the ports are opened, the technician is still unable to connect to the Unix server. Which of the following ports should be opened on the server to allow for remote administration?

CAT6 crossover cables

A server technician needs to connect two servers with gigabit NICs without MDI-X in order to transfer files between them and is unable to locate a switch with gigabit ports. Which of the following types of cables would allow the technician to connect the servers to obtain the FASTEST transfer rate possible?

The power supply cannot handle the additional power for the new cards

A server with a number of graphics cards installed was recently upgraded with additional graphics cards. Once the server is started, the system powers off unexpectedly. Prior to the upgrade, the server was stable and exhibited no odd behavior. Which of the following is the MOST likely cause of the problem?

Extended uptime

A server's runtime during power outages is too short to shut down properly. A system technician is asked to remediate the problem. Which of the following would be the result of adding additional batteries to the UPS?

MTTR

A service level agreement (SLA) is an agreement between a person or a company, and a service provider. An SLA stipulates the level of service one expects to receive from a vendor. Key performance indicators (KPIs) are used to relate to service availability. Your company supplies Internet services to consumers. You wish to establish an SLA stating your expected average time any service outage could last. Which KPI would you use to communicate the average time it takes to restore a service?

RADIUS supplicant

A smartphone is attempting to authenticate to a RADIUS server through a Wi-Fi router. The Wi-Fi router is configured with WPA2 Enterprise. What term is used to describe the smartphone?

Identify the problem and scope

A system administrator has a database server that crashes at random times. No changes have been made to either the server's software or hardware. Which of the following is the FIRST step the administrator should take towards resolving this issue?

Host

A system administrator has decided to create several VMs for a company. In which of the following locations would each of the VMs reside?

FC SAN

A system administrator has determined that more storage is needed for company data. The storage requires the highest speed data transfer rate with maximum performance. Which of the following solutions MUST be implemented to meet the business requirements?

Label the tape

A system administrator has just performed a backup. Which of the following should the administrator perform to easily identify the backup tape?

Server configuration documentation

A system administrator is asked to set up several physical file servers that have recently crashed due to a power failure. Which of the following documents should the administrator refer to in order to complete this task?

Disable physical ports

A system administrator is concerned with employees connecting removable storage to the server to copy sensitive data. Which of the following solutions addresses this concern?

Solid state drive

A system administrator is given a server with an existing OS installed and four empty SAS bays. The system administrator is asked to set up a new data drive for testing with 100GB of data. For the best possible performance, which of the following should the system administrator select for the data storage?

443

A system administrator is tasked to enable authentication on a web server's login page. One of the requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all static HTML pages. Using the information supplied, which of the following default port numbers should be used to satisfy these requirements?

Active/Passive

A system administrator is tasked to setup a database server with failover clustering feature enabled. One of the requirements is to have one database running at all times with data being synchronized and replicated to the idle database in case the primary database server fails. Both servers will be monitored by a witness on a LUN. Which of the following cluster techniques should be implemented to meet these requirements?

VLAN

A system administrator is tasked with dividing the network so that each department is separate from the other. Which of the following should be used to accomplish this task?

ipconfig/release ipconfig/renew

A system administrator is troubleshooting a network connectivity issue and runs ipconfig/all on thehost. The command returns the following: IPv4 Address: 169.254.0.12 Subnet mask: 255.255.0.0 The client is configured for DHCP. Which of the following commands should be run on the client to resolve this issue? (Select TWO).

KVM

A system administrator needs to directly control a server that has no network connectivity. Which of the following should be used to accomplish this?

TFTP

A system administrator needs to install an operating system onto a new server in a remote location using PXE. Which of the following methods will BEST accomplish this?

Incorrect media type

A system administrator needs to rebuild a server by booting to the OS DVD. The server powers up but attempts to boot from the network. Which of the following is the MOST likely source of the problem?

Service/application memory leak

A system administrator notices that a server is consistently getting slower and less responsive the longer it has been since the last reboot. Once the server is rebooted, the system performs at the expected baseline, but starts slowing down again until the system is unresponsive. Which of the following is the MOST likely cause of this problem?

Disk quota

A system administrator notices that there is a low level of available storage space on a file server. Which of the following should be implemented to limit the amount of storage space users can utilize on the file server?

ping

A system administrator wants to assure that a server is responsive. Which of the following networking tools should the administrator use to verify network connectivity?

Dynamic Host Configuration Protocol

A system technician is asked to create a test environment that will consist of 45 computers and a file server. Which of the following types of servers is BEST suited for IP management in the lab network?

Shred the hard drives.

A system technician is tasked with destroying several hard drives that contain PII. Which of the following would be the BEST method for disposing of the drives?

Update the MX record in DNS

A technician has completed the installation and configuration of a third email server. The technician has configured the firewall to permit email traffic, but the mail is only being received by the two older servers. Which of the following should the technician configure to ensure incoming email will be processed by all three servers?

fdisk -l /data/drive0

A technician has connected a previously formatted ext4 eSATA drive to a Linux server. Given the following output: Disk /dev/sdb: 1000.2 GB, 1000204886016 bytes 255 heads, 63 sectors/track, 382818 cylinders, total 1953525168 sectors Units = sectors of 1 * 512 - 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x0009f31a Device Boot Start End Blocks Id System /dev/sdb1 * 20481 953525168 976761560 83 Linux Which of the following commands should the technician use to make the partition available under /data/drive0?

IP: 192.168.55.5, NETMASK 255.255.255.128

A technician has finished installing the operating system on a new server and needs to provide IP addressing information. The server will be connected to the DMZ network. Devices on the network use a default gateway address of 192.168.55.1. Which of the following is a valid IP address for a server in the DMZ network?

Hot site

A technician has traveled to a company's alternate site to assess current operations of the network infrastructure. Following the assessment, the technician has informed management that everything is operational, with all applications and data mirrored. Which of the following types of site does the company have?

Bus type and speed

A technician is asked to install an additional NIC in a server. Which of the following hardware considerations would be BEST for the technician to make?

LEDs LCD messages

A technician is asked to troubleshoot a hardware alert on a server. The server is up and running and all users can access their data. Which of the following could the technician use to find the failed component? (Select TWO).

Cooling failure

A technician is asked to troubleshoot a server that constantly reboots. There are no error messages displayed on the server. Which of the following should the technician check?

RAID 10

A technician is assigned a task to configure a new server with six hard drives. The senior administrator requested the technician utilize the drives for maximum fault tolerance. Which of the following RAID configurations should the technician use?

FAT32

A technician is backing up 10 GB of data on a file server to a 250 GB external USB hard drive. After 4 GB has been backed up, the software generates an error that the size of the backup exceeds the file limit. Which of the following file system types is being used?

Seek time

A technician is called upon to add storage to a database server. The database administrator needs the maximum performance for accessing many small files. Which of the following specifications should the technician focus on when selecting the drive to add to the server?

