SK 005 Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A sysadmin needs to order a new server. The server has to have a vast amount of storage space and run fast, but try to be as cost-effective as possible. What type of hard drive is best to purchase? 5400 RPM Traditional Hard Drive 15,000 RPM Traditional Hard Drive Solid State Drive (SSD) Thumb Drive

15,000 RPM Traditional Hard Drive Traditional hard drives (HDDs) use magnetic disks to store data. The content is read and written with an access arm. HDD rotation speeds are measured in rotations per minute (RPM). Having 15,000 RPMs would be the fastest option without buying more expensive solid-state drives.

A sysadmin is troubleshooting an issue with connectivity. The sysadmin gets an Automatic Private IP Addressing (APIPA) address. What is most likely the cause of the issue? A device fails to connect to DHCP. There is a disconnected ethernet cable. Wireless Access Point has lost power. There is an update pending.

A device fails to connect to DHCP. When a device fails to connect to the Dynamic Host Connection Protocol (DHCP), it is assigned an Automatic Private IP Address (APIPA), set to the standard range of 169.254.0.1-169.254.255.254.

A sysadmin is setting up a server cluster. The sysadmin is setting up a load balancer to distribute server requests to increase availability and performance. What variation of server cluster is best for this? Active-active Active-passive Failover-failback Five nines

Active-active Active-active clusters use a load balancer device to distribute server requests between the nodes. This design provides high availability and increases performance.

For regulatory reasons, backups must be kept for seven years at a financial company. A sysadmin needs to keep these backups but needs to free up physical space to continue to create new backups. What should the sysadmin do? Archive offsite. Remove full backup. Move a snapshot. Create incremental backup.

Archive offsite. Archives are not the same as backups. The archives retain data for long periods and are optimized for storage space efficiency. While backups are used for data protection, archives are used for long-term data retention for legal or regulatory purposes. Typically, archives can be taken off-site.

A sysadmin is setting up a new wireless access point (WAP). When a device connects to the WAP, it cannot connect to the internet. The sysadmin runs ipconfig and sees the Internet Protocol (IP) Address 169.254.0.13. What kind of address is this? Physical Layer Automatic Private IP Addressing (APIPA) Dynamic Host Configuration Protocol (DHCP) Loopback

Automatic Private IP Addressing (APIPA) Automatic Private IP Address (APIPA), which is shown by the Internet Protocol (IP) address range of 169.254.0.1 to 169.254.255.254, is the self-assigned address when the client fails to lease an address from a Dynamic Host Connection Protocol (DHCP) server.

A sysadmin has to set up a new server farm that allows for easy replication of Virtual Machines to scale the company's web application. They need to choose two types of hypervisor to allocate resources for this server farm. What are the two types of hypervisor? (Select all that apply.) Bare-metal Windows 10 Hosted Virtualization Guest

Bare-metal Hosted The first type is when the virtualization software is installed directly on the physical server, without using a traditional OS layer between the hardware and the hypervisor. This is called a bare-metal virtualization, or type-1 hypervisor. The hypervisor acts as its own OS. The second type is when a traditional OS, such as Windows Server, is installed directly on the physical server, and then the hypervisor software is added and runs within the OS. This is called a type-2 hypervisor, or hosted virtualization.

sysadmin is looking to choose between bare metal and virtualized server installations. What is one benefit of bare metal installations? Better security Cost effective Efficient use of hardware Shared resources

Better security In a bare metal installation, the operating system is installed directly on the server hardware. This provides the security, reliability, and performance required by some industries.

A sysadmin is receiving numerous tickets about Remote Desktop Services sessions showing the wrong time and date. This is a reoccurring issue that happens every time the server reboots. During troubleshooting, the sysadmin identified the cause. What is one possibility as to why the time and date are wrong? CMOS battery failure Windows update Application update Hard drive failure

CMOS battery failure The complementary metal-oxide-semiconductor (CMOS) chip holds basic configuration information for the server. It has a replaceable battery that allows the settings to save while power is disconnected. The battery will eventually fail. When that occurs, settings stored in the basic input/output system (BIOS) on the CMOS may be reset. The date and time may also not display correctly in the BIOS.

A new form of disaster recovery service has cropped up recently. It is more cost-effective than a traditional multi-site solution and can be set up to be geographically diverse in location. What form of site is this? Warm site Hot site Cold site Cloud site

Cloud site A cloud site is a site managed by CSPs that have their own geographically dispersed locations, redundancy, and recovery capabilities. A cloud-based DR solution may meet the needs of many smaller organizations.

