Server + Cert Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You need to outfit your company's servers with new power supply units (PSUs). You need to instruct your staff on the use of a PSU. Which of the following correctly specifies the function of a PSU regarding electricity? A) AC to DC B) DC to AC C) DC to DC D) AC to regulated AC

A) AC to DC A power supply unit (PSU) converts AC current (alternating) to DC (descending) for use by the computer.

Which of the following are hardware services provided by the chassis to blade servers? (Choose all that apply.) A) Cooling B) Networking C) Cabling arms D) Rack mounting E) Power

A) Cooling B) Networking E) Power The chassis provides cooling, networking, and power to the blade server. A blade enclosure, also known as a blade chassis, provides the following services:

You have been asked by your company's IT manager to upgrade the cooling systems on all the company's servers. However, due to budgetary constraints, you need to choose a solution that is the most cost effective. What would you choose for this? A) Fans B) NEMA C) Bus D) Liquid

A) Fans The most cost effective solution is fans. Computers need cooling to remove heat produced by the components inside the computer. This way the temperature of the computer stays within the limits of the recommended operating temperature of the computer. Excessive heating inside a computer can damage the components.

You are in charge of IT security for your company, which is a stock-broking company based out of Wall Street in New York City. You need to ensure that the computers on the network are safe from any threats of unauthorized access. Which of the following is MOST likely a potential security threat? (Choose all that apply.) A) OS updates B) HIDS C) Open ports D) Application updates E) Extra software

Although all of these options could be exploited by attackers, open ports and extra software are the most likely potential security threats. Open ports are a point of possible attack for hackers. Physical ports can be used by employees to connect removable storage to copy sensitive data. If a software port is unexpectedly open on your system, it indicates malware may be installed using these ports to communicate with hacker servers. You use the netstat tool to view all open ports on a system.C) Open ports E) Extra software

You are an IT specialist for a Los Angeles-based production house. You have recently mapped a network drive to a user's computer so that she can access files on a server more easily. You get a call after an hour and the user tells you that she cannot access the drive anymore. You investigate and find that there is a "drive unavailable" message for all her copy operations on the network drive. What is the most likely cause of the problem? A) Dual OS B) Corrupt boot record C) External drive D) Data corruption

C) External drive The most likely cause of the problem is an external drive. Adding an external drive can cause the drive letters to change or conflict. This way a drive can show up as unavailable because the mount manager assigns an available drive letter to a drive that you connect to the system. If this drive letter conflicts with an existing mapped network drive, the mapped network drive will show up as unavailable. You can fix this issue by manually changing the drive letter using the Disk Manager application in Windows.

You have several tower servers that you manage. You want to use a new feature that was recently made available with the server's video card. However the feature is not showing up in the video card settings. Based on this, which of the following seems to be in need of an update? A) Operating system B) Firmware C) Security software D) Device driver

D) Device driver When a hardware device does not provide you with new features or does not work properly, its device driver may need to be updated. A device driver is a computer program that allows you to control the device. Most operating systems come pre-packed with drivers for common hardware devices such as CD-ROM drives, printers, and sound and graphics cards. The latest versions of device drivers are obtained from the device manufacturer.

You are the IT Manager of your company which has several thousand servers in a cross-U.S. network. Your team is involved in gauging the depreciation in the value of all IT assets. In which step of the lifecycle are you involved? A) Procurement B) Disposal C) Usage D) Maintenance

D) Maintenance You should gauge the depreciation in IT asset values during the maintenance phase.

A server is having trouble booting. The user reports that when starting up the server, the OS does not show up at all. You check the BIOS and see that the hard drives are all detected. What is most likely the source of the problem? A) Boot loader corrupt B) Runaway process C) Drive not mounting D) Device driver missing

A) Boot loader corrupt The source of the problem is most likely a corrupt boot loader. An operating system (OS) boot failure occurs when the boot loader is corrupt or the OS cannot be loaded or found. This can happen when the hard drive on which the OS resides is damaged. This can also happen if the BIOS is not detecting the hard drive. When faced with an OS boot failure, you should boot from the installation disk of the OS to replace or repair the boot loader.

You are setting up a virtualized network for an online shopping company. You need to allow several virtual machines to access the production network directly. Which of the following will allow you to make this possible? A) Bridging B) Virtual NIC C) NAT D) Virtual switch

A) Bridging Bridging will allow you to access the production network directly with several virtual machines. NAT will not allow this. There are two main options when providing network connectivity for a virtual machine:

You are the lead Server+ engineer for a digital publishing firm. Your company has recently moved its entire server machines from a location on the East Coast to the West Coast with the transfer happening by airline cargo. During the setup at the new facility, you need to instruct your technical team to reseat various peripheral components and cables if there are any issues in any of the machines. Which of these will you not need to reseat in possible loose connection issues? A.CPUs B. Peripheral Cards C. Power Cables D. RAM chips

A) CPU You will not need to reseat the CPUs. CPUs are fastened tightly to the motherboard and do not come loose easily when server machines are moved. They should ideally be the last item to check when checking for loose connections in a machine. All other peripheral components and cables, including but not limited to the following list, can be reseated to fix issues due to loose connections: Expansion cards RAM chips Power cables Internal data cables Video cables The process of reseating requires you to remove the component and then attach it back correctly, carefully ensuring it is connected securely and firmly. You would need to replace certain cables or peripheral components if you have verified they do not work anymore. For instance, a keyboard may not be responding on a server machine. You can check this by bringing in a different keyboard to verify this. This means you need to replace the keyboard. Similarly, a SATA cable inside a server may not be working, and for that you may need to test it outside of the server. Power cables can degrade over a period of time, especially when they are seated at an angle causing the rubber casing on them to erode. This can be identified by a visual inspection. In such a situation, the cable should be replaced immediately to ensure there is no electrical accident. Laptop adapters may need replacement as well from time to time. Damaged laptop adapters can also cause a burning smell. In such a case, you can try running the laptop on batteries and see if the smell goes; if so, you need to replace the power supply.

You have recently joined a new stock-broking company on Wall Street. They have an office network of about 50 computers. You need to install a security system on the network that will protect it from external threats. What should you do? A) Configure a firewall. B) Restrict system services. C) Configure PKI. D) Install a HIDS.

A) Configure a firewall. You should use a firewall to protect the network from external threats. Firewall rules determine which traffic is allowed into and out of a network or host. Only network traffic that is known to the firewall is allowed in, and all other traffic is blocked. Application-layer firewalls protect against attacks on web servers. They block out malware which are software programs that can harm computers. Malware includes viruses, Trojan horses, worms, and spyware.

You are the IT head of an e-learning company with about a 100 writers and designers, each of whom has a computer that is connected to a main server in the datacenter. You have configured one of the domain controllers as a global catalog server. One day, you receive reports that none of the users can log in to the system. You check the global catalog server but it is working fine. What could be the problem? A) DNS server failure B) Performance monitor C) BSOD D) Memory leak

A) DNS server failure The likely problem is DNS server failure. You should always perform full troubleshooting when a user is unable to log on. There can be several causes for a user's inability to log on:

Question #14 of 90 Question ID: 1469954 You work as chief technical consultant for the data center of an online shopping firm. You have been asked to investigate an issue with the main server in the data center. The Linux server has frozen, is not taking any keyboard input, and the screen is full of operating system messages. Which problem could this indicate? A) Kernel panic B) Monitor breakdown C) Keyboard failure D) Locked files

A) Kernel panic This could be an indication of kernel panic. Kernel panic is a serious error in the operating system (OS) of UNIX-based OSs and Mac OS X and causes the system to go into a state of non-recovery. It is similar to the blue screen of death (BSOD) found on Windows computers, which is caused by a general protection fault (GPF). A kernel panic event causes a series of messages to be displayed on the screen. These messages, although useful to technicians, can be confusing to an everyday user. One main reason for kernel panic is when the OS attempts to write data to a part of memory in an inappropriate manner. Malware and bugs in the application code can also cause kernel panic. Improperly seated RAM chips, corrupt data, hard disk failure, device driver incompatibility, or dysfunctional microprocessors can all cause kernel panic.

