SERVER + EXAM 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You have recently moved the IT operations of your company from Atlanta to a new location in Jamaica for the winter. After setting up the datacenter, you find that you are faced with the issue of the servers overheating. The higher levels of humidity are contributing to the extra heat. Which of the following should you look into to remedy this problem? A) HVAC B) PSU C) RAM D) BIOS

A) HVAC

You work as lead Server+ tech for a software development company. A programmer installed a new SDK which made illegal registry entries causing the system to become unstable. Now the system is not booting up normally. Which Windows boot option would you choose to try to fix this situation? A) Disable automatic restart on failure B) Last known good configuration C) Reinstall Windows D) Start Windows normally

B) Last known good configuration You can try the Last known good configuration option from the advanced boot Options screen. This will allow you to boot into the system state before any problematic registry entries may have been made causing system instability.

An employee in a technical writing company tries to print a study guide on a network printer but the job fails. The network printer is attached to a central print server. You investigate and try to print a single page, which prints successfully. Which of the following is the most likely reason the study guide is not printing? A) UAC B) Low disk space C) Damaged device drivers D) Fragmentation

B) Low disk space

You are the IT manager for a cryptographic company that contracts with government agencies. You need to secure the entrance to the main office building to ensure no unauthorized personnel can physically enter the building. Presently, company personnel are letting coworkers into the secure area by holding the door open. Although each employee has an ID card with an RFID chip, they are allowing other people to enter behind them without tapping their own cards. Which of the following security mechanisms will BEST ensure that no unauthorized personnel enter the office complex? A) Security camera B) Mantrap C) Access list D) Fingerprint scanner

B) Mantrap The best way to ensure no unauthorized personnel enter the complex is to use a mantrap. A mantrap is not a form of authentication, but does ensure that a person cannot enter the premises until they have cleared at least two levels of authentication. A mantrap comprises an enclosure or room with two doors. The mantrap acts as a gate between the outside world and an organization. To enter through the mantrap, a person needs to provide security clearance for each door, which could be a PIN at the first and biometric identification for the second. One door cannot be opened until the other door has been cleared and locked.

You are working for an air traffic control systems company. You are asked to assemble the main server computer and ensure it has reliability and resiliency. You need to use a file system on its storage devices that can automatically repair any data corruption without taking the system offline. Which of these will you use? A) Embedded OS B) ReFS C) GPT D) P2V

B) ReFS You will use ReFS. A resilient file system (ReFS) is the latest file system from Microsoft that offers the maximum possible data availability, efficient scaling of massive data sets across differing workloads, and data integrity by avoiding data corruption. Some of the key advantages of ReFS include:

You receive reports that the main database server in your company's datacenter is having issues with booting correctly. It seems that when you put a data DVD in the DVD drive, the server does not start up correctly. Which of the following could be the cause of this problem? A) PSU failure B) Expansion card failure C) Incorrect boot sequence D) OS not found

C) Incorrect boot sequence The cause of this problem is incorrect boot sequence. This occurs when the first item in the specified boot sequence either does not exist or does not have the OS on it. For example, if the first boot device is specified as a CD-ROM and the drive has an audio CD inserted, the system will throw an error.

You work as a systems administrator for your company's IT network. You have been asked to ensure that only the employees of the company can access a specific Windows server, based on their IP configuration. Which of the following security measures should you use? A) NTFS file permissions B) Network ACL C) AD user groups D) Domain GPO

B) Network ACL You should use a network ACL. The available resources on a computer network need to be secured against unauthorized access. One way to limit the intrusion on a computer network is by using ACLs. Routers contain an access control list (ACL) that specifies the IP addresses that are allowed access to the network the router resides in. All other IP addresses are blocked.

You have been alerted to a virus affecting all systems in the graphic design department due to an employee who installed a game from the Internet. While resolving the issue, a technician discovers that a file server was infected with this same virus. You determine that the file server will have to be restored from the most recent backup. You create the plan of action to resolve the problem. What should you do next? A) Verify the system. B) Notify the users. C) Document the issue. D) Query the users.

B) Notify the users.

ou are the Server+ technician for a cloud service provider. You receive a helpdesk ticket from a user complaining about slow VM performance and large lags in program execution. You check the VM configuration and see that all the VMs in the cloud have five virtual CPUs allocated to them. What could be the cause of the degraded performance? A) Zeroing B) Overallocation C) MTTR calculation D) Overheating

B) Overallocation Overallocation of virtual CPUs is the cause of the issue. You should not be allocating any more than 3 virtual CPUs per virtual machine (VM), as it can cause issues in the performance of the VMs and lead to large CPU Ready Wait Times.

Your organization has recently acquired a new gaming division. You need to upgrade the division's existing computers for backup storage that will provide data availability in the event that one drive within the system crashes. The solution must use a minimum number of hard drives in each system. What would you need to provide this functionality? A) RAID 0 B) RAID 1 C) RAID 10 D) RAID 5

B) RAID 1 Redundant Array of Inexpensive Disks (RAID) 1, or disk mirroring, will provide data availability in the event that one drive within the system crashes. It only requires two hard drives.

You need to choose a backup site for your company's operations. Your small company provides stock brokerage services in a large city. The computer systems and other gear are portable and owned wholly by the company. A major snowstorm is expected to paralyze the city this season, causing power outages and other damage. Which of the following recovery models will best meet your requirements with the least setup cost? A) Offsite tape storage located in local bank vault B) Cold site located within driving distance C) Warm site located within driving distance D) Hot site located within driving distance

) Cold site located within driving distance The recovery model that will best meet your requirements with the least setup cost is a cold site located within driving distance. A cold site is the least expensive site recovery solution, and 100 miles is close enough to transport the company's portable equipment. A cold site is a backup office space for a company. To continue operations in a cold site, the company needs to bring its own IT infrastructure, including computers and servers, prior to the storm's arrival. A cold site is less expensive to rent than a hot site, but it takes substantially longer to get the operations back up and running.

You are working for a large business process outsourcing company that has offices in the United States and India. You are comparing SLAs from various service providers. According to them, the monthly SLA availability value is 99%. What does this value translate into in terms of downtime? A) 7 hours, 12 minutes B) 29 days, 16 hours C) 43 minutes, 12 seconds D) 29 days, 23 hours

A) 7 hours, 12 minutes 99% monthly availability would be 7 hours, 12 minutes of downtime. A server's uptime is the duration of time when it is operational. A server's uptime is discussed as being a percentile with an aim to have a five 9s uptime - 99.999%. This means that the server is up 99.999% of the time. Downtime is when a server is not operational and are caused by power outages or other issues. An outage is when a server experiences downtime no matter what the reason.