A fundamental concept of device access and security is the administration of user accounts. Permissions for accessing file shares are typically assigned by security group. Users are then added to security groups as necessary. In what ways can a sysadmin manage local user accounts in Windows? (Select all that apply.) Computer Management System Configuration Services cmd

Computer Management cmd To create a local user account, open the Local Users and Groups console. One way to access this console is from the Computer Management console. Computer Management can be run on its own, in Windows, or from within the Microsoft Management console. Command prompt (cmd) can be used as a command-line interface method of setting up new users and making changes to local accounts.

A senior system administrator is looking to automate the creation of virtual machines. Imaging is one solution found. What are the benefits of imaging? (Select all that apply.) Consistent Very efficient Need for repeated manual configuration Cannot be used in a self-service environment

Consistent Very efficient One form of automated installation is imaging. Imaging is a consistent method of deploying server operating systems (OSs). One form of automated installation is imaging. Imaging is a very efficient method of deploying server OSs.

A sysadmin created a virtual machine to use as a template. The sysadmin wants to automate the deployment of new servers with this template. What should the sysadmin do to create this template? Create a backup. Restore a backup. Create an archive. Create a snapshot.

Create a snapshot. A snapshot is a read-only copy of data at a specific point in time. Snapshots are often used with VMs and some services, such as AD and Microsoft Exchange. Snapshots are usually most useful for retaining system settings.

A major part of a sysadmin's role is to troubleshoot issues in a consistent manner that can eliminate possible future reoccurrences. What should a sysadmin do throughout the troubleshooting process? Establish a plan of action Test the theory Identify the problem Document findings, actions, and outcomes

Document findings, actions, and outcomes While it is not part of the basic steps in troubleshooting methodology, it is important to always document findings, actions, and outcomes throughout the process. It is essential to keep clear documentation on the steps taken to resolve a problem.

During a normal audit of software installed on users' workstations, a sysadmin found a user with a piece of unauthorized software installed on their computer. The sysadmin needs to set up a way to prevent this from happening in the future. What should the sysadmin implement? Enable user access controls Enable encryption Install antivirus Disable secure shell (SSH)

Enable user access controls User access controls prevent escalation of certain actions in Windows and Linux. Specifically, having both User Access Control (UAC) and administrative permissions removed from an end-user's account will prevent them from installing software.

There are various ways to protect data from unauthorized access and distribution. A sysadmin is looking to protect a company's data. The protection method must ensure confidentiality, integrity, and non-repudiation. What method would best solve this need? Retention policies File auditing Backups Encryption

Encryption Encryption provides a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of cipher and one or more keys.

A server's file share is running out of storage space, and the server does not currently have any additional disk space available to expand the file share. The server has a few additional hard drive slots available. A sysadmin has just finished testing a theory on how to resolve the issue. However, before a sysadmin can make changes, what do they need to do, according to the fifth step in the troubleshooting methodology? Perform root analysis Verify full system functionality Establish a plan of action Implement preventative measures

Establish a plan of action In the basic steps in troubleshooting methodology, the fifth step is to establish a plan of action.

There are many parts to take into account when using cloud services. As such, this complicates the troubleshooting of issues as they arise. A sysadmin is troubleshooting a company's email service outage and verifies that the internet connection, software, and end-user devices are working perfectly fine. What type of an issue is this? Internal Standard Operating Procedure (SOP) External Scripting

External With the prevalence of cloud computing, many resources that users need must be accessible over the internet. Many organizations host some or all their internal services in the cloud. The internet connection is the pipe used to access those resources.

A sysadmin is participating in an office remodel, adding an additional floor of workspace. They are running network cabling to that floor, but it is 125 meters away from the main network closet. The connection must not be accessible by people outside of the two floors the company occupies. What is one type of media that can run between the two network closets? Wireless access point RJ-45 Cat6a Fiber optic Gateway

Fiber optic Fiber optic cable carries high-frequency radiation in the infrared light part of the electromagnetic spectrum. The light signals are also not susceptible to interference or noise from other sources. Consequently, fiber optic cable supports higher bandwidth over longer links than copper cable does.

A company needs to run cabling from one building to the next. The only available piping that runs where they need it also contains high voltage power. They are worried about high attenuation caused by signal noise leaking into the cable. What form of cabling should they use? Twisted pair cable Fiber optic cable Wireless access point (WAP) Coaxial Cable

Fiber optic cable Fiber optic cable carries very-high-frequency radiation in the infrared light part of the electromagnetic spectrum. Even though high frequencies are used, they are very closely contained within the optical media and can propagate more easily.

A sysadmin is researching an issue where files on the shared drive are going missing. It is not believed that the issue is malicious, but awareness of what is causing the issue is important to a company to prevent data loss. What function can be enabled on a server to accomplish this? File auditing Password lockouts Policy of least access Backups

File auditing A server can be configured for file auditing. These auditing logs attempt to access specified folders and files and determine whether or not the access was successful.