Some of the cooling fans are defective

A technician is experiencing overheating on a rack mounted server. After powering off and removing the cover of the server, a large amount of dust is noticed on one of the fans. After cleaning out the dust and powering the server back on, the server is still overheating. Which of the following would BEST explain this issue?

3.5 inches (.089 meter).

A technician is installing a 2U rack mount server. The necessary rack space height to accommodate the server is:

limit airflow leakage in the rack.

A technician is installing a rack mounted server into a rack in a datacenter with CRAC units and blanking panels. Blanking panels are used to:

Two disks RAID1, four disks RAID5

A technician is installing a server using a two-channel RAID controller, using RAID1 for the first channel and RAID5 for the second channel. If the technician has six 1TB disks total, how will this configuration look?

Reconfigure the boot order

A technician is installing an operating system on a server using source files on a USB storage device. The technician is unable to boot to the USB device using different USB ports on the server. Which of the following should the technician do to ensure that the operating system can be installed from the USB storage?

Static IP address

A technician is replacing a faulty NIC in a server. According to best practices, which of the following should be used to configure the IP address on the server?

Snapshot

A technician is tasked by an administrator to patch a virtual machine. The technician needs to ensure that in case of failure, recovery of the virtual machine will be possible. Which of the following recovery principles should the technician employ?

SSD

A technician is tasked to build a server requiring the fastest possible performance. Which of the following would achieve this requirement?

SAS

A technician is tasked with building a test server. Which of the following hard drive types will provide the highest performance?

Ethernet

A technician is tasked with connecting a server to a NAS. Which of the following connection types should be used?

0

A technician is tasked with creating a test system containing non-critical data. The technician has limited hardware, but needs maximum performance. Which of the following RAID levels should the technician use?

Clustering

A technician is tasked with creating servers that are fault tolerant and highly available. Which of the following would be the BEST solution for this task?

One physical NIC per server: each individual NIC configured for network load balancing.

A technician is tasked with providing network-based high availability to a pair of identical web servers. Which of the following minimum server NIC configurations fulfills these requirements?

df

A technician is troubleshooting a Linux server and wants to inspect the free disk space on the /dev/sda partition of the system. Which of the following command line tools should the administrator run to view available disk space on the partition?

Incorrect default gateway

A technician is troubleshooting an issue with a new server, which is unable to download OS patches from the Internet. The technician reviews the following configuration: Ethernet Adapter Local Area Connection: Connection-specific DNS Suffix . : comptia.org Link-local IPv6 Address . . . . : fe80::c95:3f59:1a01:c050%11 IPv4 Address . . . . . . . . . . : 192.168.10.20 Subnet Mask . . . . . . . . . . : 255.255.255.128 Default Gateway . . . . . . . . : 192.168.10.129 Which of the following is the reason that the server is unable to connect to the Internet?

The server requires fully buffered memory

A technician is upgrading the memory in a server. The server requires DDR3 Registered DIMMs. The server has four banks of three slots for memory and currently there is one 2GB module in each bank. When the technician attempts to add eight more 4GB modules of DDR3 unbuffered ECC memory, the memory does not fit in the slots. Which of the following is the cause of this issue?

Establish a new theory of probable cause

A technician is working on a server that is experiencing network connectivity issues. The technician replaces the NIC on the server, but this does not resolve the issue. Which of the following troubleshooting steps should the technician do NEXT?

Processor speed Socket type Processor stepping

A technician needs to add a processor to a server. Which of the following specifications should the technician examine? (Select THREE).

Follow change management procedures.

A technician needs to install additional memory in a server to help resolve performance issues. Which of the following should the technician do FIRST?

Snapshot

A technician needs to install an operating system patch on a virtual server. Which of the following backup types should the technician perform prior to the patch installation that will allow the server to be restored the FASTEST?

Blade enclosure

A technician needs to install six blade servers. Which of the following MUST a technician install along with the blades?

count the beeps and reference the service manual.

A technician notices a rack mounted server is beeping without booting up. The NEXT step to diagnose this issue would be to:

9

A technician performs monthly backups on a file server to a NAS device that can hold 1TB of data. The size of the monthly backups has been as follows: Month 1 = 50GB Month 2 = 65GB Month 3 = 80GB Starting with Month 1, based on the current rate of growth, in how many months will the NAS run out of available storage space?

Download the firmware update and test it on a non-production server

A technician reads a hardware manufacturer's blog indicating a critical firmware update is available for the company's file server. Which of the following is the BEST course of action?

Notify impacted users of the scheduled maintenance.

A technician troubleshooting a mail server determines that the server is low on available hard drive space and needs an additional hard drive installed. The server will need to be offline for the hardware installation. Which of the following troubleshooting steps should the technician do NEXT?

Assign a different set of tapes for daily, weekly, and monthly backups.

A technician wants to implement a grandfather-father-son tape rotation policy. Which of the following implements this backup strategy?

Install blanking panels in the rack

A technician working in the datacenter has finished racking a new 4U server into a new rack. Which of the following should the technician do to allow for hot/cold aisle containment?

Chassis lock

A technician would like to restrict when internal hardware components on the server are accessed. Which of the following server hardening techniques should the technician implement?

Verify that the correct tape is in the tape drive.

A user accidentally deleted a critical file. A technician tries to restore it from tape backup but receives an error that the file does not exist on the tape. Which of the following should the technician do FIRST?

File permissions

A user changed departments from sales to accounting. The user is unable to access the shared network drive containing the accounting department's files. Which of the following should a technician check?

Check whether the print spooler service has started

A user in the accounting department reports that print jobs are not printing. A user in the software development department also cannot print to the same printer, but can print to two other printers on different print servers. Which of the following should be the administrator's FIRST step?

The user's disk quota has been exceeded on the U:\drive.

A user is unable to save a new presentation to the network U:\ drive. The error message indicates that there is no available space. Other users in the department are not experiencing any problems saving to the U:\ drive. Which of the following is the MOST likely cause of this issue?

The user is attempting to save a file with a prohibited file extension

A user is unable to save an image file to their home directory on a server. The server technician checks the disk space and ACL on the user's home directory and finds that the user has enough space and required access to write to the directory. Which of the following is the MOST likely reason why the user is unable to save the file?

Ping the server

A user reports that a script \\Server\Share\Runme.bat, which is run on a daily basis, cannot be accessed. Which of the following is the FIRST step to take in resolving this issue?

Incorrect DNS server

A user station statically configured with IPv4 cannot download Group Policy settings; the error message states that a domain controller could not be found. The station can communicate with other local and remote hosts. Prior to the change from DHCP to static configuration, Group Policy worked. What is the most likely cause of the problem?

Multifactor authentication

An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?

30 minutes

An administrator has a UPS rated at 200 amps per hour. Which of the following is the maximum runtime of this UPS when hooked up to a server drawing 400 amps per hour?

The backplane of the enclosure is faulty

An administrator has been tasked with consolidating six individual servers into one blade enclosure. The administrator completed the task successfully. A week later, all of the blades would not boot properly. Which of the following would MOST likely be causing this issue?

