Advanced Network Administration Using Microsoft Windows Server: Final Exam
A server technician wants to list the cache of NetBIOS names and IP addresses. Which of the following utilities will he use?
nbtstat
A server technician is informed that all four hard disks in a server enclosure have failed. Which of the following is the most likely cause for this failure?
Backplane failure
Which of the following are the possible causes of Internet connectivity failure? Each correct answer represents a complete solution. Choose all that apply.
Bad cables Failure of ISP Improper IP Configuration
Which command-line utility enables a user to manage objects by using scripts or direct input at a command prompt?
diskpart
In Windows Server 2012 R2, which of the following MS-DOS-based utilities has been replaced by the diskpart command?
fdisk
Which of the following is the IPv6 prefix of a link local address?
fe80::/64
Which server could be the source of an inability to connect to a local host by name?
DNS server
What command is used to connect to shared drives?
net use
Which of the following commands is used to connect or disconnect from shared resources?
net use
Smith, a server technician, detects that destination host is unreachable. Which of the following are the causes of this issue?
Failure of the NIC card Incorrect destination IP address
Which of the following are switches used with the ipconfig command? Each correct answer represents a complete solution. Choose all that apply.
renew release flushdns
When the default gateway address is incorrect on the router, which connections will succeed?
From a local device to a local device
Which of the following is the most common cause of backup failures?
Human error
Which of the following combinations of factors indicates an I/O issue?
I/O is high, use of swap is low, and the use of memory is high
Angelina works as a technician for uCertify Inc. John, a user, complains that his CD drive is not working. Angelina needs to ensure that the power coming to the CD drive is correct, and therefore, she has to check its voltage. Which of the following tools will she use?
Multimeter
Which of the following is used for measuring voltage, current, and resistance of a device?
Multimeter
Which of the following is used to test a power supply?
Multimeter
Which of the following tools is used to measuring voltage, current, and resistance?
Multimeter
Which of the following do not need to be matched correctly?
Multiple network cards
Which of the following would not be a cause of an inability to connect to the Internet?
The MAC address of the computer
What is the code number of a destination unreachable message when it indicates the destination host is unreachable?
1
What command can be used in Linux to detect bad sectors?
badblocks
Which of the following addresses is used to test the functionality of the NIC?
127.0.0.1
Which of the following is an APIPA-generated IP address?
169.254.5.9
When using an air compressor to remove dust in a server, what is the maximum pounds per square inch (PSI) you should use?
40
What should the humidity be in the server room?
50 percent
What should the ambient temperature inside a server?
60-90 degrees
Which IPv6 loop back address is used to test the functionality of the NIC?
::1
You receive a destination unreachable message with a source IP address. Where is it coming from?
A remote router
Which of the following is a feature used to automatically configure IP-based hosts that are unable to reach a DHCP server?
APIPA
Which of the following terminators does the Low Voltage Differential (LVD) mode use?
Active
How should you use compressed air inside the case?
By short bursts
How are POST issues reported during startup when the display is not functional?
Beep code
Which of the following starts by using a preselected minimal set of drivers and startup programs?
Clean boot
Which security tool is used to view and alter the encryption of files on an NTFS partition?
Cipher
Max, a server administrator, found that an older server has performance issues on writing files to a RAID array. After checking for failed drives, no problems were found. Which of the following should he check next?
Cache battery
For security concern, a server administrator wants to verify integrity of data retrieved from servers. Which of the following security tools should the server administrator use?
Checksum
Which of the following events is caused by a cycle of overheating and cooling inside of a system?
Chip creep
Which of the following will result from an L2 cache failure?
Degraded performance
Rose is examine her organization's event logs and observes various instances of ex-employees accessing the company's assets and resources. As she continues to investigate, she notices that it happens at random intervals throughout the day. Which of the following will she do to mitigate this issue?
Disable unnecessary accounts
What is the last step in the CompTIA troubleshooting model?
Document findings, actions, and outcomes throughout the process
What can be the result of low humidity?
ESD
You have just tested your theory of a problem to determine the cause. Based on the standard troubleshooting model, what will be your next step?
Establish a plan of action to resolve the problem and notify impacted users
Which of the following is not a source of slow hard drive performance?
Excessive interrupts
Which of the following allows a server to communicate on internal or external networks using technologies such as SCSI, Fiber Channel, and SATA?
HBA
Which of the following provides input/output processing and physical connectivity between a server and a storage device?
Host bus adapter
What is the first step of the troubleshooting model?
Identify the problem and determine the scope
A server technician wants to troubleshoot problems affecting a server. What are steps in the troubleshooting process? Each correct answer represents a complete solution. Choose all that apply.
Identify the problem and determine the scope Establish a theory of probable cause Test the theory to determine the cause
Max, a server administrator, has informed about a database server that creases at random times. He identifies that no changes have been made either to the server's software or hardware. Which of the following is the first step he should take towards resolving this issue?
Identify the problem and scope
Rex works as a network administrator for uCertify Inc. The company has a Linux-based network. He configures a new Linux computer and installs it in the network. He wants to determine if the network interface is working properly. Which of the following commands will he use to accomplish the task?