A sysadmin needs to set up a backup scheme that is relatively simple and easy to manage. The sysadmin is not looking to keep backups for archiving purposes. What backup scheme should the sysadmin use? First-In, First-Out (FIFO) Grandfather-father-son Full Tower of Hanoi

First-In, First-Out (FIFO) First-In, First-Out (FIFO) is the most straightforward backup scheme. The organization decides how many days of backups are required, and that is the number of tapes (or drives) used.

A sysadmin needs to set up a complete backup of the system. The sysadmin is going to run it at night to not impact end-users. What type of backup is the sysadmin running? Incremental Full Synthetic full Differential

Full Full backups are a complete backup of the system. They often take a relatively long time, especially when there is a lot of data on the server. The restoral process is relatively quick, because only one backup job needs to be used.

A sysadmin needs to prepare the server architecture to ensure business continuity in case of a device failure. Part of that may require automation to simplify restoration. What are potential automations that can speed up restoration in the case when there are no backups available? (Select all that apply.) Group policy Patch hardening Snapshot Hardware hardening

Group policy Snapshot Windows Servers use group policy to create a standard set of settings across multiple devices. Group policy can help automate much of the setup, eliminating manual installation of printers, shared drives, and security settings. Snapshots are a copy of a system's configuration at a given point in time. The system can later be reverted to that documented configuration, often reversing changes that might have occurred.

A sysadmin needs to protect a server by disabling features such as Universal Serial Bus (USB) ports, extra Network Interface Cards (NICs), and the Digital Video Disk (DVD) drive. By doing this, the sysadmin helps prevent some physical access to the server. What is this a concept of? Updating Segmentation Hardware hardening Patch hardening

Hardware hardening Hardware hardening begins with the physical server itself. First, disable any hardware components not needed by the system. These might include USB ports, devices, such as local DVD drives, or functionality, such as multiple NICs.

A sysadmin has decommissioned a server and needs to properly dispose of the data. A third party has suggested multiple options. Which highly reliable option should the sysadmin choose to completely obliterate the data on the hard drives? Incinerate drives Shred drives Format drives Smash drives

Incinerate drives The physical destruction of drives is a more reliable approach to protecting an organization's stored data. Incinerating a drive will destroy a hard drive's data and is highly reliable to prevent recovery.

A sysadmin is setting up a backup system to run backups every 1 hour. The sysadmin needs the backup to not take a long time, because if it takes longer than the interval, the backups will start to fail. What type of backup should the sysadmin set up after the first initial backup? Differential Synthetic full Full Incremental

Incremental An incremental backup is a backup of changes since a specific point and resets the archive bit. Backups are quicker than differentials, but the restoral process is slower.

Question A supervisor requires a bit more control over how updates and patching are handled at both the hardware and software levels. The supervisor suggested that patches need testing before being applied to the Content Relationship Management (CRM) software production environment. However, Capital Expenses (CapEx) need to be limited. The CRM provider sells a service that meets these requirements. What type of business model do they have? Software-as-a-Service Infrastructure-as-a-Service Virtualization Redundancy and High Availability

Infrastructure-as-a-Service With infrastructure-as-a-service, consumers access hardware that is maintained by the Cloud Service Provider (CSP). Consumers install and maintain Operating Systems (OSs) and applications on that hardware.

A sysadmin is installing a new Wireless Access Point (WAP). Devices cannot find the WAP to connect to it. The sysadmin tests the ethernet connection the WAP connects to, and it has connectivity. This issue is most likely at which layer of the Open Systems Interconnect (OSI) model? Layer 1 Layer 2 Layer 3 Layer 5

Layer 2 Layer 2 provides physical addressing of network devices so that they may be uniquely identified on the network. This includes the ethernet and wireless standards for connectivity.

An employee approaches a sysadmin with issues sending an email. The employee reports that the email client is failing to connect to the server even though the computer connects to the internet and everything else seems normal. What layer of the Open Systems Interconnect (OSI) model is the most likely cause of the issue? Layer 1 Layer 3 Layer 6 Layer 7

Layer 7 Layer 7 provides applications with the ability to access the network, including email, web browsing, file transfers, network sharing, and other services. Email typically uses the Simple Mail Transfer Protocol (SMTP).

A company wants to reduce Capital Expenses (CapEx) and total cost of ownership (TCO). They want to ensure the company does not have to maintain obsolete equipment. They do not want to move to a cloud provider and, instead, want to keep servers on-premise. What is an attractive option for this company? Leasing Private cloud Infrastructure-as-a-service Not replacing the equipment

Leasing The possible benefits of leasing server hardware include reduced CapEx/low upfront cost, reduced TCO, simplified budget with predictable monthly payments, and protection against hardware obsolescence.