SATA

An administrator has been tasked with making recommendations for purchasing new disks for a low I/O file server. Keeping in mind that budget and capacity are the primary concerns, which the following disk types should the administrator recommend?

RDP

An administrator is asked to change a configuration using a GUI on a Windows server, but does not have access to a KVM. Which of the following is BEST to make the change?

Use the company firewall to block all ports that are not used by the application

An administrator is building a web server to host an online banking application. The server should not have access to the internal network, and only ports that are used by the application should be opened. Which of the following MUST be implemented to meet the business requirements?

Disk quotas

An administrator is developing a storage growth plan for a new file server. Which of the following should be implemented on the server so that storage growth is restricted?

443

An administrator is securing a secure web server by disabling ports. After completing this process, clients cannot access the secure web server. The administrator should now go back and verify whether which of the following ports is enabled?

-48VDC

An administrator is tasked with deploying a server in a telephone switching station. Which of the following voltages will MOST likely be available at the facility?

Cold site

An administrator is updating the server infrastructure at a company's disaster recovery site. Currently, an enormous amount of effort is required by the administrator to replicate operations. Which of the following types of site is the administrator currently using?

Backup verification and test restorability

An administrator is validating disaster recovery mechanisms and wants to ensure backup data is usable and accurate. Which of the following should the administrator do?

KVM

An administrator needs to control servers locally via a console. The administrator wants a rack mounted solution for easy access. Which of the following should be installed?

Intranet for users and extranet for customers

An administrator needs to create two websites. One website must only be used by internal users and the other website must be a corporate website accessible externally by customers. Which of the following website types is needed?

Use PXE boot to retrieve an image.

An administrator needs to deploy 1000 servers in a short period of time. Which of the following deployment methods will expedite the OS installations?

Full

An administrator needs to perform a backup of all servers for an upcoming disaster recovery exercise at a company cold site. Which of the following types of backup should be performed?

Connect with SSH Connect with VNC

An administrator needs to reconfigure a Linux server's operating system. Which of the following tools can the administrator use to access a command shell over the network? (Select TWO).

Replace the failed drive and restore the data from the last backup.

An administrator sees a message in the system console that a drive is bad in the single-volume JBOD storage array. A few minutes later, a user calls the help desk to report an inability to read a file from a mapped drive. Which of the following should the administrator do?

Deny access if limit is reached

An administrator was tasked to enforce disk quotas on the Windows file server. The administrator allocated 1GB of space to each user. A month later, the users were still able to save beyond 1GB. Which of the following check boxes should have been selected?

the host must be reachable via the IP address.

An administrator wishes to use KVM remotely to monitor and control a server farm. In order to perform this function:

get-services sc query netstat

An administrator would like to determine what port and services are running locally on a server. Which of the following Windows command lines and shell tools should the administrator use?

lsof netstat

An email administrator is tasked to setup a Linux mail server. One of the requirements is to close all ports except SSH, HTTPS, SMTP, POP3, and IMAP4. Which of the following commands should be used to see which ports are currently open on the mail server? (Select TWO).

Battery backed cache

An emergency power off accidentally occurs in a datacenter during a fire alarm test. On recovery, the server administrator notices that an external storage array is performing consistency checks on all the volumes configured in the array. Which of the following components of the storage array has MOST likely failed or faulted?

Hot

An important aspect of recovering from a disaster is to plan for the restoration of services in the event of a large-scale service loss. A company may lease or purchase a facility to be used as an alternative site for the purpose of service recovery. Which type of site provides network connectivity, hardware, and software to support minimal service down time in the event of a large-scale service loss?

The cache battery

An older server has performance problems writing files to a RAID array. After checking for failed drives, no problems are found. Which of the following should be checked NEXT?

The vendor's hardware compatibility list

An organization has agreed on the software that will be used to virtualize the company's web servers. Which of the following should the administrator reference prior to purchasing physical servers to be deployed as hosts in the new virtual architecture?

Failover clustering

What type of configuration redirects users from a failed server to another running instance of a network service?

MPPE

What type of encryption does PPTP use?

Ransomware

What type of malware encrypts data files and demands payment before providing a decryption key?

Hostname IP address

As a best practice, which of the following should be determined prior to provisioning a server? (Select TWO).

Service documents

Asset management allows you to integrate the physical, technological, contractual, and financial aspects of your server infrastructure. Proper asset management allows a company to reduce operating costs and improve IT services. Which form of asset management provides best practices information?

Layer 2

At what layer of the OSI model are devices in different VLANs separated?

Bare metal

Backing up your server's information is an important part of operating a successful organization. There are many ways in which backups can be performed, some using different media and different techniques. You need to be able to restore an entire system image to a formatted disk partition. Which type of backup should you use?

PCIe

By installing expansion cards into appropriate slots on a motherboard, you can expand the functionality of your server. An expansion card must be matched to an available slot of the appropriate size and number of connectors. You purchase a sound card with an 18-pin count to add to your server for audio alarms. Which expansion slot will you use for the card?

Twice

DDR3 memory is _______ as fast as DDR2.

Plenum cables

Employees working for a company were harmed by toxic fumes during a fire. To prevent this from reoccurring, which of the following cable types is SAFEST to use?

Wrist strap

Grounding is important for proper ESD control in your IT environment. Proper ESD control will protect you and your equipment from damage caused by electrostatic discharge. You find it necessary to replace the hard drive in one of your servers. Which form of ESD control should you implement to prevent a static discharge between you and the server case?

The company's MTTR is ten hours

Historical data shows that on average, a server is likely to fail once every nine months. A company has purchased 24x7, four hour hardware response to replace a server's failed hardware. Additionally, the company can restore a server to its operational status within six hours from the time the failed hardware has been replaced. Which of the following describes this scenario?

Ensuring that objects coming into contact with one another have equal charges

How can ESD be reduced?

1.75 inches

How large is each U in a rack?

1.5 times the size of RAM

How large should the pagefile be on a Windows server that is not a database server?

Short bursts.

How should you use compressed air inside the case?

ReFS NTFS

Identify the Windows supported file systems. Choose two.

111.8 GB

If a hard drive has 120 GB as calculated using the Base 10 number system, what will be the capacity reported by Windows?

500 MB

If three 250 MB disks are present in a RAID 5 array, how much space is actually usable for data?

/var/log/messages

In Linux the log file that contains general and system-related messages like any you would be interested in for storage issues is located where?

Missing GRUB

In Linux, which of the following can cause an inability to locate the operating system?

Root CA

In a PKI, which of the following represents the top level of a certificate authority?

Modify

In a Windows environment, a user is able to access the network folder and open items, but is not able to delete anything. Which of the following folder permissions does the user require?

Dism /Append-Image /ImageFile:Z:\win10_images.wim /CaptureDir:C:\ /Name:win10_sales

In an attempt to save disk space, Sean wants to store multiple Windows Server 2012 images in a single .WIM file. Which command should Sean use?

