Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA Server+ Certification Exam Question and Answers

CompTIA Server+ Certification Exam

Last Update May 1, 2024
Total Questions : 414

We are offering FREE SK0-005 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare SK0-005 free exam questions and then go for complete pool of CompTIA Server+ Certification Exam test questions that will help you more.

SK0-005 pdf

SK0-005 PDF

$35  $99.99
SK0-005 Engine

SK0-005 Testing Engine

$42  $119.99
SK0-005 PDF + Engine

SK0-005 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following licensing models was created by software companies in response to the increasing density of processors?

Options:

A.  

Per-instance

B.  

Per-server

C.  

per-user

D.  

per-core

Discussion 0
Questions 2

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Options:

A.  

Alternate the direction of the airflow

B.  

Install the heaviest server at the bottom of the rack

C.  

Place a UPS at the top of the rack

D.  

Leave 1U of space between each server

Discussion 0
Questions 3

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

Options:

A.  

Bridged

B.  

NAT

C.  

Host only

D.  

vSwitch

Discussion 0
Questions 4

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.  

Restart the server

B.  

Configure the network on the server

C.  

Enable the port on the server

D.  

Check the DHCP configuration

Discussion 0
Questions 5

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Options:

A.  

Bollards

B.  

Reflective glass

C.  

Security guards

D.  

Security cameras

Discussion 0
Questions 6

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

Options:

A.  

The controller has disabled the write cache.

B.  

The controller cannot use all the available channels.

C.  

The drive array is corrupt.

D.  

The controller has lost its configuration.

Discussion 0
Questions 7

An administrator needs to reconfigure a teamed network connection on a server in a remote data center. Which of the following will offer the most resilient connection while performing this change?

Options:

A.  

Use of an 00B solution

B.  

Use of a crash cart

C.  

Use of a VNC console

D.  

Use of an RDP console

Discussion 0
Questions 8

Which of the following backup types should be chosen for database servers?

Options:

A.  

Differential

B.  

Incremental

C.  

Synthetic full

D.  

Open file

Discussion 0
Questions 9

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.  

Utilize privacy screens.

B.  

Implement disk quotas.

C.  

Install a DLP solution.

D.  

Enforce the lock-screen feature.

Discussion 0
Questions 10

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

Options:

A.  

Configure a firewall

B.  

Close the unneeded ports

C.  

Install a HIDS

D.  

Disable unneeded services.

Discussion 0
Questions 11

Which of the following server types would benefit MOST from the use of a load balancer?

Options:

A.  

DNS server

B.  

File server

C.  

DHCP server

D.  

Web server

Discussion 0
Questions 12

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

Options:

A.  

/root.ssh/sshd/config

B.  

/etc.ssh/sshd_config

C.  

/root/.ssh/ssh_config

D.  

/etc.sshs_shd_config

Discussion 0
Questions 13

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.  

Use a RDP/VNC session.

B.  

Modify the startup configuration.

C.  

Use a PowerSheII/Bash script.

D.  

Use the BIOS/UEFI setup.

Discussion 0
Questions 14

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

Options:

A.  

Host

B.  

Template

C.  

Clone

D.  

Type1

E.  

Type2

F.  

Guest

Discussion 0
Questions 15

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

Options:

A.  

Check the power cables

B.  

Clean the fans.

C.  

Replace the RAM.

D.  

Reattach the CPU heat sink

Discussion 0
Questions 16

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

Options:

A.  

the correct firewall zone is active

B.  

the latest firmware was applied

C.  

NTP is running on the database system

D.  

the correct dependencies are installed

Discussion 0
Questions 17

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

Options:

A.  

Drives

B.  

Fans

C.  

CMOSIC

D.  

Processor

E.  

Power supplies

F.  

Motherboard

G.  

Memory

Discussion 0
Questions 18

A staff member who a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?

Options:

A.  

Installing blanking panels in all the empty rack spaces

B.  

installing an additional POU and spreading out the power cables

C.  

Installing servers on the shelves instead of sliding rails

D.  

installing front bezels on all the server’s m the rack

Discussion 0
Questions 19

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

Options:

A.  

VM

B.  

vNIC

C.  

vSwitch

D.  

vCPU

E.  

vHBA

Discussion 0
Questions 20

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.  

Network encapsulation

B.  

Off-site data

C.  

Secure FTP

D.  

Data in transit

Discussion 0
Questions 21

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

Options:

A.  

SAS SSD

B.  

SATA SSD

C.  

SAS drive with 10000rpm

D.  

SATA drive with 15000rpm

Discussion 0
Questions 22

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.  