A boss asks a sysadmin to justify why the company needs to implement data retention for their email system. The firm is in a highly regulated industry. What is an important reason for data retention? Legal consideration Unwanted publication Unwanted access Encryption

Legal consideration Industry regulations, including the management of Personally Identifiable Information (PII) and the Payment Card Industry Data Security Standard (PCI DSS) requirements, may involve some additional research on the part of the security team and the legal department.

A recently hired junior sysadmin is filling a position that was left vacant for over a year. During the time that position was left vacant, nothing was added to the previously implemented asset tracking system. What are some of the risks associated with not tracking assets? (Select all that apply.) License violations Lower capital expenses Lower total cost of ownership Misinformed purchasing decisions

License violations Misinformed purchasing decisions A risk of not correctly tracking Information Technology (IT) assets is license violations. A disorganized record of operating systems and applications makes it very difficult to manage licenses properly. A risk of not correctly tracking IT assets includes misinformed purchasing decisions. An organization will likely purchase duplicate devices or devices that are not well suited to their desired role.

A company approaches their sysadmin to give an assessment of the physical security of the corporate office and its data center. They ask the sysadmin to recommend a couple options to deter criminals. What are two examples of physical security? (Select all that apply.) Lighting Antivirus Host-based intrusion detection system Fencing

Lighting Fencing Physical security begins with the data center building and the property where it resides. Exterior lighting is an essential deterrent to criminals. Physical security begins with the data center building and the property where it resides. In high-security environments, the property may be gated and fenced.

sysadmin is setting up a Remote Desktop Services server and needs a way to connect a user's shared drives. What is one method to accomplish this consistently while signing in? Login script Logout script Simple Mail Transfer Protocol (SMTP) Dynamic Host Configuration Protocol (DHCP)

Login script Login script runs when a user logs in. The script customizes the user's environment, maps network drives, and automatically launches a particular application.

A sysadmin needs to create a backup script that will check if a specific folder path on 1000s of servers needs to be backed up or not. What type of code should the sysadmin use? Bash cmd Loop PowerShell

Loop Loops are repeating sections of code. In bash, there are four different types of loops: for, while, until, and select. For loops repeat a specific number of times, such as eight, before ending. While loops repeat as long as a particular test is true, such as the existence of a file.

A server is being set up with 4 terabytes (TB) of storage in one partition, but the operating system only sees 2 terabytes. What type of hard disk table configuration is being used? GUID Partition Table (GPT) Solid State Drive (SSD) Master Boot Record (MBR) New Technology File System (NTFS)

Master Boot Record (MBR) Master Boot Record (MBR) configuration supports only four partitions on the hard drives. MBR configurations only recognize drives that are 2 TB or smaller.

sysadmin fixed a date and time issue. Now, the server has kernel panics and crashes upon boot. The server has redundant power supply cables plugged into two separate battery backups. What may be the cause that the sysadmin should investigate? Cloud service provider's website is down Memory failure Power outage Network cable unplugged

Memory failure Memory sticks are particularly susceptible to power fluctuations and static electricity. Failed or failing Random Access Memory (RAM) causes operating system (OS) instability. On Linux servers, a kernel panic error may indicate problems with RAM.

An employee is trying to access an internal website. That employee reports that there is a "web page not found" error message. What is most likely the cause? Secure sockets layer (SSL) Multifactor authentication Misconfigured firewall Principle of least privilege

Misconfigured firewall Misconfigured firewall settings may cause users to be unable to access network resources. For example, an internal website might be set up, but if a firewall is misconfigured, then users will not be able to access the resource.

A junior sysadmin is approached by the owner of an organization. The owner wishes to cut down on using proprietary-licensed software, because the owner heard it is the easiest way to cut down on costs. The sysadmin needs to explain to the owner that proprietary licensed software may have its benefits over free and open-source software that are worth the associated purchase cost. Choose all benefits of the proprietary software licensing model (Select all that apply). More reliable vendor support Easier to modify and redistribute More reliable documentation No cost

More reliable vendor support More reliable documentation The proprietary licensing model is where the source code for the software is hidden. One possible benefit of proprietary licensed software may be more reliable vendor support. The proprietary licensing model is where the source code for the software is hidden. One possible benefit of proprietary licensed software may be more reliable documentation.

A new network was set up with the Internet protocol (IP) range of 192.168.13.2-192.168.13.100. The internet service provider has set up a static IP address of 104.215.148.63. How are devices able to connect to the internet with this connection? Network Address Translation Internet Protocol Reservation Segmentation Virtual Local Area Network

Network Address Translation Network Address Translation is a service on some servers and routers that substitutes the organization's single public Internet Protocol (IP) address for any traffic originating from or addressed to internal devices that have reserved IP addresses.