Your company has asked you to select a licensing option for a new graphics editing application it needs to acquire for its growing graphics department. As your company has a limited staff, you need to minimize the overhead associated with the software acquisition and maintenance. You have opted for a subscription-based license. Which of these will you get as part of your subscription? A) All of these B) Upgrades C) Maintenance D) Tech support

A) All of these

You work for an online shopping company based out of Brooklyn. Your company uses a three-tier enterprise application that they now want to move from staging to production servers. Customers around the world will use their web browsers to view current inventory and order products. You deploy the Website front-end to the company's dedicated Web server. Which other servers should you deploy as the remaining application components? (Choose two.) A) Application server B) Directory server C) Routing access server D) Network services server E) Database server

A) Application server E) Database server The application and database servers should be deployed as the remaining application components. You should deploy the inventory and order data to the database server and business processes such as ordering products to the application server. The dedicated Web server will contain the user interface that customers will use to view inventory and order products. In a three-tiered enterprise application, there are the following logical tiers:

You are working for a video editing company. Your company stores all of its video project files for released videos on a server and is now planning to upgrade the video editing software and hire new users to work on it as well. You want new video editors to be able to successfully open and work with project files created with all previous versions of the program. What kind of compatibility will you need to ensure the program has? A) Backwards B) Slipstreamed C) Overprovisioned D) P2V

A) Backwards

our office has recently been hit by a fire, and many servers have been destroyed. You have managed to repair some of them, and although the data is lost, you need to recover the systems. Which of the following techniques should you use to do this? A) Bare metal restore B) Full/differential restore C) Selective restore D) PIT restore

A) Bare metal restore You should use a bare metal restore. A bare metal restore is a process in disaster recovery where a computer system is reformatted from the ground up. This usually happens after a major disaster that has destroyed the computer systems and/or their data. A bare metal restore includes the re-installation of operating systems as well as an attempt to restore previous data if possible.

You work as a Server+ professional for an Internet-based technical support firm. You receive a ticket where the user mentions that after prolonged Internet use the computer downloaded certain malware which made its performance erratic. The computer has crashed several times and is in an unstable state. You want to start the computer in a state where you can run administrative tools to ascertain the issue without loading the Windows GUI or the Internet. What would you do? A) Boot into safe mode B) Boot normally C) Format the disk D) Reinstall Windows

A) Boot into safe mode You should start up Windows in safe mode, which you can do by hitting F8 after turning on the computer. Safe Mode allows you to start up Windows with the minimum necessary set of drivers and services. The safe mode option prevents you with several different access options. Some of these are:

You work for a college computer department and the computer science department has courses in both Linux and Microsoft technologies. Your main server is a dual boot machine that has Red Hat Linux as well as MSDOS. You need to ensure that the system is safe from any unauthorized physical access in the office building. Which of these should you use to ensure the safety of the system from malicious access? A) Bootloader password B) MTTR C) Slipstreaming D) Node-locked licensing

A) Bootloader password You should use a bootloader password. This will protect access to MSDOS, which can be exploited by an attacker given its lack of secure access controls.

You are setting up a virtualized network for an online shopping company. You need to allow several virtual machines to access the production network directly. Which of the following will allow you to make this possible? A) Bridging B) NAT C) Virtual switch D) Virtual NIC

A) Bridging Bridging will allow you to access the production network directly with several virtual machines. NAT will not allow this. There are two main options when providing network connectivity for a virtual machine:

Your company has many terabytes of data in storage and you need to find ways to increase the efficiency of its storage management system. You are asked to find a way to reduce storage costs by selecting a way of reducing the size of data backups and the storage media it would require. Which of these would you use? A) Deduplication B) Embedded OS C) Slipstreaming D) P2V

A) Deduplication You should use deduplication. Deduplication is the process of removing redundant or duplicate data for improving the utilization of storage. This, in turn, helps reduce costs associated with acquiring and maintaining storage media for organizations' computing requirements. Deduplication locates redundant blocks of data across files. These files can exist across directories, disks, servers, and even locations.

You are the systems administrator for a technology support company. The company has recently hired 100 new interns who will eventually join the company as full-time technical support specialists. You need to make user accounts for all of them. After you create the accounts, you assign them to a user group named INTERNS. These users will need to launch applications on the application server. Which of the following permission(s) should you grant the INTERNS group following the rule of least privilege? (Choose all that apply.) A) Execute B) Write C) Delete D) Read E) Superuser

A) Execute D) Read

You are the IT manager for your company, which is a payment portal service provider. The SLA for all your business partners states that you must maintain 99% uptime. Your office is located near a large river which has a tendency to flood. You need to choose an appropriate disaster recovery scheme for your company in the event that normal operations are disrupted. It is vital that all the data processing applications are uninterrupted and that the data is mirrored in the event that the primary servers are lost. Which of the following should you use? A) Hot site B) Bare metal restore C) Warm site D) Cold site

A) Hot site You should use a hot site. A hot site provides a full backup for a company's datacenter in the event of a disaster. The hot site contains everything that a company will need to continue operations, including office furniture, computer systems, and connectivity. This site is kept fully operational so that in the event of a disaster at the primary datacenter, the staff simply needs to move to the hot site and continue operations. You should use a hot site in situations where you do not want to have to re-install your software or set up your computers, and when a quick recovery is important. This solution is best if you want to be able to just enter the new facility and have the systems running as if nothing happened. In some cases, the most recent backup may need to be restored.

You are the IT consultant for a 3D graphics company based in Palo Alto, California. You have recently been asked to install a centralized power backup to the existing computer systems to protect them against power loss and voltage spikes. You are expected to monitor the system to ensure that it works. Your own office is in Los Angeles. Which of the following will you use in LA to ensure the system works as expected? A) Install a UPS and use the remote agent to monitor the system. B) Install a USB surge protector and use local software to monitor the system. C) Install a UPS in bypass mode and use the remote agent to monitor the system. D) Install a standard surge protector and use local system logs to monitor the system.