Bare metal

In an effort to reduce recovery time during hardware failures, a server administrator needs to implement a backup method that will allow for complete OS and service/application recovery as long as compatible hardware is available. Which of the following backup types meets this requirement?

Token

In authentication, which of the following represents something you have?

80 443

In order for a server to fully function as a web server, which of the following default ports should be open? (Select TWO).

Stateful firewall

In which of the following devices are records kept using a table that tracks every communications channel?

NAS

In which of the following is the storage natively reachable through a TCP/IP network?

Linux

In which operating system is iptables used?

DAS

In which storage technology are all storages devices attached locally?

143

Internet socket port numbers are used by protocols of the Transport Layer of the Internet Protocol Suite to establish connectivity between two hosts. The Internet Assigned Numbers Authority (IANA) maintains the official port assignments, many of which coincide with TCP and UDP services. Which port number is reserved for the Internet Message Access Protocol (IMAP)?

Misconfigured firewall rules

It is important to ensure proper data security procedures are implemented in your server environment. Taking proper precautions are necessary to keep sensitive information safe. You have noticed that some of your employees are using their work computers to remotely access their home PCs. Which form of security issue would allow this to occur?

Humidity

It is important to locate your server in the appropriate environment with the proper conditions. Doing so will help reduce the risk of failure and increase the operation life span of the equipment. You need to make sure that your server components are free from condensation that will cause corrosion. Which aspect of environmental control is being referenced?

A number of print jobs are located within the print server's print queue; however, no print jobs are printing

Many companies have contracts established with the printer manufacture, or a third party, to resolve printing issues when they arise. However, it is still important for IT administrators to have a general knowledge of how to troubleshoot common day-to-day printing issues. What would signify that the print spooler service needs to be restarted?

Disk failure

Most hardware problems can be traced to a single component in your server. You may need to diagnose the problem by analyzing and understanding the symptoms if the root cause of a problem is not obvious. Which hardware problem can you troubleshoot by confirming the boot up sequence in the BIOS settings?

Checksum

Multiple users report that an application attempting to open a file retrieved from a server reports that the file is corrupted. Which of the following applications can be used on the server to verify file integrity?

Modify

NTFS folder and file permissions can be assigned to server resources to restrict local access by specific users and groups. If the resource is shared, share permissions, combined with the assigned NTFS permissions can be used to protect the resources when accessed over the network. Which NTFS permission will allow you to delete a folder?

Failed RAID 5 disk

One of your servers, FS1, is configured with a RAID 5 array. The server has 2TB of free disk space and overall CPU and memory utilization is hovering at 40 percent. Over the last hour, file reads from FS1 have been very slow. What is the most likely cause of the performance issue?

LC

Optical fiber connectors are used to terminate the ends of fiber optic cables, allowing for ease of connection and disconnection. Connectors mechanically couple and align the fibre cores allowing light to pass through undisturbed. You need to use small form-factor pluggable (SFP) transceivers for your communications applications that are using an SFP module. Which fiber connector will you use to accomplish this?

TACACS+

Organizations can support numerous users and remote and wireless access technologies and devices. All remote devices need to be configured with authentication information, and the information must be synchronized between the client and the server. Which authentication protocol uses TCP port 49 for remote authentication?

Resource overload

Patch management is the process of identifying, acquiring, installing, and verifying patches for specific products or systems. Patch management is used to eliminate the risk of exploitation of IT vulnerabilities, and to improve a product. You wish to stagger a patch delivery to the servers on your network. Which aspect of patch management is this process associated?

Memory utilization

Performance monitoring offers real-time information regarding your server's system resource utilization. You suspect that once you close a program on your server it is not completely releasing resources. You decide to monitor your server's resources to investigate the problem. Which resource utilization should you monitor to help isolate the issue?

CPU

Proper allocation of virtual components between the host machine and the virtual guest machine will give balance to your server implementations. Proper resource allocation will optimize your server's ability to process requests. Which resource allows you to set an allocation reserve and limit for a particular virtual server?

DDR SDRAM

RAM is a relatively inexpensive way to upgrade your server system. You can accomplish this by either replacing the currently installed RAM, or by adding additional RAM to any open slots available. You would like to add more RAM to a server. To do so, you must confirm the correct RAM type. You notice that the RAM slot has 184 pins. Which RAM type will you add to your server?

Round robin load balancing

Redundancy is technology that is important in providing high availability and fault tolerance to server resources. Fault tolerance is critical to ensuring business continuity to your clients. You would like to make several servers available to your clients by employing an IP address rotation solution. Which server technology would you use?

Overheating

Replacing slots covers helps to prevent which event?

Rogue processes

Several of the finance department computers are experiencing timeouts while in their financial program. The program will not open or close; however, the previous day the program was running without issues. Which of the following is MOST likely the cause of this problem?

Configure failover clustering using Server A and a new server.

Server A hosts a mission-critical business application. The server has one disk and one NIC. The administrator has been asked to implement a solution to meet the business requirement that the application must maintain high availability, even in case of a hardware failure. Which of the following BEST meets this requirement?

Install latest patches

Server hardening involves making the server's operating system less vulnerable to outside threats. You need to apply operating system hardening to your new network server. Which form of operating system hardening should first be tested in a controlled environment?

DNS

Servers are responsible for specific functions in your network. Servers provide services, which allow for ease of communication and connectivity among hosts. Which server role is responsible for translating fully qualified domain names (FQDNs) to IP addresses?

Grant the Manager group modify permission to the budgets folder.

Stacey needs access to budget files stored on a file server in a folder called Budgets. She is a member of the Managers group. The Managers group has been allowed read, read & execute, list folder contents, and write permissions. Stacey complains that she receives an "Access denied" message when she tries to delete budget files. What should you do?

Quotas

Storage capacity management includes ensuring that the space you need to accommodate your files and data does not run out. There are several technologies that can influence capacity management. You find that your company's mail server is getting close to capacity due to employees not routinely cleaning out their inboxes. You wish to implement a system to inform employees when their inboxes are reaching capacity. Which capacity management tool will you use?

SSD

Storage media holds common data, and the system files needed for operation. There are several types of storage media which vary on capacity, physical type, and cost. Flash memory is a type of storage media which takes many forms. Which type of storage device uses flash memory, and replaces magnetic hard disks within a host as the main source of data storage?

CIFS

The IT director instructed the systems administrator to build a server to support the accounting department's file growth. The IT director requested that the accounting users have the ability to encrypt their files; however, the accounting users have reported the inability to encrypt their files. Which of the following file system types is MOST likely causing this issue?

100 full

The automatic link negotiation process between networked devices determines the manner in which information is sent and received. One of your employees complains that when they are connected to the network with their laptop, as opposed to their desktop, they experience latency. You examine the NIC settings on their laptop. Which duplex setting should the NIC card have to improve performance?

