CompTIA Server + Assessment Test

Ace your homework & exams now with Quizwiz!

To which protocol is the term LUN related? A. SCSI B. IP C. SSL D. FDDI

A. A logical unit number (LUN) identifies a device addressed by the SCSI protocol or protocols that encapsulate SCSI, such as Fibre Channel or iSCSI.

What issue does the 802.1ax-2008 standard address? A. NIC teaming B. Deterministic routing C. Secure DNS D. MIMO

A. Combining physical links can be done using proprietary methods, and there is also an IEEE standard for the process called 802.3ad, later replaced by 802.1ax-2008.

What is the role of a DHCP server in a network? A. Issues IP configurations B. Translates private to public addresses C. Authenticates users D. Resolves IP addresses to hostnames

A. DHCP servers are used to automate the process of providing an IP configuration to devices in the network. These servers respond to broadcast-based requests for a configuration by offering an IP address, subnet mask, and default gateway to the DHCP client.

Which of the following parts of a MAC address is unique for each interface made by a vendor? A. UAA B. BAA C. OUI D. EUI-64

A. Each part of this address communicates information. The left half of the address is called the Organizationally Unique Identifier (OUI). It identifies the vendor who made the interface. The right half is called the Universally Administered Address (UAA). It will be unique for each interface made by the vendor. Together they make a globally unique MAC address.

You receive a destination unreachable message with a source IP address. Where is it coming from? A. A remote router B. A remote DNS server C. A local DNS server D. The local router

A. If the message comes with no source IP address, that means the message is coming from the local router (the default gateway of the sender). If it has a source IP address of the sender, then it is another router in the path.

When creating a backup, what function can be used to verify the integrity of the results? A. Checksums B. Encryption C. Digital signatures D. Transaction logs

A. If you create the backup using checksums (which is an option with many utilities), it will allow you to check that the data has not changed since it was made or that it has been corrupted or damaged.

What can be the result of high humidity? A. Corrosion B. ESD C. RFI D. EMI

A. It is a balancing act to keep humidity at the right level since low humidity causes ESD and high humidity causes moisture condensation.

What is the function of the command-line utility wevtutil? A. Manages log files B. Manages network connections C. Manages memory issues D. Manages CPU affinity

A. Managing log files can be done at the command line using the following command, inserting the name of log file and the maximum size in bytes: wevtutil sl <LogName> /ms:<MaxSizeInBytes>

Which of the following is deleted when you execute Disk Cleanup? A. Temp files B. Memory C. Routing tables D. Pagefile

A. Manually performing a disk cleanup will allow you to get rid of these files (and many other useless files as well), but if you would like to create a batch file, you can automate the process.

What is a common host-based firewall on Linux-based systems? A. iptables B. nessus C. tripwire D. scannow

A. On Linux-based systems a common host-based firewall is iptables, which replaces a previous package called ipchains. It has the ability to accept or drop packets.

Which of the following would Joe use to digitally sign a document so that Sally can verify his signature? A. Joe's private key B. Sally's private key C. Joe's public key D. Sally's public key

A. Since Sally will use Joe's public key to verify the signature, he must sign it with his private key.

What is the primary function of PXE? A. Remote booting B. Secure routing C. Remote administration D. Redundant connections

A. The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

When discussing 802.1x, which of the following roles is played by the user's computer? A. Supplicant B. Authenticator C. Authentication server D. Imperative

A. The user's computer is the supplicant, the access device (WAP, Dial in the server or VPN server) is the authenticator, and the RADIUS or TACACs + server is the authentication server.

Which of the following statements is true with respect to safes? A. No safes are fireproof. B. Consumer Reports assigns ratings to safes that you can use to assess the suitability of the safe. C. Those that are fire resistant will protect a backup tape from being damaged. D. When considering a safe, you should focus on two items: the cost and the size.