Ifconfig
You work as a network administrator for a company. Due to specific security concerns of your company, you need to prevent sensitive data from being sent out of your network without authorization. You've blocked and monitored ports (as many as you can) on your firewall, and run an anti-spyware package. Which of the following is another step you should take?
Implement an IDS
Which of the following behaviors affects a WLAN but not a weird LAN?
Interference
At what layer of the OSI model are devices in different VLANs separated?
Layer 2
Which of the following occurs when an application is issued some memory to use and does not return the memory?
Memory leak
In Linux, which of the following can cause an inability to locate the operating system?
Missing GRUB
Mark, a network administrator, wants to use a TCP/IP utility that shows the status of each active network connection. Which of the following TCP/IP utilities will he use?
Netstat
Andrew, a network administrator, wants to display the IP address of a host name, or the host name of an IP address. Which of the following utilities will he use?
Nslookup
Mark works as a network administrator for a company, which has a Windows-based network. The network has a DNS server installed. Mark experiences host name resolution problems on the network. To rectify the situation, he wants to troubleshoot DNS resolution problems on the network. Which of the following utilities will he use to do this?
Nslookup
Which of the following is a built-in diagnostic program that runs every time a server starts up?
POST
Andrew, a technician, wants to use a tool that can integrate diagnostic and reporting capabilities to provide a comprehensive view of an organization's network. Which of the following tools will he use?
Packet sniffer
Which of the following actions should be taken before making changes during troubleshooting?
Perform a backup
Which of the following will allow a technician to examine activities on different counters?
Performance Monitor
Which of the following TCP/IP utilities transmits a datagram to another host?
Ping
Smith, a server technician, has been given a task to identify, locate, and resolve security issues of the server. Which of the following tools will he use? Each correct answer represents a complete solution. Choose two.
Port scanner Protocol analyzer
Which of the following statements are true of a server backplane? Each correct answer represents a complete solution. Choose three.
Provides a connection point for the blade servers Provides data and control signal connectors for the hard drives Provides the interconnection for the system/component status LEDs
Which of the following steps to eliminate a zero-day attack issue helps a user prevent malware from propagating?
Quarantine
Leena, a server administrator, wants to maximize data availability and protect data from many of the common errors that can cause data loss. For achieving this, which of the following filesystems will she use?
ReFS
Which of the following file systems maximizes data availability?
ReFS
Mark, a technician, diagnoses that the application settings stored in the registry are damaged during troubleshooting server hardware components. Which of the following solutions should he use to resolve this?
Reinstall the operation system
What is typically the solution if an integrated component does badly?
Replace the motherboard
Which of the following provides real-time graphs and detailed information about CPU, hard disks, network, and memory?
Resource Monitor
Which of the following tools can track the use of the CPU, memory, disk system, and network card in real time?
Resource Monitor
Which of the following is a short-term voltage drop?
Sag
Jason works as a security administrator for a company. He needs to find out which system a specific user is trying to login at multiple times of the day. Which of the following log types will he check?
Security
Which power-related threat is a short increase in voltage that can do irreplaceable damage to equipment?
Spike
Which represents a short increase in voltage that can do irreparable damage to equipment?
Spike
Which of the following could not be a reason why a user cannot logon?
Spyware
Which of the following is conceptually like a virtual disk?
Storage space
Which of the following should be the same on all devices in the same subnet?
Subnet mask
Which of the following commands provides a computer security feature that helps to control system access and system exploits?
Sudo
Which of the following devices uses the port security feature to prevent the attachment of unauthorized devices?
Switch
Which of the following records information, warning, or error messages generated by system components?
System logs tool
Which of the following is the third step of the troubleshooting mythology?
Test the theory to determine cause
Which of the following is not a best practice when manually rebuilding RAID arrays?
The drives should be placed back in the reversed order of removals
What are you hiding when you disable SSID broadcast?
The network name
Which of the following is true of server backplanes?
They can be a single point of failure
Which of the following is the recognition, diagnosis, and resolution of problems affecting a server to restore it to its normal operation?
Troubleshooting
Which of the following is a standard firmware interface for PCs designed to replace the BIOS?
UEFI
Which of the following is designed to replace the BIOS?
UEFI
In Linux, which of the following commands is used to attempt filesystem or drive repairs?
fsck
In Linux, which file is used to mount partitions on boot?
fstab
Which of the following is a file used in Linux to mount partitions on boot?
fstab
Which of the following is used to locate an operating system in Linux?
grub
Which tool can be used to restore the boot sector in Linux?
grub
Which command is used to clear incorrect IP address-to-hostname mappings that exist in the devices?
ipconfig/flushdns
Which command generates the following output? Default Server: nameserver1.domain.com Address: 10.0.0.1
nslookup
What command is used on a router to identify the routes of which the router is aware?
show ip route
Which command can be used in Linux to identify performance information with respect to memory, CPU, and storage?
top
Which of the following commands in Linux can be used to diagnose a memory issue?
top
Which commands are used on a router to identify the path taken to a destination network? (Choose two.)
tracert traceroute