A) Install a UPS and use the remote agent to monitor the system. You should install a UPS and use the remote agent to monitor the system. UPSs can be managed remotely using software that monitors off-site UPC systems and provides information on the UPS operating mode (bypassed or not), internal temperature, battery voltage, and load levels. The automated graceful shutdown of attached devices involves using agent software that detects when the main power goes out and then begins the shutdown process on the computer automatically when the battery has been depleted to a specific degree. An uninterruptible power supply (UPS) is a hardware device that allows computers connected to it to function even after the main power to the systems is lost. UPSs also protect against power surges. A UPS has a battery in it that is activated when the main power fails. The UPS then sends a notification via a beep that the main power is lost. This allows you time to save your work and shut down gracefully.

You are working as a Server+ technician for a graphics company. You have received a ticket from a user indicating that the computer isn't booting up. You investigate the issue and hear certain sounds. Which of these indicates boot failure? A) Intermittent beeping B) Fan noise C) Burning smells D) CD-ROM whirring

A) Intermittent beeping Intermittent beeping is an indication of boot failure. The beeping is the BIOS mechanism communicating issues within the system.

Your company has recently been through an upgrade of all computer systems. You spent several days reconfiguring the network security parameters. You receive reports that the Web server seems to have unknown files and applications launching automatically whenever it is started. Also, the speed of the system has dropped considerably. What is the most likely cause of this? A) Malware B) Data corruption C) Corrupt boot record D) Dual OS

A) Malware

You are setting up the virtual network for your company, which provides tech support for clients all over the world. You need to choose an appropriate virtual network connection for the employees' computers. You must ensure that the clients see only one IP address during chats with them. The IP address that they see must match the IP address of the company's server. Which form of virtual network connectivity will you use? A) NAT B) Type II C) Type I D) Bridging

A) NAT You should use NAT to show only the IP address of the company's server. There are two main options when providing network connectivity for a virtual machine:

You are an IT specialist for a telecommunications company. An employee has raised a helpdesk ticket to say that they are unable to turn a server on. Which of the following could be the most likely cause of this problem? A) PSU failure B) Expansion card failure C) OS not found D) Incorrect boot sequence

A) PSU failure The most likely cause of this problem is PSU failure. A power supply unit (PSU) failure is a likely cause when the machine does not switch on at all or does not boot. A power supply failure is generally considered a problem that is easily recovered from because you simply need to procure a replacement power supply and install it.

ou are the IT manager for a petro-chemicals company headquartered in Dallas. You have recently been told that the oil rig in Lebanon will be closing. The computer systems at that location contain confidential topographical research and pipeline operation reports. You need to erase that data from the main office. What should you do? A) Remote wipe B) Delete partitions C) Soft wipe D) Encrypt using IPsec

A) Remote wipe

Which of these would you need to procure so that your company can be well aware of any security threats automatically and then mitigate them right away? A) SIEM B) POLP C) PCI DSS D) MTTR

A) SIEM You would need SIEM. Security information and event management (SIEM) tools are software tools that enable an organization to monitor its information security. They are a combination of information monitoring that includes data from system log files, which are collected and analyzed, and also real-time system event monitoring and notifications to system admins. All SIEM tools provide some basic functions like:

Your company is a database services company providing databases for global enterprise use. You have several offices around the world, and data in the databases must be replicated for each office. You need to ensure both fault tolerance and high availability for the users of the databases. You need to choose an appropriate replication scheme for this. Which of the following should you implement for your main office when integrating the data from the various global offices? A) Server to server B) Disk to disk C) Full backup D) Site to site

A) Server to server You should implement site-to-site replication for your main office when integrating the data from all the global offices. Site-to-site replication ensures service redundancy and that the data from one location is copied to the other location.

You have set up your company's IPv6 network. Many employees on the network cannot connect to the new email server. When you check the IP configuration of the email server, you discover that it only has the following link-local unicast address assigned: fe80::2000:aff:fea6:f8c/10 Why are users unable to connect to the server? A) The email server is configured with an IP address that only communicates on the local subnet. B) The email server does not support IPv6. C) The email server is configured with a private address. D) The email server is configured with the wrong subnet.

A) The email server is configured with an IP address that only communicates on the local subnet. The users cannot connect to the new email server because it is configured with an IP address that only communicates on the local subnet. Any IPv6 address that starts with fe80 is a link-local address, which is similar to using APIPA in IPv4. Devices with these addresses are only able to communicate on the local subnet.

You work as lead Server+ tech for a data mining company. The company's server machines have recently been moved from a different data center location to this one. You receive a ticket where a server machine is constantly overheating and not functioning. You open the server machine and notice that the heat sink has come off the CPU, causing the overheating. What will you use to reattach the heat sink to the CPU? A) Thermal interface material B) Duct tape C) Superglue D) Double sided tape

A) Thermal interface material

You work as head of IT for a military security agency in Nevada. Your server operating system manufacturer has identified a zero-day vulnerability that could be exploited by an attacker. Which action should you take to protect the server from this exploit? A) Virtual patching B) Hard disk mirroring C) OS hardening D) Performance baselining

A) Virtual patching You should use virtual patching to protect the server. Virtual patching involves implementing a security policy that prevents an existing vulnerability in a system from being exploited by an attacker. Virtual patches are alternatively known as Web Application Firewalls (WAFs). Virtual patches serve to limit the traffic to a vulnerable part of the system while a remedy for the vulnerability is found. Patches include service packs, hotfixes, and updates that are released by software and hardware manufacturers. Patches can address security issues and bugs or can provide increased functionality.

You work for a game development company in Illinois. Your company also provides online gaming services to gamers worldwide. You need to set up several independent gaming servers, each running on a different operating system. You only have one main physical server to accomplish this task. Which of the following should you use to make this happen? A) Virtual server B) Web server C) Database server D) Messaging server

A) Virtual server Virtualization allows a physical server to share its hardware and software with different kinds of operating systems by installing virtual servers on the physical machine. This provides more economic computing solutions and also more efficient control of those computing resources. Because of these factors, virtual servers are widely used in Web hosting applications. Every virtual server has its own OS, software, and, in the case of Web hosting virtual servers, IP addresses, domain names, and email. However, all of the virtual servers must share the physical server's resources. It is important to ensure that the physical server has enough resources to support the virtual servers. This includes CPU, memory, and hard drives.