An employee in a technical writing company tries to print a study guide on a network printer but the job fails. The network printer is attached to a central print server. You investigate and try to print a single page, which prints successfully. Which of the following is the most likely reason the study guide is not printing? A) Low disk space B) Fragmentation C) UAC D) Damaged device drivers

A) Low disk space The most likely reason the study guide is not printing is low disk space. Insufficient disk space can cause larger print jobs to fail while allowing smaller ones to run. Virtual memory is space on the hard disk that the operating system uses for its processing. You need to set the size of this memory, and it needs to be sufficient for the OS and its applications to run properly. Misconfigured virtual memory can result in error messages about virtual memory. Corrupt virtual memory is usually best resolved by rebooting the computer. Usually, the size of the virtual memory needs to be set to an initial amount of 1.5 times the RAM on the system with a maximum size of 3 times the RAM.

You are asked to set up a computer network for a company providing satellite guidance systems implemented via software. The computers need to process the incoming data from the satellite in real time and send back guidance data. This requires all the computers on the network to be synchronized with each other. For this to work properly, server clock times must be kept in sync on the network. Which of the following servers should you implement to provide this service? A) NTP server B) Directory server C) Virtual server D) Database server

A) NTP server An NTP server can be used to keep the clock times in sync on the network. Network Time Protocol (NTP) is a protocol in networking that provides a means to synchronize the internal clocks of computers on a network. This is very useful because networks can have latency in the transmission of data packets.

Your company needs you to set up a new server and install the DBMS for it. You have a situation where the database server will have a practically unidentifiable number of client machines accessing the server. Which licensing option should you go for when purchasing SQL server for your company? A) Per-core B) Per-server C) Per-instance D) P2V

A) Per-core A per-core licensing option will be most suitable for this scenario. This is because the number of client machines is unlimited. Per-core licensing involves setting licensing based on the number of CPU cores used. This licensing option is independent of the number of client machines using the server with the license. This is a suitable option for a server that is external facing with a number of clients that cannot be ascertained due to the high or variable number of the clients.

You work as a Server+ specialist for a university. The department of multimedia has recently inducted a hundred new students and needs you to create a workstations for each student with an identical configuration of operating system and graphics processing software as found on the graphics teachers' computers. Each of these will be hosted on a virtual platform. Which of these would you do? A) VM cloning B) Slipstreaming C) Physical cloning D) OS installation

A) VM Cloning You should perform VM cloning. A virtual machine (VM) clone is a copy of a specific VM. The copy or clone is cloned from a parent VM. The new VM operates as an independent and separate VM. The purpose of cloning is to provide several VMs to multiple users, each of which have an identical configuration. A key advantage is that you ensure that the disk space allocated to the VM will never be exceeded by the VM while it is in use.

You manage the computer network for a technology support company based out of Toronto but with support centers all over the world. Technicians sometimes need to use remote desktop to control computers on a different continent. You have been informed that the security of the network has been compromised. Which of the following should you disable right away? A) WOL B) USB drives C) Endpoint security D) HIDSA) USB drives

A) WOL You should first disable WOL. A Wake-on-LAN (WOL) is a protocol that allows you to turn on a computer system from a remote location. This can cause a security hazard as a hacker can access a computer and control it using WOL. To disable WOL on a computer, you need to disable the WOL option in the computer's BIOS setup.

You work for the IT department of a music record label company based in Los Angeles. You receive a service bulletin stating that the equipment purchased a few months ago and used for digital mixing and mastering needs to be repaired. You decide to get the vendor to repair the item. Which of the following will you need to provide to the vendor to get the repairs done by them? A) Warranty B) License C) Serial number D) Label

A) Warranty You will need to provide the vendor with the warranty. An item that is under warranty can be repaired or replaced by the vendor. All the hardware procured by the company needs to have its warranty inspected. The warranty of a device is a written guarantee from the vendor that provides a time frame within which any malfunction of the device will result in its repair or replacement by the vendor.

You work for an accounting firm that has a small office network. You need to choose a cable to connect a new office computer to the company's twisted-pair network via the hub located on the floor on which the new computer resides. Which of the following could you choose for it? (Choose all that apply.) A) RG-6 coaxial cable B) 568A patch cable C) RG-59 coaxial cable D) crossover cable E) 568B patch cable

B) 568A patch cable E) 568B patch cable You could choose either a 568A or 568B patch cable, also known as CAT cables. These are RJ45 cable types and are used as wiring mechanisms to end twisted-pair copper cables used for networking. RJ45 is a connector with eight wires and is used to connect computers to networks such as LANs.

You are the system administrator for a company's computer network. You have been informed that a new lot of 200 employees is joining the company, and you need to set up their user accounts and password settings on the company's system. Which of these should you implement in order to maintain a safe and secure password policy for your company? A) Account lockouts B) All of these C) Password history tracking D) Minimum password length

B) All of these You will need to implement account lockouts, minimum password length, and password history tracking to enforce a strong and secure password policy for your system. Password policies are a set of rules for ensuring security within an organization by encouraging users to keep strong passwords and update them frequently. Maintaining strong passwords ensures safe transactions, keeps private data safe, and reduces the risk of unauthorized access to a company's systems. Password polices are enforced by a system administrator. A few best practices enforced by system admins today in regard to passwords include:

You work as Server+ tech lead for a Data Warehousing company. Your company is already using Amazon AWS Cloud and now is looking for a matching DevOps system for its automation and configuration management needs. Which technology will you acquire for this? A) DLP B) Chef C) CodeCommit D) GRC

B) Chef You would use Chef. Chef is open source software that is used for configuring and managing a company's servers in an efficient and streamlined manner. Chef is suited for Amazon AWS Cloud. It provides configuration management capabilities with automation of resource provisioning. Chef is written using the Ruby programming language and can be easily integrated with any cloud platform. Chef's internal language, Ruby Domain Specific Language, is similar to fully featured Ruby and is an imperative language. This makes Chef a preferred option for those who have development experience. Chef also has Chef Compliance which helps organizations automatically have their systems inspected, vulnerabilities identified as well as non-compliant software versions found. This way Chef Compliance validates all the applications and infrastructure in your deployed configurations.

A new helpdesk ticket has been raised in your company and it has been assigned to you. The ticket says that a server is repeatedly turning off without warning. This happens several times a day. The server works for about ten minutes after it is restarted, then shuts off. What could be the possible issue with the system? A) Backplane failure B) Cooling failure C) Incorrect BIOS D) Incompatible components

B) Cooling failure The possible issue with the system is a cooling failure. Insufficient ventilation to a computer system can cause a cooling failure. When this occurs, the internal temperature of the computer goes above an acceptable level, causing various components such as the CPU to halt. To avoid a cooling failure, you need to check the cooling systems in place, such as the fans and liquid pumps, and ensure that they are working correctly. Also, you need to ensure that the ventilation for the computer or server room is working correctly.

You are the lead Server+ tech professional for a financial services company. You need to make sure that the main server is restarted every week to keep it ready for VMware backups and for installing patches and updates correctly. How will you do this? A) Change the boot sequence B) Create a scheduled task C) Use vertical escalation D) Do an OS reload

B) Create a scheduled task You will create a scheduled task. Scheduling a regular system reboot is a good way to ensure the server stays in an efficient state. It can help prepare the machine for a virtual machine (VM)-based backup or for a planned software update. It can also be used to test the ability of a system to get back online correctly after a disaster as part of testing a disaster recovery scenario. A system reboot can be scheduled to run once a week using the Task Scheduler function in Windows.