Insider threat

B.  

Worms

C.  

Ransomware

D.  

Open ports

E.  

Two-person integrity

Discussion 0
Questions 23

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

Options:

A.  

Heartbeat

B.  

Failback

C.  

Redundancy

D.  

Load balancing

Discussion 0
Questions 24

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.  

Perform a root cause analysis

B.  

Develop a plan of action

C.  

Document the findings

D.  

Escalate the issue

E.  

Scope the issue

F.  

Notify the users

Discussion 0
Questions 25

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

Options:

A.  

DHCP

B.  

WINS

C.  

DNS

D.  

TCP

Discussion 0
Questions 26

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

Options:

A.  

Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.

B.  

Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.

C.  

Use the longest cables possible to allow for adjustment of the server rail within the rack.

D.  

Install an Ethernet patch panel and a PDU to accommodate the network and power cables.

Discussion 0
Questions 27

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Options:

A.  

Restore the data from backup.

B.  

Disclose the incident.

C.  

Disable unnecessary ports.

D.  

Run an antivirus scan.

E.  

Identify the exploited vulnerability.

F.  

Move the data to a different location.

Discussion 0
Questions 28

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

Options:

A.  

Tabletcp

B.  

Backup recovery test

C.  

Lrverail over

D.  

Hot-site visit audit

Discussion 0
Questions 29

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

Options:

A.  

The VLAN Is improperly configured.

B.  

The DNS configuration Is invalid.

C.  

The OS version is not compatible with the network switch vendor.

D.  

The HIDS is preventing the connection.

Discussion 0
Questions 30

Which of the following is the MOST secure method to access servers located in remote branch offices?

Options:

A.  

Use an MFAout-of-band solution.

B.  

Use a Telnet connection.

C.  

Use a password complexity policy.

D.  

Use a role-based access policy.

Discussion 0
Questions 31

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

Options:

A.  

Perform scheduled chkdsk tests.

B.  

Purchase matching hardware and clone the disk.

C.  

Upgrade the hard disk to SSD.

D.  

Perform quarterly backups.

Discussion 0
Questions 32

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

Options:

A.  

Have the facility inspect and inventory the tapes on a regular basis.

B.  

Have duplicate equipment available at the cold site.

C.  

Retrieve the tapes from the cold site and test them.

D.  

Use the test equipment at the cold site to read the tapes.

Discussion 0
Questions 33

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.  

1,2, 4, and 6

B.  

1, 2, 3, 5, and 6

C.  

1, 2, 4, 5, and 6

D.  

1, 2, 3, 4, and 6

Discussion 0
Questions 34

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

Options:

A.  

The server has a faulty power supply

B.  

The server has a CMOS battery failure

C.  

The server requires OS updates

D.  

The server has a malfunctioning LED panel

E.  

The servers do not have NTP configured

F.  

The time synchronization service is disabled on the servers

Discussion 0
Questions 35

Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?

Options:

A.  

Aggregation

B.  

Subscription

C.  

Merging

D.  

Collection

Discussion 0
Questions 36

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

Options:

A.  

Third-party acceptable use policy

B.  

Customer data encryption and masking

C.  

Non-disclosure and indemnity agreements

D.  

Service- and operational-level agreements

Discussion 0
Questions 37

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.  

Open file

B.  

Archive

C.  

Cloud

D.  

Snapshot

E.  

Differential

F.  

Synthetic full

Discussion 0
Questions 38

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

Options:

A.  

Hot

B.  

Cold

C.  

Colocated

D.  

Warm

Discussion 0
Questions 39

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

Options:

A.  

Intrusion detection is blocking the port.

B.  

The new application's DNS entry is incorrect.

C.  

The application should be changed to use port 443.

D.  

The core switch has a network issue.

Discussion 0
Questions 40

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

Options:

A.  

Applying OS updates

B.  

Disabling unused services

C.  

Implementing HIDS

D.  

Installing anti-malware

Discussion 0
Questions 41

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.  

Definition updates

B.  

Driver updates

C.  

OS security updates

D.  

Application updates

Discussion 0
Questions 42

Which of the following actions should the server administrator perform on the server?

Options:

A.  

Close ports 69 and 1010 and rerun the scan.

B.  

Close ports 80 and 443 and rerun the scan.

C.  

Close port 3389 and rerun the scan.

D.  

Close all ports and rerun the scan.

Discussion 0
Questions 43

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.  

SD card

B.  

NAS drive

C.  

SATA drive

D.  

SAS drive

Discussion 0
Questions 44

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.  