You are Server+ tech for a software development firm. You receive a ticket from a new developer who is unable to launch new processes. You see that there are many processes which have completed execution but they are still listed in the process table. Because of this new processes are not being launched due to unavailability of PIDs. What kinds of processes are these? A) Zombies B) Puppet C) CMDBs D) Daemons

A) Zombies These are zombie processes. A zombie process is a process that has completed execution but its entry is still a part of the systems process table. A zombie process is created from a child process which is a process created from a parent process using a fork() function call. If the parent process has a wait function the child process can issue an exit() status to the parent process and then be eliminated form the process table. This is called reaping the zombie process. The problem caused by zombie processes is that although they do not use any system resources they take up process IDs (PIDs) which prevents other processes from acquiring new PIDs. Zombie processes can be avoided by keeping a wait function call within the parent process to ensure the child process terminates giving an exit status to the parent.

You have just set up networking for a Chicago-based online shopping web site. You want to check the connectivity and view all current connections for a server. Which of the following should you use to do this? A) netstat B) route C) ifconfig D) ping

A) netstat You should use the netstat command. This command provides useful information about a network and has several options, including the following:

Your company is a web space and domain hosting firm with a server farm at its data center running Linux. You as the Server+ specialist need to ensure that every server has its web server activated. You want that the Apache web server is automatically enabled each time the server boots up. Which of these commands should you execute for this? A) sudo systemctl enable apache2 B) sudo shutdown +30 "System Upgrade" C) sudo systemctl stop apache2 D) sudo systemctl status apache2

A) sudo systemctl enable apache2

You work as an IT supervisor for a biotech firm in Houston. Several of the company's servers replicate with the servers in the branch offices around the continental United States. One evening, you receive reports that one of the branch office servers is not reachable. You need to test the connectivity between your branch and the other. Which of these commands should you use to do this? A) traceroute B) ifconfig C) netstat D) route

A) traceroute

You are setting up a server that you plan to use for FTP services over the Internet. You need to open the appropriate TCP and UDP ports to allow both FTP and FTP over TLS/SSL. Which of the following ports should you open on the firewall to allow this traffic? (Choose all that apply.) A) 143 B) 20 and 21 C) 443 D) 989 and 990

B) 20 and 21 D) 989 and 990

You work as the IT superintendent of a global finance corporation. You recently closed an issue where the main server was malfunctioning due to a virus that had infected the computer. That issue was taken care of by a technician who has since been transferred to a different branch office. Now another server seems to have the same problem. What should you consult to tackle this issue? A) Probable cause B) Documentation C) Plan of action D) Root cause analysis

B) Documentation You should consult the documentation to tackle this issue. Because this kind of issue has been seen before, it is important to review the documentation of the previously closed issue to get as much information as possible before tackling the new issue. Also, the logs and documentation can provide vital clues to finding a common problem. In this scenario, it could be that that flash drives or other media were the source of the virus. Personnel responsible for resolving previously seen issues should always consult the documentation before speaking with the user who reported the problem. However, the issue itself should not be addressed (meaning remedial action should not be taken) until after you have followed the troubleshooting theory process. This means that after consulting the documentation, you should identify the problem and determine the scope.

You work as an IT specialist for a New Delhi-based advertising agency. You attempt to mount a hard drive to the main graphics server, which is a dual-boot server with both Windows and Linux. The mount operation fails. What is most likely the problem? A) Drive unavailable B) Drive corrupt C) Drive fragmented D) Drive in use

B) Drive corrupt The most likely cause of this problem is that the drive is in use. When you cannot mount a hard drive, it means that the hard drive may be in use by another operating system. This happens in systems with dual operating systems. If you have hibernated a Windows session and then try to mount the hard drive in Linux, it will not mount. Occasionally, loose connectors or cable problems with the hard drive may also cause it to not be detected by the system.

You are in charge of the server room of a Minnesota-based credit card company. You need to have the system up and running at all times given the sensitive nature of the business and the need for high availability. You have recently added new server machines to the system and you decide to get more UPS units as well. Which of the following should you do to ensure high availability? A) Higher-rated PDUs B) Dual-corded PDUs C) UPS spike busters D) UPS bypass

B) Dual-corded PDUs You should use dual-corded power distribution units (PDUs) for redundancy. You connect redundant rack PDUs to separate circuits to ensure that if one power circuit fails, there is still power supplied to the system via the other circuit. This is done to ensure high availability of the systems. Another means to provide redundancy to a rack is to use dual-corded equipment and redundant power strips. Some PDUs are equipped with dual power circuits. The dual-cord design means that each PDU input cord goes into a different UPS. This way, full redundancy is provided because now, instead of a single point of failure, there is a backup via the dual-corded equipment.

You are setting up a RAID controller for your company's server room. You need to connect the controller correctly. Which interface should you connect to the server's host adapter? A) Midplane B) Front end C) Backplane D) Back end

B) Front end

You are the IT consultant for a chartered accounting firm. The company's network consists of two subnets. Management has decided to open a new division that will operate out of the same office. However, the network division requires its own subnet. Which server type should you implement? A) Directory server B) Routing server C) Network services server D) Messaging server

B) Routing server A routing server will enable the network division to have its own subnet on the internal network. The Routing and Remote Access Service (RRAS) is server software developed by Microsoft. It provides network routing capabilities, which allow the server to route network data among computer networks. It can route LAN to LAN or LAN to WAN along with a host of other applications. It also provides Virtual Private Networks (VPN) capabilities. This allows users like employees to securely access their company networks from their own computers as if they were on-site on the computer's actual network.

You have been contracted by a large organization as its IT service provider. Your role will be to provide all the servers and networking devices to run their day-to-day operations. You have been asked to write the formal documentation that specifies scheduled server downtimes and explains how to handle unscheduled downtimes. What are you creating? A) MTTR B) SLA C) Impact analysis D) Server uptime-downtime ratio

B) SLA

You work for a company that has hundreds of employees across the corporate hierarchy. You need to enforce a strong access system that will ensure that entry-level employees cannot access data that should only be seen by senior management. What would be the means to accomplish this access control? A) Delegation B) Scope-based access C) Segregation of duties D) Employing slipstreaming

B) Scope-based access You would use scope-based access. When setting permissions and access controls for an organization, you need to be aware of the employee's role in the organization. This includes the scope of work and duties that come with that employee's role, sometimes called scope-based access control. Permissions are based on an employee's scope of work.