Several users report that they are unable to access any website. You successfully replicate the problem by attempting to access a website by its fully qualified domain name (FQDN). As a test, you try accessing a website by its IP address. This opens the site successfully. Which of the following is most likely the problem? A) UAC protection B) DNS error C) Device driver failure D) Disk fragmentation

B) DNS error A DNS error is most likely the problem. When you try accessing a website directly by its IP address, you are bypassing the DNS server. When you cannot access websites by their fully qualified domain name (FQDN), you have a DNS issue. Either the DNS server configured on the system in incorrect or the DNS server is down or unreachable. In this scenario, the problem is probably with the DNS server because multiple clients are experiencing the DNS failure. When you cannot reach a resource by its FQDN or host name, it is most likely a DNS issue if you can reach that same resource by IP address. If you cannot reach the resource at all, the resource is likely down or some intermediary device or connection is down.

You work for a company that frequently uses temporary employees. Each temporary employee has a folder created in their name on the file server. When they leave the company, the folders are deleted. Over a period of time, you notice that the hard drives have lots of unused non-contiguous space on the hard disk. This causes very slow data access. Which of the following tools should you use to fix this problem? A) Log monitoring tool B) Defragmentation tool C) RAID controller D) Partitioning tool

B) Defragmentation tool You should use the defragmentation tool to fix this problem. The defragmentation tool removes fragmentation from a hard disk. It is an automated process, takes a considerable amount of time, and should be performed when the system is not in use. Fragmentation occurs when a file is broken into pieces and stored in different regions on a hard disk instead of in a contiguous area. Fragmentation slows down a system considerably because each time a file is accessed or loaded into memory it will need to be retrieved from different areas of a drive. A defragmentation program automatically moves the files' data and stores them contiguously.

You are the system administrator for a US-based file-sharing company. You have a growing number of users all over the world. The company will not upgrade its infrastructure for storage devices until the next financial year. The company needs to accommodate the growing number of users without sacrificing the allowed storage space for each user. Which of the following options will create more available space for new users without affecting existing users? A) Disk quota B) Disk compression C) OS archival D) OS patching

B) Disk compression Disk compression will create additional space for new users but will not impact existing users. Disk compression is a utility that works as an interface between the operating system and the hard disk. When a user saves a file onto the hard disk, the disk compression application first compresses the file using a compression algorithm and then writes it to disk. It similarly decompresses files when they are opened. Although using this utility slows the process of opening and closing files, it can double the amount of usable disk space.

You work as an IT specialist for a New Delhi-based advertising agency. You attempt to mount a hard drive to the main graphics server, which is a dual-boot server with both Windows and Linux. The mount operation fails. What is most likely the problem? A) Drive fragmented B) Drive in use C) Drive unavailable D) Drive corrupt

B) Drive in use The most likely cause of this problem is that the drive is in use. When you cannot mount a hard drive, it means that the hard drive may be in use by another operating system. This happens in systems with dual operating systems. If you have hibernated a Windows session and then try to mount the hard drive in Linux, it will not mount. Occasionally, loose connectors or cable problems with the hard drive may also cause it to not be detected by the system.

You are the systems administrator for a technology support company. The company has recently hired 100 new interns who will eventually join the company as full-time technical support specialists. You need to make user accounts for all of them. After you create the accounts, you assign them to a user group named INTERNS. These users will need to launch applications on the application server. Which of the following permission(s) should you grant the INTERNS group following the rule of least privilege? (Choose all that apply.) A) Write B) Execute C) Superuser D) Delete E) Read

B) Execute E) Read The correct option is to only grant them read and execute access so that they can launch applications. Without granting read permission, the execute permission is useless, because users will be unable to locate the applications to launch. Write, delete, and superuser would all grant the users more privileges than are required. New users to a network cannot be given privileges that will enable them to make changes to the system. The security of the system can be compromised in this fashion.

You are in charge of computer systems for a gaming company. You decide to upgrade the hard drive in the server. However, the BIOS does not support the hardware. When you research the issue, the motherboard's manufacturer states that the hard drive is supported by the motherboard. Which of the following should you update? A) Device driver B) Firmware C) Operating system D) Security software

B) Firmware You should implement a firmware update. Firmware is any computer program that resides on read-only memory (ROM). The BIOS is an example of firmware. Firmware needs to be updated only when the existing firmware may have had errors or bugs or if new features need to be added to the system. To update BIOS/UEFI firmware, perform the following steps:

You work as a Server+ professional for an Internet-based technical support firm. You receive a ticket where the user mentions that after prolonged Internet use the computer downloaded certain malware which made its performance erratic. The computer has crashed several times and is in an unstable state. You want to start the computer in a state where you can run administrative tools to ascertain the issue without loading the Windows GUI or the Internet. What would you do? A) Boot into safe mode B) Format the disk C) Reinstall Windows D) Boot normally

B) Format the disk You should start up Windows in safe mode, which you can do by hitting F8 after turning on the computer. Safe Mode allows you to start up Windows with the minimum necessary set of drivers and services. The safe mode option prevents you with several different access options.

You manage the IT department for a public relations company based in Los Angeles. You need to do a backup of the company's server daily. You are using tape rotation while backing up your company's data to a tape drive. You plan to use three cycles: daily, weekly, and monthly. The daily backups include six tapes, to be used Monday through Saturday. The weekly backups include four tapes used every Sunday. The monthly backups include two tapes used the last day of each month. Often, some of these backups will be removed from the site for safekeeping and disaster recovery purposes. Which of the following tape rotation schemes is in use? A) Round robin B) GFS C) Tower of Hanoi D) One tape set backup

B) GFS This is an example of a grandfather-father-son (GFS) tape rotation scheme. With this scheme, you include tape sets for each generation. In addition to the daily, weekly, and monthly rotations in the scenario, you could implement quarterly and annual rotations as well as any others vital to the company or operation.

You are the IT manager for your company, which is a payment portal service provider. The SLA for all your business partners states that you must maintain 99% uptime. Your office is located near a large river which has a tendency to flood. You need to choose an appropriate disaster recovery scheme for your company in the event that normal operations are disrupted. It is vital that all the data processing applications are uninterrupted and that the data is mirrored in the event that the primary servers are lost. Which of the following should you use? A) Cold site B) Hot site C) Bare metal restore D) Warm site

B) Hot site You should use a hot site. A hot site provides a full backup for a company's datacenter in the event of a disaster. The hot site contains everything that a company will need to continue operations, including office furniture, computer systems, and connectivity. This site is kept fully operational so that in the event of a disaster at the primary datacenter, the staff simply needs to move to the hot site and continue operations. You should use a hot site in situations where you do not want to have to re-install your software or set up your computers, and when a quick recovery is important. This solution is best if you want to be able to just enter the new facility and have the systems running as if nothing happened. In some cases, the most recent backup may need to be restored.

Question #22 of 90 Question ID: 1402300 You work as the lead Server+ technician for a software development company. You receive a ticket from a programmer who is having issues with his computer. The programmer has written a new program and says that each time the process is run the computer freezes. What could be the problem? A) Zeroing B) Incorrect CPU priority C) Locked files D) Faulty cables

B) Incorrect CPU priority The error can be caused by setting an incorrect CPU priority for the program. You can set the CPU priority of a process to give it more processing time on the CPU. Priorities can be set as Low, Below Normal, Normal, Above Normal, High or Realtime. You can change the priority form the Task manager in Windows. The danger of setting CPU priority to High or Realtime is that if used incorrectly a program can disallow other programs to use the CPU and thus stalling the working of the computer.