A small organization reaches out to a junior sysadmin to recommend a centralized storage solution for its users to save files to outside their workstation. They are concerned that a device may break down or be stolen. If that happens, they will lose important and confidential data. However, they are very price conscious. What recommendation would allow for centralized data storage, may include redundancy, but is relatively inexpensive? Network Attached Storage (NAS) Blade server Cloud backup for all workstations External Universal Serial Bus (USB) drive

Network Attached Storage (NAS) A network attached storage (NAS) device is essentially a group of storage devices with a Network Interface Controller (NIC). NAS devices are easy to add to the network and are relatively inexpensive.

A sysadmin set up a server with multiple network interface cards combining them into one single Internet Protocol address connection. This is what concept? Active-active Active-passive Network Interface Card (NIC) teaming Redundant Array of Inexpensive Disks (RAID)

Network Interface Card (NIC) teaming NIC teaming combines two or more network interface cards, or NICs, into a single virtual NIC with a single IP address configuration. The virtual NIC aggregates the bandwidth of the physical NICs, allowing a lot more traffic through the connection.

Many parts of a server require time to be precise to function. If, at any time, the time is no longer accurate, those parts may fail or present error messages. A sysadmin needs to ensure all devices within a domain have the proper time and date. What protocol should be used to ensure proper time and date? Network Time Protocol (NTP) Dynamic Host Connection Protocol (DHCP) Secure Sockets Layer (SSL) Kerberos

Network Time Protocol (NTP) The Network Time Protocol (NTP) manages time synchronization. NTP uses a client/server model that designates a time source that all systems in the network agree to use. That time source synchronizes its time with external time services.

A sysadmin is configuring a server with Windows Server operating system. What is the file system typically used for security and stability? XFS ext4 ZFS New Technology File System (NTFS)

New Technology File System (NTFS) New Technology File System (NTFS) is a 64-bit file system for Windows, with file compression and Redundant Array of Inexpensive Disks (RAID) support as well as advanced permissions tools and encryption.

A new systems administrator at an organization is working on a new project. The organization requires control over security and data, as the data they store is highly sensitive. They are willing to bear the increased costs and maintenance. What kind of deployment are they looking for? Software-as-a-Service Infrastructure-as-a-Service On-premise Cloud

On-premise With on-premise, the organization is responsible for all aspects of maintaining the servers, including provisioning, administration, security, troubleshooting, and purchasing.

A server recently crashed and refuses to boot back up. The company's shared drives are not affected. A sysadmin is running a system state backup restore. The sysadmin is not worried about replacing existing data during the restoration. What type of restoration should the sysadmin do? Overwrite Side-by-side Alternate location Bare-metal

Overwrite In the event of an incident, it is important to recover data back to its original location, overwriting whatever data currently resides there.

A user complains that their password has expired and they are unable to set a new password. What reasons may be preventing the user from setting a new password? (Select all that apply.). Password complexity Multifactor authentication Single sign-on Password reuse

Password complexity Password reuse Password complexity settings can be configured by a system administrator. Passwords can be required to use combinations of letters (uppercase and lowercase), numbers, and special characters. Password reuse settings can be configured by a sysadmin. It can be set that an end-user cannot set a new password that matches up to a specific number of password history.

A sysadmin needs to protect a server by updating the Operating System, updating hardware firmware, and updating applications. Doing this may eliminate many surfaces of attack by outside hackers. What is this a concept of? Patch hardening Hardware hardening File auditing Segmentation

Patch hardening Patch hardening relies heavily on patching at the firmware, OS, application, and device driver layers.

The office manager for a company is upset that the file server was down while the sysadmin was on paid time off (PTO). They demand that they get a key to the door to the server room in order to restart the file server. What type of security is this? Physical security Firewall Local area network Network Security

Physical security Physical security is the most fundamental form of computer security. It governs access to the server, the server's availability, and protection of the data stored on the server.

A sysadmin is wiring a new office for internet access and needs to ensure that proper building codes and connectivity quality expectations are followed when wiring network connectivity in the overhead space in the ceiling. What type of cable should the sysadmin use that will be the most reliable method to accomplish this? Plenum Coaxial Unshielded twisted pair Ethernet over power

Plenum Plenum-rated cabling is the standard to fulfill code requirements for building safety. Plenum cabling tends to be shielded and is the best option for internet connectivity while minimizing interference.

A sysadmin receives a support ticket stating that an employee is causing trouble after going through the Human Resources folder on the company shared drive. How does the sysadmin efficiently resolve the issue? Use data encryption Principle of least privilege Multifactor authentication Use single sign-on

Principle of least privilege The principle of least privilege means to grant the least amount of access to resources (files, services, etc.) as possible. It is likely that the user has excessive privileges.