Your company is a payment gateway portal. It is setting up a new global network and needs to secure the system for its users. Users are routinely going to use the system to make credit card payments to various sites on the Internet. Which of the following technologies should you use to provide the BEST security? (Choose all that apply.) A) VPN B) TLS C) LDAP D) SSL E) IPsec F) VLAN

B) TLS D) SSL SSL and TLS will provide the best security. Secure Sockets Layer (SSL) is a security standard on the Internet that provides encrypted connection between a Web server or Website and a user's Internet browser. This allows users to send private data online such as credit card information and personal identifying data. TLS is the successor to SSL and is typically what is used today.

You work as a Server+ specialist for a university. The department of multimedia has recently inducted a hundred new students and needs you to create a workstations for each student with an identical configuration of operating system and graphics processing software as found on the graphics teachers' computers. Each of these will be hosted on a virtual platform. Which of these would you do? A) OS installation B) VM cloning C) Slipstreaming D) Physical cloning

B) VM cloning You should perform VM cloning. A virtual machine (VM) clone is a copy of a specific VM. The copy or clone is cloned from a parent VM. The new VM operates as an independent and separate VM. The purpose of cloning is to provide several VMs to multiple users, each of which have an identical configuration. A key advantage is that you ensure that the disk space allocated to the VM will never be exceeded by the VM while it is in use.

You work for the IT department of a music record label company based in Los Angeles. You receive a service bulletin stating that the equipment purchased a few months ago and used for digital mixing and mastering needs to be repaired. You decide to get the vendor to repair the item. Which of the following will you need to provide to the vendor to get the repairs done by them? A) License B) Warranty C) Label D) Serial number

B) Warranty You will need to provide the vendor with the warranty. An item that is under warranty can be repaired or replaced by the vendor. All the hardware procured by the company needs to have its warranty inspected. The warranty of a device is a written guarantee from the vendor that provides a time frame within which any malfunction of the device will result in its repair or replacement by the vendor.

You are performing a check on all the Linux computers in your company's datacenter. You need to check the network interfaces and their settings for the servers. Which of the following commands should you use? A) ping B) ifconfig C) traceroute D) route

B) ifconfig

You work for a global gas company and are setting up the database servers in its Houston office. These servers will handle customer information from the company's gas installations all over the world, including the Middle East, China, Japan, and South America. You need to choose a RAID implementation that will provide the best performance and reliability for these mission-critical servers. Which of the following RAID implementations should you choose? A) Software RAID 10 B) Software RAID 6 C) Hardware RAID 1 D) Hardware RAID 5

C) Hardware RAID 1

You have been called to the company site for an issue with the blade servers you had installed. You are told that some blades servers are powered off and unresponsive. You need to review the hardware logs to determine the issue. Which of the following should you use to connect to the blade server? A) 1U B) Rail C) IMPI D) NIC

C) IMPI You would use an Intelligent Platform Management Interface (IMPI). Management modules on a blade chassis provide a single point of control for all services on a blade chassis. They also provide a pass-through for IMPI interfaces on each blade server.

You are working for a company that provides servers for air traffic control stations. Due to the role of the server in providing electronic guidance to aircraft, you need to ensure that the server is perpetually operational. Which of the following options would you use to ensure redundancy in power for your server system? A) The same power circuit connected to each power supply B) The power circuit not connected to the power supply C) A separate power circuit connected to each power supply D) The same power circuit connected to a phase 1 power circuit

C) A separate power circuit connected to each power supply The correct option is to connect each power supply to separate circuits. A key aspect of power for servers is redundancy. Considering blade servers, a best practice is to install redundant power supplies for a blade chassis. This involves connecting each power supply to a SEPARATE power circuit. This way if one power circuit fails, the chassis will still be working.

You are the system administrator for a company's computer network. You have been informed that a new lot of 200 employees is joining the company, and you need to set up their user accounts and password settings on the company's system. Which of these should you implement in order to maintain a safe and secure password policy for your company? A) Account lockouts B) Password history tracking C) All of these D) Minimum password length

C) All of these

You are the network administrator at a global telecommunication company's head office. The network uses IPv6 for all communications. While monitoring network traffic, you notice that one host initiates the updating of router tables for a group of hosts. Which type of traffic is occurring from this host? A) Unicast B) Multicast C) Anycast D) Broadcast

C) Anycast This host is initiating anycast traffic. Anycasting lets one host initiate the efficient updating of router tables for a group of hosts. Anycast addresses allow a packet to be sent to the first or nearest interface of a group of interfaces.

You are installing cables for the two new servers at an Internet service provider (ISP). You need to choose a cable that can cover the distance of 10 yards from the servers to the main receiver with about a bandwidth of 10 gigabits per second (Gbps). You need to ensure that the solution you come up with will provide protection against EMI. Which of the following could you choose? (Choose all that apply.) A) Cat5e UTP B) Multi-mode fiber C) Cat6 STP D) Cat4 UTP E) Cat5 UTP

C) Cat6 STP

You are setting up a new tower server that will provide air traffic assistance to airport control towers. You require high connectivity, fault tolerance, and redundancy on the network. Which of the following will be the right choice for you to make? A) Enable full-duplex communication. B) Enable auto negotiation. C) Configure NIC teaming. D) Change the MAC address.

C) Configure NIC teaming. You should configure NIC teaming. A network interface card (NIC) is a networking circuit board inside a computer that allows the computer to connect to a network. NIC teaming involves combining several NICs to improve performance and provide redundancy and fault tolerance in case one NIC fails. Most modern NIC cards can handle up to 1,000 megabits per second (Mbps). To configure NIC teaming, multiple NICs need to be placed in a single team using the settings in the server operating system. It is also referred to as NIC or link bonding, balancing, or aggregation. NIC teaming is popular in virtual computers. The switch to which the NIC team is attached must support this feature for NIC teaming to work properly.

You are your company's network administrator. Recently, your office network has grown to the point where managing the assignment of IP addresses has become increasingly difficult. You need reconfigure the network so that IP addresses are assigned dynamically. Which of the following servers will take care of this need for you? A) DNS B) FTP C) DHCP D) NTP

C) DHCP A DHCP server will dynamically assign IP addresses. Dynamic Host Configuration Protocol (DHCP) is a network protocol that allows dynamic distribution of the parameters of the network configuration, such as IP addresses for network interfaces and other services. DHCP is useful in that it obviates the need for a network administrator to manually configure these network settings.