Rack-mounted

The form factor of a server refers to the type of chassis it uses. The size, shape, and packaging of the server hardware can depend on its intended implementation. Which server form factor allows for servers to be stacked vertically saving space?

A power surge occurred

The logs on a server in a datacenter indicate that the server unexpectedly shut down minutes after the night cleaning crew started their shift. Which of the following is the MOST likely reason for the shut down?

NAS

The proper form of network storage is determined by the needs of the organization. Data can be stored on the local machine, attached to the network, or connected to a host. Which storage technology appears to the user's operating system as a file server?

hot site.

The shortest time to recovery method in the event of a complete datacenter failure is to utilize a:

SSH

There are a number of tools and protocols available to allow for the ease of remote server administration. Remote administration can occur over a LAN or a WAN connection. The method of remote administration you choose can depend on many factors, such as security and resource availability. You wish to create a secure remote connection to a router for configuration changes. Which form of remote administration uses a secure connection over TCP port 22?

Tracert

There are many utilities available to troubleshoot issues with TCP/IP connectivity. These utilities provide basic functionality that proves to be invaluable when troubleshooting connectivity issues. You are unable to connect to a remote sever located in another city. You want to identify the last router in the path, before the failure, that is functioning properly. Which network utility will you use?

Checksum

There are several tools available that can be used to perform security assessments on your network. Implementing the proper tool will help ensure your network runs efficiently, by identifying potential issues. You need to confirm data integrity as it is transmitted between a client and a server. Which security tool should you use to accomplish this?

SSD

There are several types of hard drives available for use in a server. The type of hard drive you choose may depend on cost or required performance level. You use a server for a central data repository over a secure network. You wish to upgrade your server's hard drive to enhance performance and storage capacity. You determine that cost is not an issue. Which hard drive type offers the best read and write performance?

SCSI

There is no single universal storage device interface. Different interfaces have different capabilities. You must be aware of the different interfaces and their capabilities when choosing the proper storage interface that you wish to implement. You have a storage device with a slow bus speed that you wish to connect to your server. Which storage device interface would you use?

Differential

To maintain and ensure that all users have access to their data, it is important to perform regular backups. There are several backup types you can choose from, depending on your business needs. To save time and storage space, you need to backup only the data that has been changed since the previous full backup. Which backup type should you use?

Backplane

To which component do drives abut and make a connection with the server so no cables are required?

Read

Trinity is a member of the Executives group, which has been granted the read permission to a shared folder called Expenses. Trinity is also a member of the Site A group, which has been granted the NTFS read and write permissions to the Expenses folder. What permissions will Trinity have to a file in the Expenses folder?

True

True/False: DDR doubles the rate by accessing the memory module twice per clock cycle

CAT5e

Twisted pair cabling was developed because of the need to improve upon the limitations associated with coaxial cabling. Unshielded twisted pair (UTP) cabling is the most common type of Ethernet cable used for computer networks, consisting of four pairs of insulated copper wires. What type of UTP cabling can support maximum speeds of up to 1,000 Mbps?

RAID 6 has the ability to recover from two disks simultaneously failing.

Two RAID arrays are created from eight disks. One is created using RAID 6, the other is created using RAID 5 with a hot spare. Which of the following is the operational difference between these configurations?

uninstall the newly installed applications one at a time.

Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to:

Which of the following is the MOST redundant power solution?

Two power supplies, each hooked up to separate 1-phase circuits.

active/active.

Two servers are to be configured for high availability in a cluster. Both servers will be running applications at the same time. This feature is know as:

A server lift.

Two technicians are asked to install a 6U server at location U25 in a 40U server rack. The rack has been properly stabilized to the floor. Which of the following tools would BEST be used to install the server?

6

What is the latest version of an LTO drive?

3000 volts

What is the lowest static voltage one can feel?

Overheating

Users complain that a database server has slowed down over the last hour despite the fact that no more users have connected. You run an antimalware scan, which comes up clean. The amount of network traffic has not changed. You reboot the server and the problem still persists. What is the most likely cause of the problem?

Incorrect NTFS group permissions

Users in the accounting department report that they are unable to access a shared network drive used by all departments. Upon troubleshooting, a technician determines that three users in the marketing department, two in sales, five in human resources, and ten in IT are all successfully accessing the shared network drive. Which of the following is MOST likely causing the issue?

Change the IP address on the server to 10.10.10.254.

Users on a network segment report that they are unable to connect to a newly installed file server. The file server IP address settings are as follows: IP address: 10.0.10.254 Subnet Mask: 255.255.255.0 Default Gateway: 10.10.10.1 Which of the following changes should the server administrator make?

netstat

Users on multiple network segments report that they are unable to retrieve email from a server. Which of the following commands will allow a server technician to ensure that the email service is running on the server?

The application is using a port that is closed on the server.

Users report that an application is unable to connect to a server on the same network segment. Which of the following is the MOST likely reason?

Test restorability

Using proper backup and restore methods will help ensure business continuity in case of a disaster. You must confirm that you are able to extract data from a set of old backup tapes if necessary. Which backup and restore best practice method will you implement?

WINS

Using the proper IP configuration method will allow for communication over a network. You wish to connect several workstations and a server together in a network environment. You also want to use NetBIOS name to IP address resolution to allow for communication within the network. Which type of IP configuration should you employ?

DTP

Using which of the following protocols can expose your switches to a switch spoofing attack?

T568A and T568B

Using which pair of configurations will result in a crossover cable?

RDP

What Microsoft technology allows you to connect to remote computers and run programs on them?

WDS

What Windows tool can be used to create and deploy images?

Stepping levels

What are revisions in CPUs called?

Dual-drive Solid-state

What are the two implementations of hybrid drives?

The network name

What are you hiding when you disable SSID broadcast?

ESD

What can be the result of low humidity?

arp -d

What command allows you to determine the MAC address of the computer with which you are experiencing a conflict after pinging the IP address?

badblocks

What command can be used in Linux to detect bad sectors?

fsck -a /dev/dda

What command can be used to attempt a repair of the dda drive in Linux?

show ip route

What command is used on a router to identify the routes of which the router is aware?

net use

What command is used to connect users to shared drives?

Number of users assigned to the printer

What drives the amount of memory for a print server?

Archive

What file attribute is used to communicate to the backup system whether a particular file has changed since the last backup?

ifcfg-eth6

What file do you edit in Linux to configure the Ethernet 6 interface to be used in a NIC team?

fstab

What file is used by Linux to mount partitions on boot?

IOPS

What is a common disk metric that describes how fast the disk subsystem is able to read and write to the drive?

32-74 degrees

What is a safe temperature range for tape media?

Tape library

What is a storage device that contains multiple tape drives?

Pagefile

What is another term for a swap file?

False positives

What is one possible drawback of heuristic host and network analysis?

1

What is the code number of a destination unreachable message when it indicates the destination host is unreachable?

For integrity verification

What is the purpose of creating a backup using checksums?

Replace the motherboard.