You need to install a new version of Windows on all the server machines at your company's main data center. Each server has a range of peripheral devices including graphics and sound cards. Many of the severs have different cards from different manufacturers. Before starting the installation, what is the first thing you should do? A) Run the OS installation CD B) Locate the HCL C) Remove all the peripheral devices D) Format all the hard drives

B) Locate the HCL Before starting the installation, you would first locate the HCL. When installing an operating system (OS) on a server, you first need to know if the connected hardware and peripheral devices are compatible with the OS you are planning to install. For this you refer to the hardware compatibility list (HCL) for that OS. If you do not refer to this list before you install the OS, there is a possibility that the installation may fail, or the system may become unstable due to incompatibility between the OS and the hardware. To locate the HCL for an OS, you can look at its installation disk or go to the HCL section of the website for that operating system.

You work as a Server+ professional for a large database firm running a SQL Database on a Linux server. Your system generates a large number of transactions, and details are stored in log files. Over time you notice that the log files are growing in size, making the process of analyzing them for system changes very difficult. What should you do to fix this issue? A) Creating a rule set B) Log Rotation C) Log Shipping D) Slipstreaming

B) Log Rotation You should use log rotation. Log file rotation is the process where older log files are copied to a new location and given a new name while a new, fresh log file is created to begin the logging process. This process occurs when a log file grows too large or too old and needs to be moved, renamed, compressed, and sometimes deleted. Log files need to be rotated so that the current log file is not too large to analyze. Also, organizing log files by date makes the process of analyzing any changes to the system more efficient. Finally, disk space is saved by moving older log files to backup storage.

Your company provides online technical support for cell phone users around the world. They require their technical support consultants to be able to communicate in real time with clients via Web browsers. At any one moment in the day, over a million queries are logged in from users. These need to be sorted and prioritized and then sent to the appropriate recipients. What would be the right choice of server for this? A) DHCP server B) Messaging server C) DNS server D) NTP server

B) Messaging server A messaging server would be the right server for sorting and prioritizing queries. A messaging server manages messages sent by other programs. The server prioritizes and puts messages in a queue based on that priority. This way, it frees up the programs that use messaging from having to perform the same processing individually.

You organization has decided to upgrade all of its computer systems. The management decided to increase the RAM in each computer from 8 to 16 sticks of RAM. You need to upgrade your server to handle the increase in power consumption caused by the additional memory. Which of the following server components will you need to change? A) Fans B) PSU C) CPU D) NEMA

B) PSU You will need to change the PSU. Computers need to be powered to be able to function. A computer draws power from a power supply unit (PSU). A PSU converts alternating current (AC) from the mains to direct current (DC). Modern computer systems use a PSU that conforms to the ATX specification. This means that when the PSU is connected to the mains, it provides a 5-volt standby voltage. This allows certain functions and peripherals on the computer to be in a standby state.

You are a Server+ professional working in a company's networking team. You are given the task of installing Windows on a large network of 100 computers as well as various addons and utilities for each of the computers. You need to do this within a few hours, as new company users will need the workstations ready by then. Which of these should you use? A) Rebooting B) Scripted installation C) Formatting D) Slipstreaming

B) Scripted installation You should use a scripted installation. The process of performing OS installation that is remote and automated is called a scripted install or unattended installation. This involves installing the operating system or application software on several network computers at the same time without the need to monitor each computer individually or without any involvement by a user. To perform an unattended installation, use a distribution server that has the installation files for the operating system you need to install. You then use client software to connect to the distribution server via a share point and then download and run the installation files.

You are the Server+ specialist for a film special effects company. You are asked to set up the machines for the new CGI department and procure the necessary licensing for various graphics manipulation tools each developer at the office will need. Which licensing option would be right for you? A) Node-locked B) Site-based C) P2V D) Virtual

B) Site-based You would use site-based licensing. Site-based licensing allows you to purchase a license for use with several computers, all of which reside at a single location or site. The license restricts the number of software copies that the end users are allowed to make at that site. Site licensing is more economical than having to purchase multiple copies of software for use at a single location or facility. An example of the use of site-based licensing is when a company needs employees to use software at its office building.

You are working in the IT security department of a TV company. You have received reports that an employee had downloaded a free web game onto the main server that might have infected that the server machine. Which of the following items should you check first to ascertain whether there has been an intrusion? A) User privileges B) System file checksum C) Running system services D) Open ports

B) System file checksum You should check system file checksums. Doing a file integrity check on system files provides intrusion detection information. File integrity ensures that a file has not been changed by an unauthorized user, process, or service. You can use checksums or hashes to verify file integrity. To do so, you record the checksum value of the file. Later when you need to access the file, you confirm file integrity by recalculating the checksum. If it matches the original checksum, file integrity is confirmed. If it does not match the original checksum, file integrity is not confirmed, and the file has been changed. File intrusion checking software maintains a checksum for each system file. These checksums are made using cryptographic algorithms like MD5 which provide more security that the previously used CRC (Cyclical Redundancy Check).

You work as IT administrator for a small office based out of Chicago that provides accounting services. You need to figure out a way to provide tape backups for up to two years using only the ten tapes available to the datacenter. Which of the following tape rotation schemes should you use for this? A) Full/incremental backup B) Tower of Hanoi backup C) Grandfather-father-son backup D) Round-robin backup

B) Tower of Hanoi backup You should use a Tower of Hanoi backup rotation scheme. Tape rotation involves having multiple sets of tapes that are used to perform backups. A tape set is the number of backup tapes you need to do a complete backup. An effective tape rotation scheme is called Tower of Hanoi, which effectively doubles the length of the backup period provided by the tapes using a complex algorithm. A five-set Tower of Hanoi backup rotation would use the tape sets in the following order, each letter representing a single set used on a certain day:

You are being shadowed by a newly hired server technician. You need to identify which devices are cold- or hot-pluggable. Which of the following devices is hot-pluggable? A) Bus B) USB drive C) RAM D) CPU

B) USB drive Hot-swappable is a term used for devices that can be disconnected and reconnected to the system without needing to switch the computer off. An example of a hot-swappable device is any USB component, such as mice, keyboards, external hard drives with USB connectivity, or SATA and RAID hard drives.

Question #55 of 90 Question ID: 1469962 You work as Server+ tech for a Real Estate firm. A user has raised a ticket complaining about lack of network access. You arrive at the user's machine and need to run the network checking tool but need administrative privileges for it. What would you do? A) Use horizontal escalation B) Use Run as administrator C) Change the boot sequence D) Reload the OS

B) Use Run as administrator You will use run as administrator for the tool. You use the Run As command in Windows to run an application as an administrator. This allows you to do administrative tasks on a system even though you may be logged on as another user group's member which may not have administrative privileges.

Your company has asked you, its chief Server+ tech, to create a disaster recovery plan. Currently, the data center houses 50 servers that use different hardware and software configurations over several OS platforms. You need a way to back up your entire data center and be able to shift operations to any other data center or any other location in case of an impending disaster or emergency. What would be a good option for you? A) Calculate the MTTR B) Use a cloud site C) Sanitize the data D) Use DLP

B) Use a cloud site You will use a cloud site. Disaster recovery typically makes use of backup sites, which can be hot sites having the same infrastructure and applications ready to run as the main data center, or cold sites, which provide a basic premises with power and connectivity into which the infrastructure can be moved in the wake of a disaster. Cloud sites are different in that they do not follow the traditional model of creating a backup environment with real infrastructure and applications. Instead, they are a virtual machine equivalent of the same.