You need to select a server for your company that can manage user credentials as well as store information on network resources such as printers. Which of the following will be the right server for this need? A) Network services server B) Messaging server C) Directory server D) Print server

C) Directory server A directory server will be the right server for this need. This server stores data for a computer network as well as manages it. The stored data includes user identity information, application and network resource data, as well as data on network devices such as printers. Directory severs allow e-businesses to operate and provide various Web services via a single data repository that can be accessed and used over a network.

You are making an analysis of your company's network after a request was put in by the senior management to virtualize it. You have a Linux guest system that you want to connect to a Windows host system. Which step(s) should you perform? (Choose all that apply.) A) Allocate resources between guest and host. B) Locate the SLA for the server. C) Enable the hypervisor in the BIOS. D) Set up connectivity for the VM. E) Activate the RAID controller.

C) Enable the hypervisor in the BIOS. D) Set up connectivity for the VM. To perform this connection, you should enable the hypervisor in the BIOS, allocate resources between guest and host, and set up connectivity for the VM. Resource allocation includes properly managing usage of all resources, including CPU, storage, memory, network connectivity, and video.

You work as a Server+ professional for a large database firm running a SQL Database on a Linux server. Your system generates a large number of transactions, and details are stored in log files. Over time you notice that the log files are growing in size, making the process of analyzing them for system changes very difficult. What should you do to fix this issue? A) Creating a rule set B) Log Shipping C) Log Rotation D) Slipstreaming

C) Log Rotation You should use log rotation. Log file rotation is the process where older log files are copied to a new location and given a new name while a new, fresh log file is created to begin the logging process. This process occurs when a log file grows too large or too old and needs to be moved, renamed, compressed, and sometimes deleted. Log files need to be rotated so that the current log file is not too large to analyze. Also, organizing log files by date makes the process of analyzing any changes to the system more efficient. Finally, disk space is saved by moving older log files to backup storage.

You are part of the security team at a finance corporation. You have been entrusted with securing the following confidential data: User account credentials Personnel records Proprietary documents You use encryption as protection. Where is the MOST secure place to store the encrypted confidential data? A) Online in a partner's cloud service B) Online in a local RAID mirror in the server rack mount C) Offline in a keypad entry safe at a secure off-site premises D) Offline in a locked server cabinet

C) Offline in a keypad entry safe at a secure off-site premises

You work for a financial management company as the chief Server+ tech. Your company has a lot of old hard drives that need to be disposed of, as they are no longer in use and have expired service lives. Which of these actions would you need to perform before destroying the media? A) Re-installation B) Calculate the MTTR C) Sanitization D) Back up data

C) Sanitization Before destroying the storage media, you will need to sanitize it completely. Media destruction or sanitization is a process where stored data is irreversibly removed from storage media or the media itself is completely destroyed. For any private media internal to a company, sanitization of the stored data needs to occur, and then the media itself needs to be destroyed by incineration, crushing, or shredding. This is a recommended practice to ensure safety of the company for protection against industrial espionage and data theft.

Question #29 of 90 Question ID: 1402256 Your company has created various business continuity plans and is planning for the future to protect its operations from any unforeseen circumstances. As lead Server+ tech, you want to find a way to simulate a real-life disaster scenario to ensure that the disaster recovery strategies you have in place are effective with no weaknesses. What should you do? A) Live failover B) Production testing C) Tabletop testing D) Constant replication

C) Tabletop testing You should perform tabletop testing. Tabletop testing is the process of analyzing and discussing a company's disaster recovery (DR) and business continuity (BC) planning during a simulated emergency scenario. The purpose of tabletop testing is to allow you to further improve your disaster recovery strategies and fix any weaknesses that may exist in them before an actual disaster situation takes place.

You work as IT administrator for a small office based out of Chicago that provides accounting services. You need to figure out a way to provide tape backups for up to two years using only the ten tapes available to the datacenter. Which of the following tape rotation schemes should you use for this? A) Round-robin backup B) Grandfather-father-son backup C) Tower of Hanoi backup D) Full/incremental backup

C) Tower of Hanoi backup You should use a Tower of Hanoi backup rotation scheme. Tape rotation involves having multiple sets of tapes that are used to perform backups. A tape set is the number of backup tapes you need to do a complete backup. An effective tape rotation scheme is called Tower of Hanoi, which effectively doubles the length of the backup period provided by the tapes using a complex algorithm. A five-set Tower of Hanoi backup rotation would use the tape sets in the following order, each letter representing a single set used on a certain day:

You work for a video editing company as a Server+ tech and you have received a ticket from one of the video editing specialists. The user says that she cannot run the video editing tool to edit .mov files because the editor needs QuickTime files to read the .mov files. What kind of issue is this? A) File locking error B) OS Corruption C) Unresolved dependencies D) Computer boot problems

C) Unresolved dependencies This is an issue of unresolved dependencies. A dependency is when a software program needs another software or software library to run. Dependencies need to be identified to ensure certain key software can run. For example, .mov files can only be viewed on a system that has QuickTime libraries installed. Similarly certain games and visual media can only be viewed on a system that has Microsoft DirectX technology installed. Without these dependencies satisfied the related software cannot function. When you attempt to run a program with unresolved dependencies you will get an error message or notification for the same.

Your company is considering doing a full backup of its main data center's servers. You are asked to replicate the entire file storage on your local server to a remote location for backup while maintaining all the original timestamps of the files and directories you are copying. Which of these would you use? A) dir B) logrotate C) robocopy D) scp

C) robocopy You should use robocopy. robocopy is a command line utility that allows you to copy files from one location to another. The following code uses robocopy to copy a video file from the local videos folder to a file share location called training\videos. The /mt parameter enables multi-threading on this copy operation and the /z parameter restarts the transfer automatically in case it fails.

You are Server+ professional working for a software development company. Your company is planning to migrate its entire data center to a cloud environment. This will involve transferring all the data from existing servers to cloud virtual machines. The IT operations head has requested you to identify potential security threats to this process. Which of these is the most vulnerable target of malicious activity? A) Data volumes B) Workload types C) Destination OS D) Employee data

D) Employee data Employee data can be an easy target of malicious activity. It can be targeted by either infiltration or exfiltration attacks. Infiltration refers to malicious software or malware that tries to enter a user's computer and cause damage. An example WannaCry, a ransomware where a malicious program installs itself onto a computer, locks all the files, and only unlocks them if the user pays the attacker money. Banking Trojan programs are also examples of infiltration attacks.