What is typically the solution if an integrated component does badly?

50 percent

What should the humidity be in the server room?

Installing different size modules in the same bank will result in the modules operating in single-channel mode.

What statement is true with regard to dual-channel memory?

Blade technology

What technology consists of a server chassis housing multiple thin, modular circuit boards, each of which acts as a server?

Multiplier

What term describes the relationship between the internal speed of the CPU and the speed of the system bus?

System time

What term describes the time the CPU was executing in kernel mode?

Performance Monitor

What tool is used in Windows Server 2012 R2 to create a baseline?

L1

What type of CPU cache holds data that is waiting to enter the CPU?

Active

What type of terminator is used with SCSI drives operating in LVD mode?

Dell

What vendor creates iDRAC cards?

Tape media

When troubleshooting a failed backup, a technician runs the backup using the same tape but on a different tape drive in the same tape library. The backup fails again. Which of the following should be the FIRST item the technician should examine as a failure?

kill

Which Linux command can be used to terminate a rogue process?

Heat sink

When a server component draws power, a portion of that power is turned into work while a large amount is turned into heat. The heat that comes from the components is known as thermal dissipation. To avoid server component malfunction, excessive heat must be removed from the system. Which passive cooling method is used to cool a CPU?

Dataflow diagrams

When attempting to diagnose service access issues between multiple hosts that coordinate information, which of the following can be used to track dependencies?

0.67

When determining the critical load of all devices, by what value should you multiply the total wattage listed on each device?

Authentication server

When discussing 802.1x, which of the following roles is played by the RADIUS server?

Endpoint

When discussing security, which of the following is defined as any point of entry into the network?

When an unqualified hostname is encountered

When does a device use a DNS suffix search list?

Subnet mask

When implementing CIDR, what configuration setting is manipulated to size the subnet as desired?

Disk duplexing

When looking at an organization's file server configuration, an IT manager determines that several outages are tied to a lack of redundancy in the disk controller configuration. Which of the following features would the IT manager look for in a new configuration to correct this?

NTFS

When preparing a system for a server role, you must determine the file system that will be applied to the hard disk drive. File systems determine the file size and partition size, and are often specific to vendors and developers. Which file system would you apply to a Microsoft Windows Server 2008 R2 server to support file sizes of 16 TBs?

Disk duplexing

When separate controller cards are used for each disk, what is it called?

From a local device to a local device

When the default gateway address is incorrect on the router, which connections will succeed?

L3 cache

When the processor in your server needs quick predetermined information, it relies on cache memory. Cache memory uses a special type of memory chip that can be either internal or external to the processor itself. You wish to upgrade your server to a multi-core processor configuration. You want to ensure that the processor has cache memory that is shared by all the cores in the processor. Which level of cache is also known as shared cache, and is most often shared by all the cores in a processor?

chmod

Which Linux command is used to set file system permissions?

Implement a solution and verify functionality

When troubleshooting an issue in your server environment, you begin by identifying the problem. You can begin to solve the problem once you have identified the issue, its scope, and the affected users. Which step in the problem solving methodology includes confirming whether a component is properly configured and updated?

Error codes

When troubleshooting issues with a server, there are many visual indicators that can help you find the problem. You are experiencing issues booting up your server. You look for indicators to help determine the issue. Which visual system health indicator should you review?

Collect the documentation

When troubleshooting server issues, it is best to work methodically to ensure that you isolate the issue and properly resolve the problem. The first step in the troubleshooting process is to identify the problem and its scope. Which of the following steps is performed while identifying the problem and involves viewing the system logs?

DNS issue

When troubleshooting your server environment, it is important to be able to diagnose the issue and implement the proper tools to resolve it. Several employees complain that they are unable to browse the Internet. You confirm that while they can browse by using the IP address of a web server, they cannot connect to the web server using its name. Which issue is most likely the cause?

An ID card

When using multifactor authentication, which of the following represents "something you have"?

Latency

When you are choosing a hard drive for your server, there are several factors you must consider. These factors can include latency, seek time, rotation speed, and buffer size. You are planning to upgrade the disk drives on all your servers. You want to choose a hard disk that has the ability to locate the disk sector where the data is located on the disk in an efficient matter. Which disk specification is directly associated with sector location?

On the hard drive

Where is the swap file located?

ARM

Which CPU architecture was designed for a tablet?

Smart card

Which authentication mechanism is an example of something you have?

Tape

Which backup media type provides linear access to the data?

Differential Copy

Which backup method does not clear the archive bit? (Choose two.)

Incremental

Which backup type takes the longest to restore?

sfc/scannow

Which command ensures the system files are all intact?

CAT 6

Which is the category of cable required for 10 Gbps transmissions?

Intranet

Which is the only security zone in which PII should be located?

Network links Power

Which items would be available at a warm site? Choose two.

Server to server

Which method has the biggest impact on the performance of the host being replicated?

NFC

Which modern short-distance wireless standard is used for payment cards and terminals?

AH

Which of the following IPsec components provides authentication and integrity only?

10000

Which of the following RPMs will provide the fastest access speed when discussing hard disk drives?

Running Disk Cleanup

Which of the following actions can empty temporary directories?

Perform a backup

Which of the following actions should be taken before making changes during troubleshooting?

127.0.0.1

Which of the following addresses is used to test the functionality of the NIC?

WOL

Which of the following allows a device to be started up from the network by sending a special packet to the NIC?

Soft reboot

Which of the following allows the proper shutdown of all running applications and services?

Bridging

Which of the following allows virtual machines to share the NIC of the host?

Differential

Which of the following always requires exactly two tapes to restore?

Zones

Which of the following are divisions of storage created for performance and/or security reasons?

High bandwidth Higher RPM drives Load balancing

Which of the following are required characteristics of database servers in high transaction environments? (Select THREE).

Drivers

Which of the following are the software stubs that allow devices to communicate with the operating system?

IP address Switch port

Which of the following are valid methods of configuring VLANs? Choose two.

Copy-on-write

Which snapshot type is taken every time a user enters data or changes data and it only includes the changed data?

Broadcast

Which software communication method is not used with IPv6?

802.1x

Which standard describes centralized port-based access control?

It has a slower startup time than BIOS.

Which statement is false with regard to UEFI?

It performs hostname name resolution on behalf of WINS clients.

Which statement is false with regard to WINS?

All rules in the list are considered before the traffic is allowed.

Which statement is false with respect to router ACLs?

A Type II hypervisor runs within a conventional operating system environment.

Which statement is true with respect to hypervisors?

Shares

Which technique is used to allocate relative access to the CPU among VMs?

iLO

Which technology is found on HP servers?

Social engineering

Which term is used to describe the act of tricking people into divulging sensitive information?

Form factor

Which term refers to the size, appearance, or dimensions of a server?

Multimeter

Which tool should be used to test server power supplies?

Perform root cause analysis.

Which troubleshooting item focuses on how and why a problem occurred?