A. With respect to fire, no safe is fireproof. Many are fire resistant and will protect a document from being destroyed, which occurs at a much higher temperature than many of the other items (such as backup tapes and CDs) can tolerate without damage. For these reasons, items such as backup tapes should be stored offsite.

In Linux, what is fstab used for? A. To mount partitions in boot B. To create partitions C. To format a partition D. To defragment a drive

A. fstab (File System Table) is a file used by Linux operating systems to mount partitions on boot.

Which of the following is not true about server backplanes? A. They can be a single point of failure. B. They provide data and control signal connectors for CPU. C. Backplane failures are uncommon. D. You should implement redundant backplanes.

B. Backplanes are advantageous in that they provide data and control signal connectors for the hard drives. They also provide the interconnection for the front I/O board, power and locator buttons, and system/component status LEDs. Unfortunately, this creates a serious single point of failure because if the backplane fails, we lose communication with the servers to which it is connected.

Which is the minimum category of cable required for 100 Mbps transmissions? A. CAT3 B. CAT5 C. CAT5e D. CAT6

B. CAT5 transmits data at speed up to 100 Mbps and specifies cable lengths up to 100 meters.

The MBSA vulnerability scanner works on which operating system only? A. Linux B. Windows C. Unix D. Mac

B. For your Windows servers, an excellent tool is the Microsoft Baseline Security Analyzer (MBSA). This tool can identify missing security patches, weak passwords, and other security issues that are specific to installed products.

The metric IOPS is used to describe the performance of which resource? A. Memory B. Disk C. CPU D. Network

B. IOPS (Input/Output Operations per Second, pronounced eye-ops) is a common disk metric that describes how fast the disk subsystem is able to read and write to the drive. Therefore, the higher this value, the better.

What component locates the operating system in Linux? A. NTLDR B. GRUB C. Bootmgr D. boot.ini

B. In Linux this handled by GRUB.

How many sets of backup tapes are used in the GFS system? A. 2 B. 3 C. 4 D. 5

B. In the Grandfather-Father-Son (GFS) backup scheme, three sets of backups are defined. Most often these three definitions are daily, weekly, and monthly.

Which function is made easier when a server has a rail kit? A. Installation B. Maintenance C. Configuration D. Accessing

B. Rail kits, when implemented, allow for the server to be slid out of the rack for maintenance.

On which type of device is port security used? A. Hub B. Switch C. Router D. Multiplexer

B. Some of the things you can specify using this feature are the only MAC address or addresses allowed to send traffic in the port, the total number of MAC addresses that can transmit on the port, and an action to be taken when a violation occurs (either shut the port down or prevent transmissions by the guilty MAC address).

Which command is used on a Windows computer to identify the path taken to a destination network? A. traceroute B. tracert C. ipconfig/trace D. trace

B. The tracert command (traceroute in Linux and Unix) is used to trace the path of a packet through the network on routers.

Shares are used to allocate which of the following to VMs? A. ROM B. CPU C. NVRAM D. L2 cache

B. There are three ways the allocation of the use of the physical CPU(s) can be controlled. These methods are as follows: ■■ Shares: Using values such as Low, Normal, High, and Custom (in VMWare, for example), these values are compared to the sum of all shares of all virtual machines on the server. Therefore, they define the relative percentage each VM can use. ■■ Reservation: Guaranteed CPU allocation for a VM. ■■ Limit: Upper limit for a VM's CPU allocation.

If you perform a full backup once a week and use a differential backup scheme the rest of the week, how many tapes are required for a restore four days after the Full backup is taken? A. 1 B. 2 C. 3 D. 4

B. You will need the last full backup tape and the last differential tape. Each differential tape contains all changes that occurred since the last full backup.