A junior sysadmin in a small organization needs to order equipment. The small organization is looking to replace their aging hardware and does not know what to order. What are the four major subsystems needed for server specifications? Graphics Processor, Network, Memory, Storage Processor, Memory, Storage, Network Power Supply, Processor, Network, Storage Cooling Fan, Processor, Storage, Memory

Processor, Memory, Storage, Network The four major subsystems are the following: processor, memory, storage, and network. The processor represents the amount of processing power the system has available. The memory represents storage capacity available. The storage drives represent storage capacity. The network is the capacity for sending and receiving information.

A server just failed to boot. A sysadmin did a diagnostic test, and one of the hard drives has failed. Some data has been lost. What type of redundancy did the storage have? Redundant Array of Inexpensive Disks (RAID) 1 RAID 0 RAID 6 RAID 5

RAID 0 Redundant Array of Inexpensive Disks (RAID) 0 design provides no redundancy whatsoever. The lack of redundancy means that there should never be mission-critical information stored on it.

A sysadmin needs to set up a brand new server that protects against data loss, even if two disks fail. What type of Redundant Array of Inexpensive Disks (RAID) could this be? (Select all that apply.) RAID 10 RAID 1 RAID 0 RAID 6

RAID 10 RAID 6 RAID 10 is a RAID 0 stripe set that is mirrored. Rebuild times are fast, but the per-gigabyte storage costs are not as efficient as with RAID 5 or RAID 6. Redundant Array of Inexpensive Disks (RAID) 6 design distributes data across a minimum of four HDDs the same way that RAID 0 and RAID 5 do, but it also distributes parity information across two disks. The result is that a RAID 6 array can recover data even with the failure of two HDDs.

Physical security can include mounting servers and locking them to prevent anyone from accessing the hard drives (HDDs) or inserting a removable media device. What are servers typically mounted in? Network closet Rack Mantrap Desk

Rack A rack, typically found in a network closet, is used to mount servers. A rack also may aid in physical security, if enclosed.

A company has a dedicated network operations center. They have several server enclosures to manage their consumer-facing web applications. These server enclosures consume less horizontal space and are easily secured. What form factor of server do they have? Tower Blade Crash cart Rack

Rack The rack form factor is standardized and offers many advantages. The racks are 19 inches wide, and the vertical height is measured in units. A single unit is 1.75" (44.45mm) tall and is written as "1U."

A system architect has a project to implement: a web application that requires near-zero downtime. It is a business-critical application that would cost the company business and reputation if it failed. The system architect needs to make sure there is not one single point of failure. What is this idea called? Redundancy and high availability Virtualization Bare-metal install Software-as-a-Service

Redundancy and high availability Redundancy and high availability refers to when a basic virtualization deployment suffers from a single point of failure that impacts every guest VM on that server. For this reason, redundancy and high availability are essential for virtualization.

A senior sysadmin needs to ensure that a company's servers minimize single points of failure. The sysadmin is currently focusing on connectivity for their single server. What concept is this? Standard operating procedure (SOP) Virtualization Server redundancy Redundant networking

Redundant networking Redundant networking refers to eliminating single points of failure in the network infrastructure. Such redundancy is usually implemented in a mesh topology, where there are multiple communications paths through multiple network devices. Redundancy is particularly important for servers.

A Sysadmin needs to make a change to a Windows server remotely and securely. What administrative interface is best suited for this action? Kernel-based Virtual Machine (KVM) Remote Desktop Protocol (RDP) Secure Sockets Layer (SSL) Secure Shell (SSH)

Remote Desktop Protocol (RDP) Remote desktop protocol (RDP) is primarily used to access Windows Server and Windows workstations. It is also used for terminal services so that end users can remote into a workspace from any device.

A sysadmin needs the ability to manage a server, even if it is turned off. The sysadmin learned that the server supports out-of-band management. What are some benefits of out-of-band management of a server? (Select all that apply.) Merges administrative and production traffic Remote power on and off of server Increased security Increased performance of server

Remote power on and off of server Increased security One reason for out-of-band access to a device is the ability to power servers and other network devices on and off remotely. One reason for out-of-band access to a device is increased security by separating administrative traffic away from production network traffic.

Risks cannot be eliminated. A sysadmin is looking for ways to mitigate risks. Which of the following would prove least effective in mitigating risk? Conducting log analysis Monitoring data access Implementing Data Retention Removing Security Information and Event Management (SIEM)

Removing Security Information and Event Management (SIEM) Removing a Security Information and Event Management (SIEM) system would make it harder to detect and remediate security risks.

An employee was let go from a company and all the let-go employee's emails have been deleted. A sysadmin needs to prevent this from happening in the future. What type of policy should be set up to prevent data loss? Retention Encryption Backup Application hardening

Retention Most organizations have a data management policy that governs the company's ability to secure, track, update, and store data. The data retention policy is a subset of that data management policy.