Implement the solution

Which troubleshooting step involves making only a single change at a time?

Identify the problem.

Which troubleshooting step involves questioning stakeholders?

Identify the problem.

Which troubleshooting step involves reproducing the problem?

Auto-MDIX

Which type of NIC detects the type of device on the other end and changes the use of the wire pairs accordingly?

MAC flooding attack

Which type of VLAN attack overloads switch MAC table memory?

Differential

Which type of backup does not clear the archive bit?

Full

Which type of backup takes the longest?

Cold

Which type of disaster recovery site provides a facility with power and communications links only?

KVM over IP

While performing routine testing of a hot standby site located at a remote hosting center, a system administrator is unable to access one of the server operating systems to verify functionality. Which of the following is MOST applicable to access the host?

BIA

With the possibility of natural and human disasters, the need for business continuity planning is an important part of any successful organization. A properly implemented continuity program allows for quick resumption of operations following a disaster. Which continuity of operations component includes a detailed inventory of the primary processes, systems, assets, people and suppliers that are associated with an organization's principle business activities?

Soft quotas

You are a Linux server administrator. To plan future disk space requirements, you would like to track user disk space consumption. What should you configure?

User Account Control

You are an Active Directory domain administrator. You attempt to install a server application on a domain-joined server. When you attempt to run the installer, nothing happens. What is the likely cause of the problem?

6

You do a full backup every Saturday at 1 a.m. and an incremental backup every other day of the week at 1 a.m. A drive failure occurs on Thursday afternoon at 5:30. How many backup tapes do you need to restore?

1000 GB

You have four 500 GB disks in a RAID 10 array. How much space is available for data?

route print

You have manually configured a route to a remote network on your Windows server. Which command will show this newly added route?

1500 MB

You have three drives that have capacities of 500 MB, 750 MB, and 1000 MB. Setting the cost of parity information aside, what is the total capacity of the array?

Data link

You have two devices that are connected to the same switch with IP addresses in the same network. After placing the two devices in separate VLANs, they can no longer ping one another. At what layer of the OSI model are the VLANs providing separation?

DHCP reservation

You need to configure DHCP to deliver a specific IP address to a specific network printer. What should you configure?

Configure RAID 6.

You need to prevent a dual disk failure from bringing down a RAID 5 array. What should you do?

The local router

You receive a destination unreachable message with no source IP address. Where is it coming from?

The drive is not formatted.

You receive the error message "Data error (cyclical redundancy check)" when attempting to access a logical drive. Which of the following is not a possible cause of this message?

Add disks to the server. Configure RAID 0 and create a file system. Move the existing data to the newly created filesystem.

You would like to improve disk I/O performance for data residing on a physical server. In accordance with your organizational policy, a server must remain running even if an operating system disk fails. The server is currently configured with RAID 1 for the operating system and data. What should you configure?

Smartcard, PIN

Your VPN requires multifactor authentication. Which of the following solutions should you use?

USB PXE

Your company uses an image to repair failed servers. Optical drives are disabled in all server UEFI settings. Which options can be used to boot and apply images? Choose two.

Layer 2

Your firewall can filter traffic based on MAC addresses. Which term correctly identifies your firewall?

Layer 4

Your firewall can filter traffic based on UDP and TCP port numbers. Which term correctly identifies your firewall?

Layer 7

Your firewall can filter traffic based on the contents of packet payloads. Which term correctly identifies your firewall?

Configure user claims with identify federation, and configure the web apps to trust the identity provider.

Your network consists of multiple web applications. To connect to each application, a user e-mail address and date of birth are required. What should you do?

Configure a new VLAN for the accounting department computers.

Your network uses four Ethernet switches linked together to interconnect 80 computers. Ten of the computers are used by the accounting department and are configured with IPSec. Accounting department computers do not need to communicate with other computers. How can you keep accounting computer traffic more secure?

Routing

A colleague, Courtney, discusses the newly installed Layer 3 switches in the wiring closet. What benefit does a Layer 3 switch offer beyond a Layer 2 switch?

Tower

One of your clients, FakeRUs Inc., needs a new physical server to store files and run a small customer database application. The IT budget is very small and the company wants to reuse any existing hardware components, such as network cards, that they have on hand. Which server form factor should you recommend to FakeRUs Inc.?

Use a separate VLAN for iSCSI.

One of your locations is using iSCSI for server network storage. You want to ensure that regular TCP/IP traffic does not impede iSCSI performance. What should you do?

Configure an IPv6 tunneling solution.

Roman is the server administrator for an international insurance company. The London office currently has Active Directory domain controller servers configured with IPv6. The Toronto office domain controllers are also configured with IPv6, yet replication over the Internet is failing between Toronto and London. What should Roman do to enable domain controller replication between the two sites?

A default gateway is not properly configured on both servers.

Server1 has an IP address of 200.1.1.40/27. From Server1, you are attempting to make an SSH connection to Server2, whose IP address is 200.1.1.70/27, but you cannot connect. What might the problem be?

Twists per inch

What is the primary difference between the categories of copper-based network cables?

Enables servers to perform graceful shutdowns

What purpose does a UPS serve?

It is a router that allows traffic into and out of a network.

What role does a default gateway perform in an IPv4/IPv6 environment?

Guest

What term is used to describe a virtualized operating system?

Multihomed

What term is used to refer to a host with at least two network interfaces?

A

What type of DNS record is used to resolve FQDNs to IP addresses?

E

Which class of fire extinguisher is used to extinguish cooking fires?

SMB

Which file and print sharing protocol is used by Windows devices?

Type of expansion card Rack mount ability

Which items are affected by server form factors? Choose two.

iDRAC iLO

Which of the following are considered out-of-band server management solutions? Choose two.

Fire suppression

Which of the following is a valid concern regarding ceiling cable channels?

MAC addresses are 48 bits long. Each server NIC has a unique MAC address.

Which of the following statements best describe a MAC address? Choose two.

UDP 53

Which port does a DNS server listen on for client queries?

Tower

Which server form factor occupies the most space?

Cable management arm

Which server rack item prevents cables from pulling out when you slide out a server for servicing?

DHCP

Which server role provides centralized IP configuration settings for clients?

Directory service

Which server role stores network configuration objects in a centralized and replicated database?

ST

Which spring-loaded fiber-optic cable connector is commonly used with multi-mode fiber cables?

The server slides into an enclosure.

Which statement regarding blade servers is true?

They do not support OS booting from SAN.

Which statement regarding software iSCSI initiators is true?

Blade enclosure

Which term describes the chassis housing multiple blade servers?

ESD

Which term identifies the flow of electrons between two differently charged endpoints in a circuit?

Guest

Which term is used to refer to a running virtual machine on a hypervisor?

Rack weight Airflow

Which two items are critical when planning server room racks? Choose two.

Ventilation Temperature control

Which two of the following items are related to HVAC?

RJ-45

Which type of connector is commonly used with CAT6 cables?