Which RAID version requires at least three drives? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10

C. A minimum of three drives is required for RAID 5.

Which of the following is the unit of measurement when discussing rack components? A. M B. I C. U D. C

C. Each U is 1.75 inches (4.445 cm) high.

Which of the following steps in the CompTIA troubleshooting method come first? A. Verify full system functionality and, if applicable, implement preventive measures. B. Document findings, actions, and outcomes throughout the process. C. Identify the problem and determine the scope. D. Perform a root cause analysis.

C. The steps in order are ■■ Identify the problem and determine the scope. ■■ Establish a theory of probable cause. ■■ Test the theory to determine the cause. ■■ Establish a plan of action to resolve the problem and notify impacted users. ■■ Implement the solution or escalate as appropriate. ■■ Verify full system functionality and, if applicable, implement preventive measures. ■■ Perform a root cause analysis. ■■ Document findings, actions, and outcomes throughout the process.

Which of the following components is the one you most likely would measure with a multimeter? A. NIC B. Hard drive C. Power supply D. CPU

C. With a multimeter you can measure voltage, current, and resistance.

Which of the following is true of an HIDS? A. A high number of false negatives can cause a lax attitude on the part of the security team. B. An HIDS cannot address authentication issues. C. Encrypted packets can be analyzed. D. An HIDS monitors only traffic destined for the machine on which it is installed.

D. A host-based system is installed on the device (for purposes of our discussion, a server) and the system focuses solely on identifying attacks on that device only.

Which of the following is not part of the form factor of a server? A. Size B. Appearance C. Dimensions D. Security

D. Form factor refers to the physical appearance and dimensions of the server.

Which of the following services uses port number 443? A. SFTP B. NTP C. HTTP D. HTTPS

D. HTTPS is a secure form of HTTP that uses port 443.

Which of the following is true of a NAS? A. A NAS has lower latency and higher reliability than a SAN. B. A NAS typically supports only RAID 5. C. A NAS does not support high throughput. D. Implementing a NAS is inexpensive.

D. Implementing a NAS is inexpensive when compared to implementing a SAN.

What is the most common protocol a SAN uses? A. IPX B. IP C. Ethernet D. Fibre Channel

D. In a classic SAN, devices communicate using the Fibre Channel protocol over a fiber network of storage devices typically connected to a Fibre Channel switch.

Which of the following can be accomplished using port security? A. Set the minimum number of MAC addresses that can be seen on a port B. Set the maximum number of IP addresses that can be seen on a port C. Define exactly which MAC addresses are not allowed on the port D. Set the maximum number of MAC addresses that can be seen on a port

D. It is possible to specify a maximum number of MAC addresses allowed on a port.

As the number of users assigned to a printer increases, which resource should be increased? A. Disk B. Metwork C. CPU D. Memory

D. Print servers need lots of memory to hold the print jobs waiting in the print queue. The exact amount will depend on the number of users assigned to the printers being managed by this print server.

Which of the following is another term for RAID 1? A. Duplicating B. Doubling C. Duplexing D. Mirroring

D. RAID 1 is also known as disk mirroring. This is a method of producing fault tolerance by writing all data simultaneously to two separate drives.

38. The sudo fdisk -l command lists the partitions on what type of system? A. Windows B. Mac C. Novell D. Linux

D. The sudo fdisk -l command lists the partitions on a Linux system.

Which authentication mechanism is an example of something you are? A. Password B. Username C. Smartcard D. Retina scan

D. While passwords and usernames are examples of something you know and a smartcard is an example of something you possess, a retina scan provides something you are.


Related study sets

Community Program Planning, Implementation, and Evaluation

View Set

Chapter 10: T/F Mini Quiz (Product Life Cycle)

View Set

Chapter 27: Fluid, Electrolyte, and Acid-Base Balance, Chapter Practice Test

View Set

Module 10 Review - Volume and Surface Area

View Set

A&P Chap 14: Autonomic Nervous System

View Set

Insurance License: Types of Life Policies

View Set

Foundations - Exam 6 - Unit 11 & 12

View Set

Pharmacology:Chapter 18 , 19 , 20

View Set