You are the security manager for a biotechnology company. The office building includes a datacenter that contains the servers on which all confidential research data resides. You need to protect the laboratory from unauthorized access by implementing multi-factor authentication. Which of the following security mechanisms should you deploy to provide the best security? A) smart card and employee access card B) password and fingerprint scan C) password and username D) fingerprint and retina scan

B) password and fingerprint scan You should deploy password and fingerprint scan authentication. This will provide multi-factor authentication by including something you know and something you are. To provide an added layer of security, you could include something you have, such as a smart card.

While working as head of IT networking for a major finance corporation, you are asked to create subnets for the company's LAN and its thousands of computers. You set up a server with an IP address of 192.27.132.101 and subnet mask of 255.255.240.0. What is the resulting CIDR notation for the network? A) 192.27.132.0/20 B) 192.27.112.0/20 C) 192.27.128.0/20 D) 192.27.144.0/20

C) 192.27.128.0/20 Explanation: The resulting CIDR notation for the computer's network is 192.27.128.0/20. The Classless Inter-domain Routing (CIDR) form describes a format for network masks for IPv4 addresses. The 192.27.128.0 network would have a subnet mask of 255.255.240.0 and a range of available addresses from 192.27.128.1 to 192.27.143.254. The 192.27.112.0/20 network would have a subnet mask of 255.255.240.0 and a range of available addresses from 192.27.112.1 to 192.27.127.254. The 192.27.132.0/20 network would have a subnet mask of 255.255.240.0 and a range of available addresses from 192.27.132.1 to 192.27.143.254. The 192.27.144.0/20 network would have a subnet mask of 255.255.240.0 and a range of available addresses from 192.27.144.1 to 192.27.159.254.

Question #47 of 90 Question ID: 1402238 Your company has approved the procurement of new server hardware that will replace older servers that have reached the end of their service lifetime. You are asked to replace all the main data servers in your server farm with the latest hardware but somehow reuse the older servers without destroying them. What would you do to accomplish this? A) Store low priority archival data on them B) Donate them C) All of these D) Use them as backups during mains server upgrades

C) All of these You can perform all the listed actions to reuse your older servers without destroying them.

You are the network administrator at a global telecommunication company's head office. The network uses IPv6 for all communications. While monitoring network traffic, you notice that one host initiates the updating of router tables for a group of hosts. Which type of traffic is occurring from this host? A) Broadcast B) Multicast C) Anycast D) Unicast

C) Anycast This host is initiating anycast traffic. Anycasting lets one host initiate the efficient updating of router tables for a group of hosts. Anycast addresses allow a packet to be sent to the first or nearest interface of a group of interfaces.

You run the computer network for a university. Each student has an account on the network and can use disk space for personal storage and downloaded files. You need to keep a control on disk usage for students for the academic year. Which of the following should you use to ensure disk usage by students is manageable? A) Install service packs on each student account. B) Configure compression for working directories for each student. C) Assign quotas to each student account. D) Configure separate temporary directories for each student.

C) Assign quotas to each student account. Assigning quotas to each student account will ensure manageable disk usage for students. A disk quota is a limit on disk size set by a systems administrator to ensure users of a computer system do not go beyond their stipulated disk usage. Quotas can be set by the admin on either disk size or number of files. The quotas are set for either specific users or for user groups. When set for a user group, the quota will apply for all users in that group.

You are working for a video editing company. Your company stores all of its video project files for released videos on a server and is now planning to upgrade the video editing software and hire new users to work on it as well. You want new video editors to be able to successfully open and work with project files created with all previous versions of the program. What kind of compatibility will you need to ensure the program has? A) Overprovisioned B) P2V C) Backwards D) Slipstreamed

C) Backwards You will need backward compatibility. Backward compatibility for a software means that the software will work with files created by older versions of the software. This is useful for situations where you are using a project file from an older version of the program but opening and editing it with a newer version of the program. Similarly, forward compatibility is when you use an older version of a program to edit or work with files created with a newer version.

You are the head of the data center for a DBMS development firm. You need to ensure that the storage in the data center is working as well as possible. You need to ensure there are no problems with the main data servers in the future. Which of these could be an indicator of an impending system failure? A) Successful tabletop testing B) Low MTTR values C) Bad blocks on the hard drive D) Locked files

C) Bad blocks on the hard drive Bad blocks on a hard disk can be an indicator of drive failure in the future. Certain system failures can be predicted early on by analyzing key metrics that indicate an impending problem. This includes detecting bad blocks on a hard drive, which can be followed up by updating firmware and checking again. If the drive still shows bad blocks, you need to replace the drive. This should be done before backing up the drive data.

Working as a Server+ professional, you need to execute a series of tasks like echoing information to logged in users, and you want all these tasks executed as a single file inside your Windows environment. What would you use for this? A) Slipstreaming B) VBScript creation C) Batch scripting D) Overprovisioning

C) Batch scripting You would use batch scripting. Batch scripting is a series of commands that are stored in a plain text file for purposes of being executed by a command line interpreter. Batch scripting is associated with the Windows environment. Batch scripts are typically stored in files with a .bat extension. Batch scripting supports basic command like dir, cd, and echo and also the use of variables using the SET command.

You receive a report that the person managing the company's main FTP server has a habit of shutting down the server without following the correct shutdown sequence. Due to this, various files and folders stored on the FTP server are now showing up as unavailable. Which of the following do you think is the most likely cause of the missing files? A) Drive unavailable B) Drive in use C) Data corruption D) Fragmentation

C) Data corruption The most likely cause of the missing files is data corruption. Data corruption can happen due to hard disk deterioration over time and also because of abrupt system and program shutdowns or devices not being unmounted before shutdown. Malware and viruses can also corrupt files.

Question #62 of 90 Question ID: 1403158 You work as the IT superintendent of a global finance corporation. You recently closed an issue where the main server was malfunctioning due to a virus that had infected the computer. That issue was taken care of by a technician who has since been transferred to a different branch office. Now another server seems to have the same problem. What should you consult to tackle this issue? A) Plan of action B) Root cause analysis C) Documentation D) Probable cause

C) Documentation You should consult the documentation to tackle this issue. Because this kind of issue has been seen before, it is important to review the documentation of the previously closed issue to get as much information as possible before tackling the new issue. Also, the logs and documentation can provide vital clues to finding a common problem. In this scenario, it could be that that flash drives or other media were the source of the virus. Personnel responsible for resolving previously seen issues should always consult the documentation before speaking with the user who reported the problem. However, the issue itself should not be addressed (meaning remedial action should not be taken) until after you have followed the troubleshooting theory process. This means that after consulting the documentation, you should identify the problem and determine the scope.

You are in charge of the servers for a game development company. You have source code stored on a server, which forms the core of your company's 3D gaming engine. After the linked libraries have been created, the source code residing on the disks needs to be secured. You need to secure this source code, which comprises the hard drive of the server, by encrypting the contents completely. Which of the following methods should you use? A) LTO B) IPSec C) FDE D) EFS

C) FDE You should use full-disk encryption for securing the source code. Full disk encryption (FDE) involves encrypting every readable bit on a hard disk partition to an encrypted unreadable form using special encrypting software. FDE is useful for items such as laptops or tablets that can easily be lost or stolen. This way, the contents on them are protected from being accessed by unauthorized personnel.

You have set up a check point for the laboratory for a biotech firm. You need to ensure employees are required to provide a personal identification number (PIN) to gain access to the lab. Which of the following should you use for this? A) Retinal scanner with a mantrap B) Combination lock with a security camera C) Keypad with a door lock D) Security guard with an access list

C) Keypad with a door lock You should use a keypad with a door lock to allow employees to gain access to the lab. An employee can enter the PIN into the keypad and if the PIN matches the numbers in the directory, the door is unlocked. A keypad is a set of buttons that are used to transmit authentication information to a computer at a check point. They are made in a way that a user cannot tamper with or enter any information that may override the system. The keypad is an example of "what you know" authentication because the PIN is a confidential number that an employee should know.