Inspect the GPU that is being installed.

B.  

Ensure the GPU meets HCL guidelines.

C.  

Shut down the server.

D.  

Disconnect the power from the rack.

Discussion 0
Questions 45

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

Options:

A.  

Schedule a mandatory reboot of the server

B.  

Wait for the load average to come back down on its own

C.  

Identify the runaway process or processes

D.  

Request that users log off the server

Discussion 0
Questions 46

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

Options:

A.  

Open port 990 and close port 23.

B.  

Open port 22 and close port 23.

C.  

Open all of the ports listed.

D.  

Close all of the ports listed.

Discussion 0
Questions 47

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Options:

Discussion 0
Questions 48

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

Options:

A.  

Copy the existing data to an external USB 3 0 enclosure.

B.  

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.  

Transfer the existing data to an external eSATA enclosure.

D.  

Move the existing data to a new. larger internal hard drive.

Discussion 0
Questions 49

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

Options:

A.  

Chmod +w startup.sh

B.  

Chmod 444 startup.sh

C.  

Chmod+x startup.sh

D.  

Chmod 466 startUp,sh

Discussion 0
Questions 50

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

Options:

A.  

21

B.  

22

C.  

443

D.  

3389

Discussion 0
Questions 51

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

Options:

A.  

Simulated

B.  

Tabletop

C.  

Live

D.  

Non-production

Discussion 0
Questions 52

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

Options:

A.  

Rack

B.  

Virtual

C.  

Tower

D.  

Blade

Discussion 0
Questions 53

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.  

Linked list

B.  

String

C.  

Loop

D.  

Constant

Discussion 0
Questions 54

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.  

Differential

B.  

Synthetic full

C.  

Archive

D.  

Full

E.  

Incremental

F.  

Open file

Discussion 0
Questions 55

Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?

Options:

A.  

Humidity control system

B.  

Sensors

C.  

Fire suppression

D.  

Heating system

Discussion 0
Questions 56

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

  • HTTP

Options:

A.  

FTP

B.  

SCP

C.  

USB

Discussion 0
Questions 57

A recent power Outage caused email services to go down. A sever administrator also received alerts from the datacenter’s UPS.

After some investigation, the server administrator learned that each POU was rated at a maximum Of 12A.

INSTRUCTIONS

Ensure power redundancy is implemented throughout each rack and UPS alarms are resolved. Ensure the maximum potential PDU consumption does not exceed 80% or 9.6A).

a. PDU selections must be changed using the pencil icon.

b. VM Hosts 1 and 2 and Mail Relay can be moved between racks.

c. Certain devices contain additional details

Options:

Discussion 0
Questions 58

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

Options:

A.  

Lockout

B.  

Length

C.  

Complexity

D.  

Minimum age

Discussion 0
Questions 59

Which of the following licensing concepts is based on the number of logical processors a server has?

Options:

A.  

Per core

B.  

Per socket

C.  

Per instance

D.  

Per server

Discussion 0
Questions 60

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

Options:

A.  

The disk uses GPT.

B.  

The partition is formatted with ext4.

C.  

The -partition is formatted with FAT32.

D.  

The disk uses MBn.

Discussion 0
Questions 61

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.  

The server has high page utilization.

B.  

The server has high disk latency.

C.  

The application is single-threaded.

D.  

The application cannot be virtualized.

Discussion 0
Questions 62

Winch of the following is a type of replication in which all files are replicated, all the time?

Options:

A.  

Constant

B.  

Application consistent

C.  

Synthetic full

D.  

Full

Discussion 0
Questions 63

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

Options:

A.  

Formatting

B.  

Compression

C.  

Disk quotas

D.  

Partitioning

Discussion 0
Questions 64

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

Options:

A.  

RAIDO

B.  

RAID1

C.  

RAID 5

D.  

RAID 6

E.  

RAID 10

Discussion 0
Questions 65

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

Options:

A.  

Biometrics

B.  

Push notifications

C.  

Smart carts

D.  

Physical tokens

Discussion 0
Questions 66

Which of the following life-cycle management phases deals with a server that is no longer in operation?

Options:

A.  

End-of-life

B.  

Disposal

C.  

Usage

D.  

Procurement

Discussion 0
Questions 67

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Options:

A.  

Press F8 to enter safe mode

B.  

Boot from the media

C.  

Enable HIDS on the server

D.  

Log in with an administrative account

Discussion 0
Questions 68

The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.

One of the alerts contains the following information:

Exploit Alert

Attempted User Privilege Gain

2/2/07-3: 09:09 10.1.200.32

--> 208.206.12.9:80

This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two).