A company purchased a new office building and needs to set up a network for employees to complete their work. What is a network device that operates on Layer 3 of the OSI model? Switch Network Access Control Router Media

Router Routers operate at Layer 3 of the OSI model, function using IP addresses, filter traffic, and link together one or more network segments.

A junior sysadmin is currently ordering a new server to replace an aging server that received constant complaints about being slow. Once the server arrives, what should the sysadmin do to ensure normal behavior for that server, regardless of the specifications? Install Linux. Install Windows 10. Run performance baseline. Add more memory.

Run performance baseline. Each server should have a performance baseline that documents its normal behavior; this permits administrators to empirically understand whether its performance has changed radically. Comparing an original baseline to the server's current performance is much more useful than saying, "The server seems slower than it used to be."

A junior sysadmin is looking to set up a simple backup of a file server. The small company the sysadmin works for cannot afford to set up a full-fledged backup system, but has an unused network attached storage (NAS) device available. What is one option available to provide a consistent and scheduled way to accomplish this? Swapping hard disks Manual copy Scripting Updating

Scripting Scripting provides fast, consistent, and automated configurations or reporting. Scripts are useful for tasks that repeat frequently. There are several scripting languages to be aware of, including Windows PowerShell and bash.

A sysadmin needs to make a change to a Linux server remotely and securely. What administrative interface is best for this action? Remote Desktop Protocol (RDP) Kernel-based Virtual Machine (KVM) Secure Sockets Layer (SSL) Secure Shell (SSH)

Secure Shell (SSH) Secure shell (SSH) is a standard tool to connect to Linux servers and network devices. It is not commonly used with Windows, but it can be added.

A sysadmin needs to set up two separate networks within the same physical location and needs to use the same hardwired connections for both networks. However, the network equipment is very basic, and there is no budget. How would the sysadmin accomplish this? Wireless Access Point (WAP) Segmentation Server Message Block (SMB) Virtual Local Area Network

Segmentation The purpose of segmentation is to isolate certain types of network traffic to certain areas of the network. Segmentation permits the administrators to exert greater control over the traffic.

A server has multiple forms of internally attached storage. Which is a form of internal storage? Storage Area Network (SAN) Just a Bunch of Disks (JBOD) Serial Advanced Technology Attachment (SATA) Network Attached Storage (NAS)

Serial Advanced Technology Attachment (SATA) Serial Advanced Technology Attachment (SATA) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives.

A junior sysadmin must differentiate between devices supported in the organization. What type of device hardware is designed for high performance, redundancy, and may have multiple network interface cards? Server Workstation Firewall Processor

Server Server hardware is designed for high performance and redundancy. Often, a server includes multiple network interface cards (NICs), power supplies, and hard drives (HDDs).

A sysadmin is advising the owners of a company on cloud computing. They are looking to revolutionize how Information Technology (IT) services are provided at their company. What is not something the admin will discuss based on the NIST? On-demand self-service Server Redundancy Measured Service Resource Pooling

Server Redundancy Server redundancy refers to multiple complete servers that can manage a service, such as the server nodes in a cluster. There are five characteristics defined by the National Institute of Standards and Technology (NIST). One of them is on-demand self-service; resources are provisioned when needed by the consumer. There are five characteristics defined by the National Institute of Standards and Technology (NIST). One of them is measured service; resource utilization is monitored and billed based on actual use. There are five characteristics defined by the National Institute of Standards and Technology (NIST). One of them is resource pooling; compute resources are pooled together and then allocated to tenants.

As a company expands, various services may need to be integrated to cut down the number of accounts being managed by a sysadmin. What system can be set up to link accounts? Multifactor authentication Single sign-on Password auditing Password complexity

Single sign-on Single sign-on permits the use of the same credentials across multiple systems. This can help lower the number of credentials users are required to remember.

A systems administrator is looking to cut down on Capital Expenses (CapEx) and to limit the cost of on-premise installing, maintaining, patching, and upgrading the Content Relationship Management (CRM) software. The CRM provider sells a service that meets these requirements. What type of business model do they have? Infrastructure-as-a-Service On-Premise Platform-as-a-Service Software-as-a-Service

Software-as-a-Service With software-as-a-service, consumers have access to the software, but the responsibility for installing, maintaining, patching, and upgrading that software lies with the vendor. The vendor is also responsible for support.