Multi-mode

Which type of fiber-optic cable should be used for the network backbone on a university campus?

Type 1

Which type of hypervisor has direct access to physical hardware?

SSHD

Which type of storage combines disk platters with flash memory?

HDD

Which type of storage would be considered Tier 2 storage?

U measure

Which unit of measurement is used for racks and rack-mounted devices?

A mail server is being flooded with spam.

While capturing network traffic, you notice an excessive amount of traffic destined to a particular host on TCP port 25. What is one possible explanation for this?

To optimize airflow

Why are server racks arranged in rows?

6to4

Widgets, Inc., has offices in London and Paris. The IT team has been directed to deploy IPv6 for test VLANs in both cities in anticipation of the eventual requirement of using IPv6. What should be configured to ensure that servers in each city test VLAN can communicate over the Internet?

UDP 123

You are configuring firewall ACLs. You need to ensure that NTP traffic is allowed through. Which port must you specify in your ACL rule?

L1 cache

You are ordering server hardware that will run mathematically intensive engineering applications. Which server component can help the most in speeding up processing time?

CAT6

You are planning the cabling for your company's data center. A network speed of 10 Gbps is preferred. The maximum distance between servers and network switches is approximately 30 meters. Keeping costs to a minimum, what type of network cabling should be used?

GPT

You are planning the use of a new 8TB HDD. Six disk partitions are required for varying file storage uses. How should you initialize the disk?

Determine UPS kW or VA rating, calculate power draw sum of devices.

You are planning to upgrade your existing UPS system. How can you ensure device power needs will be met?

UPS

You are the server technician for a Caribbean telecommunications provider. Power on the island is unreliable and you want to prevent servers from abruptly shutting down. What should you acquire?

PXE

You have a Linux image that will be deployed to numerous virtual machines. The image should be pulled down over the network without providing boot media. Which option should you use?

Remove the DNS server root hints.

You install a Windows DNS server named DNS1. Clients on the network are configured to use DNS1 for name resolution. Users report they are able to connect to Internet resources by name. You need to ensure that DNS resolves only internal names. What should you do?

TCP 53

You need to configure firewall ACLs to allow DNS server zone transfer traffic. Which port should your ACL allow?

Service level agreement

You need to ensure that your cloud backup solution has guaranteed uptime. What must you have to ensure this?

DDR3 chips cannot be plugged into DDR4 sockets.

You plan to use extra DDR3 memory chips for your server, which currently supports DDR4. What should you consider?

RFID

You want data center technicians to be able to scan equipment physically to facilitate hardware inventory gathering. What should you use?

Battery-backed write caching

You want to ensure that your RAID controller caches disk writes. Which option must the controller support?

CNA

Your boss has asked you to determine what equipment must be ordered to set up a new FCoE environment. Which FCoE item is required?

Network load balancing

Your company's e-commerce site is experiencing excessive traffic during the holiday shopping season. Being the server specialist, you have been directed to configure the site to improve user response time during peak loads. What should you configure?

SMTP

Your firewall has an ACL that allows inbound traffic destined for TCP port 25 to your company's DMZ. What type of traffic is this?

Issue a PKI certificate for the web server. Install the certificate on the web server.

Your intranet has a web server containing sensitive data. You want to encrypt communications between web browser clients and the web server. What should you do?

Configure a DHCP vendor class identifier.

Your network consists of Windows 10 computers and Android smartphones. You need to ensure that the Android devices are given IP addresses that place them on their own isolated VLAN. What should you do?

Stratum 2

Your network servers point to NTP time servers connected to reference clocks. Which type of NTP time servers do you have on your network?

Hot-swappable

Your server environment requires the ability to replace a failed disk while systems remain running. What type of disk system must you use?

LUN

Your server requires storage that will be supplied over the network. What must the storage administrator configure for your server?

The machine was unable to reach a DHCP server.

Your smartphone receives an alert stating that ServerHFX-234 is not responding. You connect to the server using hardware remote control and issue the ipconfig command. You then notice the server IP address is 169.254.46.63. Why is the server having communication problems?

A DHCP server cannot be reached.

Your users report that they cannot access Internet resources today, although yesterday this worked fine. At a user station, you notice the IP address begins with 169.254. Why can't user stations reach the Internet?

19 inches

Data center equipment racks are normally how wide?

PXE

A data center uses disk images to deploy new physical servers quickly. Rather than have technicians apply the operating system images locally from disk media, network imaging is desired. Which technology must be configured?

Verify that Charlie's station is properly configured with at least one DNS server.

A help desk technician is addressing network connectivity issues being experienced by a user, Charlie. Charlie's station is unable to connect to a customer financial history database server on the same subnet named sect1-423.widgets.local, even though other stations do not have this problem; the error messages states "Unknown Host." The technician successfully pings the default gateway to verify a valid IP configuration from Charlie's station. What should the technician do next?

Configure RAID disk striping.

A line-of-business database application is regularly accessed by many users concurrently. After monitoring server performance metrics, you conclude that disk I/O is the bottleneck. What can you do to optimize application performance?

Thin provisioning

As you configure three new server disk volumes, you are unsure as to how large each volume should be. What should you configure?

SANs use specific block I/O protocols and NAS uses standard file-sharing protocols.

How does a SAN differ from NAS?

Bus

How is data transmitted throughout a computer system?

Residential

In which type of environment is 1-phase power most often used?

Use PKI certificates to secure authentication further.

Industry regulations require multifactor authentication to be used for sensitive server systems. Currently users authenticate to these systems using a username and password. What should be done to ensure regulatory compliance?

Disable UEFI Secure Boot.

Larry, a server technician, is attempting to start the Linux operating system on a blade server but keeps getting "Access Denied" messages. What should Larry do?

Site-to-site VPN connection Dedicated leased connection

Through which methods can on-premises servers communicate with cloud-based virtual machine servers? Choose two.

WINS uses a flat naming structure; DNS uses a hierarchical naming structure.

WINS and DNS are used for name resolution. How do WINS and DNS differ?

Simultaneous read/write from multiple nodes

What benefit does VMFS offer over NTFS?

Less power consumption Quicker file access

What benefits do SSDs provide over magnetic hard disks? Choose two.

Hot-swappable disks

What can be used to prevent server interruptions when disks fail?

RISC

What category of processor do mobile devices use?

3.5-inch

What hard disk dimension is considered the standard?

Server management

What is a KVM switch used for?

DAS is local storage, and SAN is network storage.

What is the difference between DAS and a SAN?


संबंधित स्टडी सेट्स

Economics: Elasticity-The Effect of Price on Demand and Supply

View Set

PSY 290 Quiz 1.1 - Method of Knowing and Acquiring Knowledge

View Set

Chapter 8: Project Quality Management M/C

View Set

the language of medicine chapter 9 study

View Set

Fundamentals of Nursing CH 19: Safety

View Set

5.2 Movement In and Out of Cells

View Set

Chapter 9 - Bacterial Genetic Analysis

View Set