You have been asked to improve the performance of the servers for a biotechnology firm. You decide to inspect the cache memory of the CPUs in the servers to identify potential speed issues. To which of the following memory devices does the CPU have the fastest access? A) RAM B) L2 C) L1 D) L3

C) L1 The CPU has the fastest access to the L1 cache memory. When the CPU receives an instruction to execute, it first searches for the necessary data in the L1 cache. If it does not find it in L1, it looks in L2, and so on.

Question #40 of 90 Question ID: 1402328 Your company has recently been through an upgrade of all computer systems. You spent several days reconfiguring the network security parameters. You receive reports that the Web server seems to have unknown files and applications launching automatically whenever it is started. Also, the speed of the system has dropped considerably. What is the most likely cause of this? A) Data corruption B) Corrupt boot record C) Malware D) Dual OS

C) Malware The most likely cause of this issue is malware. The period when the network security was down is when a virus could have infected the system. If you experience slow I/O performance, it is usually due to malware, file fragmentation, or the disk space reaching capacity. Scanning for malware, running a defragmentation program, or cleaning disk space can help resolve this issue.

You have been asked to rework the computer network for a large financial firm. You decide to install blade servers for them. You have recently received an order of blade servers and need to connect them to their fans and power supplies. Which of the following connections should you use? A) Towers B) Backplanes C) Midplanes D) Rackmounts

C) Midplanes Midplanes are used in blade servers where slots on one side connect to the blade server, and peripheral services such as networking devices, cooling fans, and the power supply unit reside on the other side. Midplanes are usually located towards the rear of the computer chassis. This is in contrast to backplanes, which are found on the motherboard itself.

You are conducting a workshop for the IT technicians in your company. You need to make sure they understand the different kinds of network storage options that exist and the means to connect them. Which type of storage is utilized when connecting a high-capacity Blu-ray optical drive using a USB connection directly to a server? A) FCoE B) DAS C) NAS D) SAN

C) NAS DAS is utilized when connecting a high capacity Blu-ray optical drive using a USB connection directly to a server. Direct-Attached Storage (DAS) is a storage device that is attached directly to a computer, as opposed to being accessed over a computer network. In this scenario, the storage device in use is the Blu-ray optical drive, which is connected to the computer directly using SCSI or USB. Examples of DAS include hard disk drives, external drives, and optical drives. This term is used to describe storage that is attached to servers.

Your company creates graphics for movies and has solely used Windows servers. Company management decides to implement Linux to be able to use open-source applications. Because a major portion of the company's operations are still using Windows, you decide to go for a dual-booted operating system (OS) setup on all servers. Which of the following tools will you need to do this seamlessly? A) Log monitor B) Resource monitor C) Partitioning tool D) RAID controller

C) Partitioning tool You will need a partitioning tool. Partitioning tools allow you to create partitions on a hard disk and also resize them if required. Partitioning tools are useful when you need to install a new operating system on a server that presently has Windows. Linux needs a different filesystem for installation as well as swap space. Using a partitioning tool, you can dynamically create the partitions and then boot from the Linux CD and install the new OS without making any changes to the preinstalled Windows OS.

You are the head of IT for a company providing technology support around the world. You receive a report that the company's Web server has problems with providing Internet access. Each of the incidents reported were resolved by refreshing the browser's cache on the client's machine and re-entering the IP address details in the settings. What should you do first to deal with this problem? A) Notify the users. B) Query the users. C) Perform a root cause analysis. D) Document the issue.

C) Perform a root cause analysis. You should perform a root cause analysis to identify the cause of the problem. For example, a user may experience problems with Internet access that might have a temporary solution that involves refreshing the IP address. However, a root cause analysis could indicate that the problem lies with the Web server that provides the Internet access to the client's machine.

Your company provides FTP services for global clients. The main datacenter is in Houston, and you need to find a means to back up the services at a new center in India to ensure availability. The solution you deploy must not compromise the FTP services. Which of the following should you use? A) Site-to-site replication B) Disk-to-disk replication C) Server-to-server replication D) DRP

C) Server-to-server replication You should use server-to-server replication. Server-to-server replication is best for situations needing a redundancy of a service, such as file sharing or File Transfer Protocol (FTP) services. Server-to-server replication involves copying both the data and the server configuration from the primary server to a replicated server. This improves the availability of the system and provides data redundancy. It also makes it easier to perform system maintenance operations with data residing across multiple servers.

Your company has many different licensed software on its computers used by the employees. While doing an internal audit of the software assets on your server farm, you find that many of the applications are being used by more users than the original software licenses had allowed in its EULA. What should you do? A) GPT B) MTTR C) True up D) MTBF

C) True up You should do a true up. License count validation is the process of the verification of the validity of a software's license and that the usage of the license is in adherence to the terms of the End-User License Agreement (EULA). License validation is done through an Internet connection and needs to be done each time you enter the license key into your licensed software.

You are setting up the virtual network for your company, which provides tech support for clients all over the world. You need to choose an appropriate virtual network connection for the employees' computers. You must ensure that the clients see only one IP address during chats with them. The IP address that they see must match the IP address of the company's server. Which form of virtual network connectivity will you use? A) Type I B) Type II C) NAT D) Bridging

C. NAT You should use NAT to show only the IP address of the company's server. There are two main options when providing network connectivity for a virtual machine

You work for a motion picture company. One of the studio's projects is creating a digital archive of all its releases over the last 50 years. You need to acquire storage that has the capacity to hold hundreds of large video and audio files. The storage must also be energy efficient. Which of the following should you choose for this task? A) 1.6 Gbps SATA B) 16 GB HDD C) 1.6 Gbps SAS D) 16 TB SSD

D) 16 TB SSD A 16 TB solid state drive is the best choice for this task. Solid state drives use non-volatile memory to store data and have no moving parts inside them. They are faster and more reliable than conventional hard drives and also produce less noise and consume less power.

You are the server administrator for a large company and you need to choose an appropriate CPU architecture for the servers. administrator You want the most energy efficient architecture available. Which of the following CPU architectures requires the least amount of clock cycles to execute a single instruction set? A) MIPS B) x86 C) x86-64 D) ARM

D) ARM The Advanced RISC Machine (ARM) architecture requires the least amount of clock cycles to execute a single instruction set. ARM is a CPU architecture commonly found on modern cellphones and other embedded devices. ARM is based on a reduced instruction set computer (RISC). RISC instruction sets are smaller than complex instruction set computer (CISC) instruction sets. This means that most of the ARM instructions execute in a single clock cycle. Though most ARM processors use 32-bit instructions, powerful 64bit ARM processors are now penetrating server platforms, offering better performance and energy efficiency (less than one-third energy for the same power) over existing x86-64based servers.

You work as a Server+ specialist for a company's data center. Many of your servers are over five years old and need to be decommissioned. You have been asked by the head of your department to remove the main server while a replacement is brought in. Which of these would you need to ensure before removing the server from the facility? A) Check regulatory compliance about server removal B) Ensure that the server is not used by other teams C) Backup all the data on the server D) All of these

D) All of these You will need to ensure all these steps are followed before physically removing the server from the company's data center. Before starting the process of server decommissioning, the polices pertaining to the removal of server hardware must be considered and the non-utilization of the server(s) needs to be verified. Regulatory compliance regarding decommissioning must be adhered to and any complication that may arise by removing the servers needs to be addressed. Records of the entire decommissioning process need to be kept for future audits. To perform successful server removal or decommissioning, you will:

You need to install a server for a satellite tracking station. Because of the large volumes of data that must be received from satellites and computed, the server computer must be able to receive and analyze streams of real-time coordinates simultaneously. The plotting algorithms in use by the stations computers will require large sets of coordinates to calculate. Which of the following components will most affect processing efficiency in this scenario? A) NIC B) Server blade C) GPU D) Cache memory

D) Cache memory The cache memory will most affect processing efficiency in this scenario. The cache memory is one of the features that affects the speed of a CPU. The bigger the size of the cache, the more memory the CPU has to perform computations.