Upper management wants to set up a server architecture that allows for rapid deployment of servers for future expansion needs. The sysadmin wants to ensure that the servers are set up correctly, even if someone else has to do the setups on their own. What kind of document should be created that is available and usable across the entire department? Standard Operating Procedure (SOP) Design documentation Inventory management Service manual

Standard Operating Procedure (SOP) The purpose of an SOP document is to state detailed instructions for how to complete a specific task. These instructions are clear enough to be followed by anyone and produce consistent results. Most organizations create SOPs from standard templates, which will usually contain similar information.

A system administrator set up a backup for the company shared drives. That sysadmin wants to also set up another backup to specifically target essential operating system configurations. What kind of backup should run? File-level Incremental Full System state

System state System state backups duplicate the essential OS configurations. These configurations can then be quickly restored to the same machine in the event of corrupted system files or misconfigurations.

A traditional Network Operations Center is not available. A sysadmin needs to order a server that may be more useful in a small office. What form factor of a server should be bought? Blade Laptop Tower Crash cart

Tower A server with a tower form factor fits easily into space not normally designed for large servers. This is useful in small offices or other settings where a traditional NOC is not available.

There are multiple backup schemes. A sysadmin wants the backup scheme to be effective for archiving and allow for recovery of older information. What backup scheme should the sysadmin use? First-In, First-Out (FIFO) Tower of Hanoi Grandfather-father-son Full

Tower of Hanoi The Tower of Hanoi backup method allows for the recovery of older information but is not as efficient for the restoration of recent information. It is an effective archiving scheme.

A sysadmin is looking to contract a third-party vendor for disaster recovery in case the main corporate office goes down. The sysadmin wants to balance cost with speed of recovery. However, they want a more traditional multi-site option. What is the best type of site to have the vendor set up? Cold site Hot site Warm site Cloud site

Warm site Warm sites contain the necessary space for the data center and business offices and some of the required computer and network hardware. Some equipment needs to be brought in, and some configuration needs to occur.

As part of an organization's change management process, a system needs to be set up to manage patching. A sysadmin has a Windows environment and wants to ensure that all devices on the domain are updated according to a schedule and a set of criteria. What type of system should the sysadmin set up? Time Management Application Hardening Windows Update Windows Server Update Service

Windows Server Update Service In most business settings, administrators configure a Windows Server Update Service (WSUS) server to manage the patching process, including approval, staged deployments, and reporting.

A hardware firewall is having issues completing Virtual Private Network (VPN) connections. A sysadmin needs to determine what step of the connection process it fails. What software can sniff the traffic and display the contents of that transmission? Wireshark Antivirus Card reader Ethernet

Wireshark Wireshark and tcpdump are both packet sniffers that can intercept network traffic. Both tools display packet header information, such as source and destination IP address, source and destination MAC address, and transport layer protocol.

A server is being set up with a Linux operating system. It needs to have its hard disks partitioned to support very large partitions, ACL permissions, and compression. What file system should be used? Ext4 ZFS New Technology File System (NTFS) XFS

ZFS Sun Microsystems created the ZFS file system. It is a scalable and efficient file system that supports very large partitions. The open-source implementation of ZFS is Open-ZFS. Many Linux systems use ZFS, especially for enterprise-class servers.

A server is running out of space, which is starting to cause problems for users. A sysadmin is managing the Linux server's file system to see what is consuming much of the disk space. They used a standard storage management command but need it in a more human-readable format. What command and option should they use? df -h du -h diskpart -d fdisk

df -h In a Linux environment, there are multiple ways to monitor storage usage. df -h displays storage capacity for filesystems or partitions.

A sysadmin deployed a RemoteApp to each employee's computer in the Human Resources group. However, a user reports that they do not see the RemoteApp. What command should the sysadmin run on that user's computer to investigate the issue? fdisk ipconfig gpedit cmd

gpedit gpedit is the Windows command used to investigate Group Policy and which policies are applied to a specific user or computer. It can be used in conjunction with gpresult to determine if a policy is properly applied to a user.

A sysadmin has a brand new server that has a Linux Operating System installed. They need to manage the disk partitions. What commands could be used? (Select all that apply.) Disk management parted fdisk diskpart

parted fdisk parted is used to manage partitions after Linux is installed. Depending on the Linux distribution, there may be other built-in tools to configure partitions. fdisk is used to manage partitions after Linux is installed. Depending on the Linux distribution, there may be other built-in tools to configure partitions.

A system administrator is troubleshooting issues in their environment. What is one command line tool that can assist in intercepting network traffic? nslookup ipconfig ip addr tcpdump

tcpdump Tools such as Wireshark and tcpdump are used to intercept network traffic. Both tools display packet header information, such as source and destination IP address, source and destination Media Access Control (MAC) address, and transport layer protocol.


संबंधित स्टडी सेट्स

Chapter 10- Sun ,earth moon 5th grade

View Set

US History Module 7 Study Set -40

View Set

5% CHAPTER 10: Legal Descriptions

View Set