You work for a data mining corporation based in Colorado Springs. Your company uses arrays of disks to store its data to provide better redundancy. You need to monitor the usage of these storage devices more closely to ensure maximum performance from them. Which of the following tools should you use to do this? A) Defrag tool B) Log monitoring C) Partition manager D) RAID manager

D) RAID manager You should use a RAID manager. A Redundant Array of Inexpensive Disks (RAID) controller manages storage devices such as hard drives so that they function as discrete units. RAID presents all hard drives in an array as a logical unit to the computers. Most motherboards today have RAID capability built in. RAID is a technology that provides data redundancy using several hard disks and its management. A RAID manager tool allows you to monitor your RAID controller and disk arrays and ensure they are performing at their optimum level.

You need to install a power supply unit for a large corporation's server system. You need to choose an appropriate power system based on the large amount of current that is expected to be drawn by the organization's computers and facilities. What would you choose? A) UPS B) SMPS C) 1-phase power D) 3-phase power

D) 3-phase power You should use a 3-phase power. There are three phases of electricity with their waves 120 degrees out of phase with each other. As a result, each phase peaks when the others are not so provided a smoother steadier flow of current. Power can be either 1-phase or 3-phase. 1-phase power involves a two-wire circuit with one power wire and one neutral wire. 3-phase power involves 3-wire AC circuits. The key difference is that 3-phase power is used in situations that need a large amount of power, like large businesses and factories. 1-phase power is used mostly in homes.

You need to outfit your company's servers with new power supply units (PSUs). You need to instruct your staff on the use of a PSU. Which of the following correctly specifies the function of a PSU regarding electricity? A) DC to DC B) AC to regulated AC C) DC to AC D) AC to DC

D) AC to DC

Your company has recently increased its computer count from 50 to 500 with many new employees expected to join in soon. Your IT support staff is small and you need to find an efficient configuration system for the organization. You are looking for a DevOps solution that is easy to learn for your staff and does not need too much time setting up the system as you have hundreds of client machines. What would you use? A) Puppet B) Chef C) Task scheduler D) Ansible

D) Ansible You would use Ansible. It is much easier to deploy and use compared to Chef and Puppet which are more suitable for developers.

The company you work for has recently enforced a new set of IT rules intended to secure each employee's computer system. Server computers must be configured to prevent users from accessing the hard drive and boot settings at startup. In which of the following locations should this be configured? A) Bus B) RAM C) USB D) BIOS

D) BIOS The Basic Input/Output System (BIOS) is a program that is used by the CPU to startup the computer when it is first switched on and can be configured with an administrator password that will prevent users from accessing the BIOS settings unless this password is known. The BIOS additionally manages communication between the CPU and the various devices on a computer including keyboards, mice, printers, hard disks and video cards.

You work as Server+ tech lead for a Data Warehousing company. Your company is already using Amazon AWS Cloud and now is looking for a matching DevOps system for its automation and configuration management needs. Which technology will you acquire for this? A) GRC B) DLP C) CodeCommit D) Chef

D) Chef You would use Chef. Chef is open source software that is used for configuring and managing a company's servers in an efficient and streamlined manner. Chef is suited for Amazon AWS Cloud. It provides configuration management capabilities with automation of resource provisioning. Chef is written using the Ruby programming language and can be easily integrated with any cloud platform. Chef's internal language, Ruby Domain Specific Language, is similar to fully featured Ruby and is an imperative language. This makes Chef a preferred option for those who have development experience. Chef also has Chef Compliance which helps organizations automatically have their systems inspected, vulnerabilities identified as well as non-compliant software versions found. This way Chef Compliance validates all the applications and infrastructure in your deployed configurations.

Several users report that they are unable to access any website. You successfully replicate the problem by attempting to access a website by its fully qualified domain name (FQDN). As a test, you try accessing a website by its IP address. This opens the site successfully. Which of the following is most likely the problem? A) UAC protection B) Device driver failure C) Disk fragmentation D) DNS error

D) DNS error A DNS error is most likely the problem. When you try accessing a website directly by its IP address, you are bypassing the DNS server. When you cannot access websites by their fully qualified domain name (FQDN), you have a DNS issue. Either the DNS server configured on the system in incorrect or the DNS server is down or unreachable. In this scenario, the problem is probably with the DNS server because multiple clients are experiencing the DNS failure. When you cannot reach a resource by its FQDN or host name, it is most likely a DNS issue if you can reach that same resource by IP address. If you cannot reach the resource at all, the resource is likely down or some intermediary device or connection is down.

An employee of the company you work for has said that she frequently gets an electric shock when she touches the power button on the file server. The floor of the server room has a glass wool-style finish, which could cause charge build up. Which of the following items will help reduce this problem? A) Compressed air B) POST C) Multimeter D) ESD gear

D) ESD gear

You work as a Server+ professional for a company's data center. The center is located along the coast and a recent tsunami has hit a lot of buildings on the coastline. You need to restore your data but your primary data center is destroyed due to water logging. What would you do? A) Run zeroing on the backup server B) Perform a synthetic backup C) Do a side-by-side restoration D) Restore to an alternate location path

D) Restore to an alternate location path You would restore data to an alternate location in the event that the primary data center is either non-operational due to damage or is compromised in terms of privacy. Restoring data to an alternate location can help business operations resume from another center that is operational and safe from threats. During an alternate restore process, the alternate location path needs to be specified in the backup application. The alternate location can be a different server hard drive, a different computer, and even a different network. You will need to verify if the security settings for the data in the alternate location is the same or similar to that at the primary location.

You are experiencing a problem with a server on your company's network. You realize that you may need to get the server repaired and possibly replaced. The server and its power systems are provided to you by a local service provider. The procurement deal included technical support during any unexpected downtimes. You need to provide the service provider with the legal documentation for the server. Which of the following will you need to ensure that this can be done? A) Dataflow diagram B) Server configuration C) Service manual D) SLA

D) SLA You should provide the service provider with the Service Level Agreement (SLA). This formal document has a written agreement regarding server uptime and downtime as well as how the vendor will compensate for any problems with the server.

ou are a Server+ professional working in a company's networking team. You are given the task of installing Windows on a large network of 100 computers as well as various add-ons and utilities for each of the computers. You need to do this within a few hours, as new company users will need the workstations ready by then. Which of these should you use? A) Rebooting B) Formatting C) Slipstreaming D) Scripted installation

D) Scripted installation You should use a scripted installation. The process of performing OS installation that is remote and automated is called a scripted install or unattended installation. This involves installing the operating system or application software on several network computers at the same time without the need to monitor each computer individually or without any involvement by a user. To perform an unattended installation, use a distribution server that has the installation files for the operating system you need to install. You then use client software to connect to the distribution server via a share point and then download and run the installation files.