You are installing cables for the two new servers at an Internet service provider (ISP). You need to choose a cable that can cover the distance of 10 yards from the servers to the main receiver with about a bandwidth of 10 gigabits per second (Gbps). You need to ensure that the solution you come up with will provide protection against EMI. Which of the following could you choose? (Choose all that apply.) A) Cat5e UTP B) Multi-mode fiber C) Cat4 UTP D) Cat6 STP E) Cat5 UTP

D) Cat6 STP You could use Cat6 STP or multi-mode fiber cabling. Cat6 cable is capable of spanning distances of up to 100 yards with a maximum bandwidth of 10 Gbps. Multi-mode fiber optic cable is capable of spanning distances of up to 30-85 yards (depending on the core size), with a maximum bandwidth at that length of 10 Gbps. Shielded twisted pair (STP) copper cabling is better to use in this instance because it provides shielding against electromagnetic interference (EMI).

You are setting up a hypervisor for a virtual network in a stock trading company. Due to the massive volume of network traffic expected, you need a system that can provide high availability. You need to verify the hypervisor type will be compatible with your server's hardware. What should you do? A) Use a virtual switch. B) Use a virtual NIC. C) Run the VM. D) Check the BIOS.

D) Check the BIOS. You should verify the compatible hypervisor by first checking the BIOS. To enable virtualization for your CPU, you access your computer's BIOS or UEFI. The settings will be under the Processor submenu where you will enable the setting related to virtualization. When allocating resources between guest and host, the key requirement is that the host must have at least as much hardware infrastructure as its guests need. That includes CPU, hard disk or solid state drive storage, RAM, and network connectivity. For example, if three guests each need 200 MB of RAM, the host needs more than 1 GB of RAM available for use by the guests.

You are installing additional memory to a standalone server in a science laboratory. The memory must detect data corruption and repair corrupted data. Based on these requirements, which type of memory should you install? A) DRAM B) SRAM C) ROM D) ECC RAM

D) ECC RAM The correct option is to use Error Correction Code (ECC) RAM. This RAM automatically finds and corrects errors in memory. ECC is different in design from non-ECC RAMs in that instead of containing eight memory chips, ECC RAM contains an extra memory chip that does error checking and correction. For this reason ECC RAM is the RAM best suited for servers where data integrity needs to be maintained.

You are an IT security advisor to a telecommunications company venturing into cellular phone services. The company needs to secure its LAN so that Internet threats cannot harm the network. Which of the following should you implement for them? A) Network ACL B) HIDS C) 802.1x D) Firewall

D) Firewall You should use a firewall to secure the company's network. A firewall is a security system for a computer network that regulates the incoming and outgoing traffic to the network or hosts as per predefined rules. Only network traffic that is known to the firewall is allowed in and all other traffic is blocked. Application-layer firewalls protect against attacks on web servers. These block out malware, which is software that can harm computers. Malware includes viruses, Trojan horses, worms, and spyware.

You have recently moved the IT operations of your company from Atlanta to a new location in Jamaica for the winter. After setting up the datacenter, you find that you are faced with the issue of the servers overheating. The higher levels of humidity are contributing to the extra heat. Which of the following should you look into to remedy this problem? A) BIOS B) PSU C) RAM D) HVAC

D) HVAC To remedy this situation, you should look into the heating, ventilation, and air-conditioning system (HVAC). For this part of the world, you need an HVAC system that provides humidity controls, including a humidifier and dehumidifier. This will ensure that the air inside the building is of an acceptable quality with the right levels of temperature, humidity, and ventilation. A space called a plenum needs to be created between the ceiling of the building and the drop ceiling of the office. This space allows air circulation for HVAC as well as cables for networking.

You are the IT consultant for a 3D graphics company based in Palo Alto, California. You have recently been asked to install a centralized power backup to the existing computer systems to protect them against power loss and voltage spikes. You are expected to monitor the system to ensure that it works. Your own office is in Los Angeles. Which of the following will you use in LA to ensure the system works as expected? A) Install a UPS in bypass mode and use the remote agent to monitor the system. B) Install a USB surge protector and use local software to monitor the system. C) Install a standard surge protector and use local system logs to monitor the system. D) Install a UPS and use the remote agent to monitor the system.

D) Install a UPS and use the remote agent to monitor the system. You should install a UPS and use the remote agent to monitor the system. UPSs can be managed remotely using software that monitors off-site UPC systems and provides information on the UPS operating mode (bypassed or not), internal temperature, battery voltage, and load levels. The automated graceful shutdown of attached devices involves using agent software that detects when the main power goes out and then begins the shutdown process on the computer automatically when the battery has been depleted to a specific degree. An uninterruptible power supply (UPS) is a hardware device that allows computers connected to it to function even after the main power to the systems is lost. UPSs also protect against power surges. A UPS has a battery in it that is activated when the main power fails. The UPS then sends a notification via a beep that the main power is lost. This allows you time to save your work and shut down gracefully.

As Server+ lead tech for a banking firm, you are managing the data center, which has many terabytes of customer data that contains personally identifiable information as well. Your company is planning to delete all the older archived data to reduce storage costs. Which of these actions should you take? A) Move all data to tape storage B) Don't delete any data C) Delete data older than a month D) Look up the data retention policy

D) Look up the data retention policy The correct action would be to first look up the company's data retention policy. This will provide the correct guidance on which data needs to be kept and which can be removed or archived. Data retention is the storage of company data for a prolonged period of time, which can be due to state regulations or for disaster recovery. Various compliance laws mandate that a company needs to retain its data and records for a minimum of three years to permanent retention. To successfully implement data retention, a company needs to first create a data retention policy by bringing the legal team and department heads together. The policy will provide a structure on the duration of the data retention and the specific data that needs to be retained. This way, an organization can save on storage costs by only storing data that is legally mandatory and removing the rest, thus clearing out storage space and moving less critical data to lower level, less expensive storage or backup options like tapes. The policy should allow for a means of storage that is searchable if required.

You work for a banking ATM services company. Your data center has a main server that runs a special banking program for servicing user requests to retrieve account details and balances. You need to find a way to speed up the computer program while maintaining the same amount of memory that is currently available on the server. Which of these techniques would you use? A) Clustering B) DLP C) Exfiltration D) MRU

D) MRU You should use MRU. Most recently used (MRU) is a caching algorithm created for use by programs for managing a cache of data stored on the computer. The key concept behind caching is that data used most frequently is kept in memory locations (cache) that are faster to access than the usual locations, resulting in much faster system performance. Over time caches become full, which leads the caching algorithm to decide which elements of the cache to discard before bringing in new ones.

You work for an Android game development company in California. You need to run an annual audit on all the hard drives as well as defragment them and run antiviruses. You attempt to first back up the data on the server, but the backup operation fails. What is most likely the cause of this? A) Corrupt boot record B) Fragmented drive C) Data corruption D) No pagepool memory

D) No pagepool memory The most likely cause of this issue is no pagepool memory. If a backup operation fails, it could be because the OS's cache manager runs out of available paged pool memory. To fix this, you need to free up more memory by closing unnecessary programs and also freeing up more disk space.

You are part of the security team at a finance corporation. You have been entrusted with securing the following confidential data: User account credentials Personnel records Proprietary documents You use encryption as protection. Where is the MOST secure place to store the encrypted confidential data? A) Offline in a locked server cabinet B) Online in a local RAID mirror in the server rack mount C) Online in a partner's cloud service D) Offline in a keypad entry safe at a secure off-site premises

D) Offline in a keypad entry safe at a secure off-site premises. You should save the data offline in a keypad entry safe at a secure off-site premises. Offline should be the preferred mechanism for data that does not require frequent access, such as user account credentials, personnel records, and proprietary documents. You can use a safe or a keypad-locked cabinet. Safes are metallic boxes that have a combination or keypad lock on the front and several inches of steel or metal to protect the items inside. Safes are used to store cash, bonds, and any other items in a company that must be protected from theft at all costs. An IT company can store source code CDs inside a safe; similarly, a genetics company would keep DNA strains in a refrigerated safe. The combination for the safe must be shared only with high-level employees with the appropriate safeguards and authority.

You have been hired as the administrator for a small company. You immediately discover that an appropriate backup plan has not been implemented on the file server. You must provide a solution that will minimize backup time. Which backup scheme should you implement? A) Perform a full backup on Saturdays and differential backups all other days. B) Perform a selective backup every day. C) Perform a full backup every day. D) Perform a full backup on Saturdays and incremental backups all other days.

D) Perform a full backup on Saturdays and incremental backups all other days. You should perform a full backup on Saturdays and incremental backups all other days. An incremental backup backs up data that has changed since the last full or incremental backup. Sunday's incremental backup will contain all changes since Saturday's full backup, Monday's incremental backup will contain all changes since Sunday's incremental backup, and so on. This strategy minimizes the backup time.

You work for an IT Support company which has recently been acquired by a much larger company leading to major expansion and increase in the resource strength as well as infrastructure. You need an automated means for configuring and managing your entire enterprises systems using a technology that also allows you to customize the configurations specific to your business needs. What would you choose for this? A) Vertical escalation B) Automated task scheduling C) APT Package Manager D) Puppet

D) Puppet You will use Puppet. Puppet is open source software that provides configuration and deployments services. It is used on both Windows and Linux machines to control multiple application servers simultaneously. Puppet can also be used on IBM Mainframes, Mac OS servers and Cisco switches.

You are the IT manager of a Web-hosting company. You have received reports that the main Web server has been working very slowly. You check the system RAM and find it functional. You need to find the cause of the problem. Which of the following diagnostic tools can you use to ascertain the reason for the sluggish performance of the system? A) Disk Properties B) Defrag C) Log monitoring D) Resource Monitor

D) Resource Monitor You can use the Resource Monitor to ascertain the reason for the system's sluggish performance. Using Resource Monitor helps you identify the reasons the server may not be performing up to speed. The Resource Monitor, which is an option within the Windows Task Manager, provides graphical data on individual processes and how much system resources they consume.

You work for a company that has hundreds of employees across the corporate hierarchy. You need to enforce a strong access system that will ensure that entry-level employees cannot access data that should only be seen by senior management. What would be the means to accomplish this access control? A) Delegation B) Segregation of duties C) Employing slipstreaming D) Scope-based access

D) Scope-based access You would use scope-based access. When setting permissions and access controls for an organization, you need to be aware of the employee's role in the organization. This includes the scope of work and duties that come with that employee's role, sometimes called scope-based access control. Permissions are based on an employee's scope of work.

You work for a mining company based in Africa. You need to upgrade the storage on your servers to allow faster processing of the mining data collected by orbiting satellites. You are looking for a fast set of hard drives. Which of the following factors affect the speed of data access on a hard drive? (Choose all that apply.) A) Input/output per second B) Revolutions per minute C) Dimensions/form factor D) Seek time E) Hard drive capacity

D) Seek time B) Revolutions per minute A) Input/output per second The correct options are seek time, input/output per second (IOPS), and RPM. Hard drives have certain specifications that include RPM and disk IOPS.

You are trying to set up a hypervisor on your company's server to enable virtualization, but keep getting the following error messaging: VT-x Hardware Acceleration is Unavailable. Which of the following will you need to look into to fix this problem? A) Hard disk B) CPU C) RAM D) UEFI

D) UEFI You will need to inspect the Unified Extensible Firmware Interface (UEFI) settings for the computer. Alternatively, you can inspect the BIOS settings. Modern CPUs such as AMD-V and Intel VT have features that enable virtualization software, such as VMWare and Hyper-V, to operate. However, the CPU's hardware acceleration may not be enabled by default. To enable it, you need to access the computer's BIOS settings. You first need to uninstall Hyper-V as it prevents VMWare and VirtualBox from using the Intel VT-x hardware. To enable virtualization for your CPU, you access your computer's BIOS or UEFI. The settings will be under the Processor submenu, where you will enable the setting related to virtualization.

You work for a game development company in Illinois. Your company also provides online gaming services to gamers worldwide. You need to set up several independent gaming servers, each running on a different operating system. You only have one main physical server to accomplish this task. Which of the following should you use to make this happen? A) Database server B) Messaging server C) Web server D) Virtual server

D) Virtual server Virtualization allows a physical server to share its hardware and software with different kinds of operating systems by installing virtual servers on the physical machine. This provides more economic computing solutions and also more efficient control of those computing resources. Because of these factors, virtual servers are widely used in Web hosting applications. Every virtual server has its own OS, software, and, in the case of Web hosting virtual servers, IP addresses, domain names, and email. However, all of the virtual servers must share the physical server's resources. It is important to ensure that the physical server has enough resources to support the virtual servers. This includes CPU, memory, and hard drives.

You are the Server+ specialist for a college IT department. You are creating a script for user account creation for new students. You use the following code: if [ $(id -u) -eq 0 ]; then read -p "Enter new users name : " username read -s -p "Enter new users password : " password #Insert code here You need to ensure that the username doesn't already exist on the system. Which line of code should you insert to ensure this? A) sudo shutdown 09:00 B) chmod +x adduser.sh C) sudo systemctl enable adduser D) egrep "^$username" /etc/passwd >/dev/null

D) egrep "^$username" /etc/passwd >/dev/null

You work for an online shopping company based out of Brooklyn. Your company uses a three-tier enterprise application that they now want to move from staging to production servers. Customers around the world will use their web browsers to view current inventory and order products. You deploy the Website front-end to the company's dedicated Web server. Which other servers should you deploy as the remaining application components? (Choose two.) A) Database server B) Routing access server C) Network services server D) Directory server E) Application server

E) Application server A) Database server The application and database servers should be deployed as the remaining application components. You should deploy the inventory and order data to the database server and business processes such as ordering products to the application server. The dedicated Web server will contain the user interface that customers will use to view inventory and order products. In a three-tiered enterprise application, there are the following logical tiers:

You are the IT consultant for a new startup specializing in games based in California. You have been asked to back up the company's data. You need to ensure that the backed up data is readily accessible should it be needed for an audit. The solution you provide must be cost effective as well. Based on these requirements, which of the following backup options could you use? (Choose all that apply.) A) Offsite backup via CD-ROMs B) Offsite backup via remote server C) Onsite backup via CD-ROMs D) Offsite backup via tape drives E) Onsite backup via HDDs

E) Onsite backup via HDDs C) Onsite backup via CD-ROMs You could perform onsite backups via hard disk drives (HDDs) or CD-ROMs. Either of these solutions is more cost effective than the other solutions. By performing the backup onsite, you ensure that the backed up data is readily accessible.


Set pelajaran terkait

Chapter 21 - The Statement of Cash Flows Revisited

View Set

Scientists and what they discovered- atoms

View Set

Osgood Schlatter Syndrome/Sinding Larson Johansson Syndrome

View Set

MGM Q1 - Managerial Roles and Functions

View Set

Chapter 15 Writing and Completing Reports and Proposals

View Set