You are looking after the server farm for a large database management company. You need to set up a backup system that is efficient in the use of bandwidth with the backups being stored on a cloud. You need a way to only upload the differences in the data between the server and the cloud and not do a full backup. Which backup option would you choose for this? A) DLP B) Incremental full C) Zeroing D) Synthetic

D) Synthetic You would use a synthetic backup. A synthetic full backup is a data backup process where a file is synthesized from several previous versions of a file. Unlike a regular backup where a file is simply copied into a new file, synthetic backups generate a file based on a complete file from a previous time and factors in incremental copies of that file made at later times. Synthetic backups, like all data backups, serve to protect data in the event of storage media failure.

ou have recently been asked by an animation company in Colorado to back up its entire catalogue of productions. The company premises are prone to flooding due to its proximity to a river. You need to choose the appropriate storage medium for this project. Which of the following is the LOWEST cost solution? A) Optical disks B) JBOD C) USB drive D) Tape drives

D) Tape drives Tape drives will provide the lowest cost solution.

You work as an IT consultant for a technical support company. You need the company's technicians to be able to work on the computers of clients who are in different regions around the globe. Your solution must allow the technicians to perform remote desktop tasks using an open-source solution. Which of the following should you deploy? A) ILO B) RDP C) KVM over IP D) VNC

D) VNC You should deploy VNC. Virtual Networking Computing (VNC) is a graphics-based desktop sharing software that allows one user to connect to another computer and use the other computer's desktop. This is done using the Remote Frame Buffer (RFB) protocol. It collects the keyboard and mouse events from one computer and relays them back to the other computer over a network. VNC is open-source software, which means it can be run on just about any computer. It is used successfully as a means to provide remote technical support.

You work as an IT consultant for a geo-survey company. Your company has installed a surveillance camera and various pieces of geological sensor equipment in an African game park to track the movement of animals. A Dell PowerEdge server is also installed at that site. Which of the following will allow you to manage the server remotely? A) KVM B) iLO C) CLI D) iDRAC

D) iDRAC Integrated Dell Remote Access (iDRAC) is a means to manage a Dell PowerEdge server remotely. Like iLO, the controlling hardware for iDRAC is embedded into each Dell PowerEdge server. iDRAC obviates the need for an operating system on the server or a hypervisor. It allows you to update, monitor, deploy, and maintain PowerEdge servers without the need for a software agent for systems management.

You are working with your company's human resources department to create a database for employee records. You are in the process of planning the data types for the database. You need to select a data type for storing employee birth years. Which data type would you choose for this? A) array B) string C) float D) int

D) int You would choose the int (integer) data type. This would also be useful if you needed to automate the calculation of employee experience and age or perform sorting operations on these. An integer data type is used to store a whole number. They can be positive, negative, or zero. The following is a valid use of the int data type:

You need to reduce the amount of heat in the server room to help reduce the cost of air conditioning for the company. You try to identify the exact cause of heat generation in the servers. Which of the following are key components that help regulate heat on a computer server? (Choose all that apply.) A) SMPS B) CPU C) NEMA D) RAM E) Liquid

E) Liquid A) SMPS Liquids and switched mode power supply (SMPS) both regulate heat on a computer server. Liquid cooling uses tubes filled with liquid coolant where the liquid is pumped and refreshed throughout the system via the tubes keeping the computer's internal temperature low. An SMPS is a power supply unit that converts electrical power in an efficient way using a switching regulator. It takes the power supply from the mains and regulates, resulting in no dissipated power and more efficiency. It does not regulate heat, but does have a lower heat generation.

You are an IT specialist for a Los Angeles-based production house. You have recently mapped a network drive to a user's computer so that she can access files on a server more easily. You get a call after an hour and the user tells you that she cannot access the drive anymore. You investigate and find that there is a "drive unavailable" message for all her copy operations on the network drive. What is the most likely cause of the problem? A) External drive B) Data corruption C) Corrupt boot record D) Dual OS

External drive The most likely cause of the problem is an external drive. Adding an external drive can cause the drive letters to change or conflict. This way a drive can show up as unavailable because the mount manager assigns an available drive letter to a drive that you connect to the system. If this drive letter conflicts with an existing mapped network drive, the mapped network drive will show up as unavailable. You can fix this issue by manually changing the drive letter using the Disk Manager application in Windows.

You are asked by your team to set up a monitoring system for your company's server farm. You want to ensure that the servers perform at their optimum levels and that each time the server utilization crosses 50%, actions are taken to look into its usage. Which of these will you need to configure for these tasks? A) The rule set for the metric B) The deduplication needed C) The underlying GPT table D) The ReFS of the server

The rule set for the metric You should configure the rule set for the metric. The metric in this case is CPU utilization. You configure threshold rules for your server systems by first defining rules for specific resources specifying the exact threshold on which notifications need to be generated. Then, various rules are compiled onto rule sets that can be aggregated onto various devices. Finally, you update the related agents to sync them with the new rule sets you have created. You can set rules based on events like CPU utilization, disk usage, user logins or logouts, and even database errors. You can configure notifications to be sent as either email messages, SNMP, or both of these. You can also set priorities for escalation for rules so that if a notification is not acknowledged within a set time period by the recipient, another one is sent to the recipient's manager and so on. The time period of this repeated notification can vary based on the rule's priority.

You work for an organization that needs a new central server. You have assembled the server and now need to procure its power supply. Your server has several components each of which have the following power draw: NIC - 10 watts Fan - 20 watts PCI - 100 watts Hard Disk - 50 watts Memory - 70 watts Based on this power consumption, which of the following power supply units would you use? A) 250 watts B) 400 watts C) 50 watts D) 100 watts

You should use a power supply rated at 400 watts.

Which of the following are hardware services provided by the chassis to blade servers? (Choose all that apply.) A) Cooling B) Cabling arms C) Rack mounting D) Networking E) Power

cooling,power,networ


संबंधित स्टडी सेट्स

Forensic Science Final Exam Review 2015

View Set

CompTIA 220-1001 Exam Actual Questions

View Set

Chapter 1: Test Your Knowledge and Attitude

View Set

Spanish Unit 5: Sophie y Charlie llegan a Honduras

View Set