Options:

A.  

Disable all services on the affected application server.

B.  

Perform a vulnerability scan on all the servers within the cluster and patch accordingly.

C.  

Block access to 208.206.12.9 from all servers on the network.

D.  

Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.

E.  

Enable GPO to install an antivirus on all the servers and perform a weekly reboot.

F.  

Perform an antivirus scan on all servers within the cluster and reboot each server.

Discussion 0
Questions 69

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.  

Cancelled change request

B.  

Change request postponement

C.  

Emergency change request

D.  

Privilege change request

E.  

User permission change request

Discussion 0
Questions 70

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?

Options:

A.  

echo /newdisk >> /etc/fstab

B.  

net use /newdisk

C.  

mount –o remount, rw /newdisk

D.  

mount –a

Discussion 0
Questions 71

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

Options:

A.  

RAID 0

B.  

RAID 1

C.  

RAID 5

D.  

RAID 6

Discussion 0
Questions 72

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.  

VPN

B.  

TFTP

C.  

SSH

D.  

HTTP

Discussion 0
Questions 73

A snapshot is a feature that can be used in hypervisors to:

Options:

A.  

roll back firmware updates.

B.  

restore to a previous version.

C.  

roll back application drivers.

D.  

perform a backup restore.

Discussion 0
Questions 74

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

Options:

A.  

Fencing

B.  

Bollards

C.  

Camouflage

D.  

Reflective glass

Discussion 0
Questions 75

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.  

chmod777/home/Ann

B.  

chmod666/home/Ann

C.  

chmod711/home/Ann

D.  

chmod754/home/Ann

Discussion 0
Questions 76

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?

Options:

A.  

The system is booting to a USB flash drive.

B.  

The UEFI boot was interrupted by a missing Linux boot file.

C.  

The BIOS could not find a bootable hard disk.

D.  

The BIOS firmware needs to be upgraded.

Discussion 0
Questions 77

A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?

Options:

A.  

Build a warm site and perform a fail over of the application.

B.  

Build a cloud laaS and perform a fail over of the application.

C.  

Build a hot site and perform a fail over of the application.

D.  

Build a cold site and perform a fail over of the application.

E.  

Perform a tabletop fail over of the application.

Discussion 0
Questions 78

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

Options:

A.  

Per socket

B.  

Open-source

C.  

Per concurrent user

D.  

Volume

Discussion 0
Questions 79

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.  

Round robin

B.  

SCP

C.  

MRU

D.  

Link aggregation

Discussion 0
Questions 80

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?

Options:

A.  

Management port

B.  

Crash cart

C.  

IP KVM

D.  

KVM

Discussion 0
Questions 81

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.  

SSH

B.  

SSL

C.  

SMTP

D.  

PGP

Discussion 0
Questions 82

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

Options:

A.  

mantrap.

B.  

a bollard

C.  

geofencing

D.  

RFI

D.  

Discussion 0
Questions 83

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.  

User groups

B.  

User activity reports

C.  

Password policy

D.  

Multifactor authentication

Discussion 0
Questions 84

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

Options:

A.  

11.251.196.241

B.  

171.245.198.241

C.  

172.16.19.241

D.  

193.168.145.241

Discussion 0
Questions 85

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

Options:

A.  

Direct access

B.  

Overprovisioning

C.  

Link aggregation

D.  

Component redundancy

E.  

Scalability

Discussion 0
Questions 86

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

Options:

A.  

The server has not been joined to the domain.

B.  

An IP address has not been assigned to the server.

C.  

The server requires a reboot to complete the deployment process.

D.  

The domain credentials are invalid.

Discussion 0
Questions 87

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

Options:

A.  

0

B.  

1

C.  

5

D.  

6

Discussion 0
Questions 88

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.  

The gateway is no longer being reached.

B.  

The network firewall was enabled.

C.  

The printer's network interface failed.

D.  

The printer had DHCP enabled.

Discussion 0
Questions 89

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.  

Stop sharing the volume

B.  

Replace the disk

C.  

Shut down the SAN

D.  

Stop all connections to the volume

Discussion 0
Questions 90

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

Options:

A.  

RFID

B.  

Proximity readers

C.  

Signal blocking

D.  

Camouflage

E.  

Reflective glass

F.  

Bollards

Discussion 0
Questions 91

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

Options:

A.  

The server will gracefully shut down.

B.  

The server will immediately crash.

C.  

The server will operate but in read-only mode.

D.  

The server will continue to operate normally.

Discussion 0
Questions 92

A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,

copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to

narrow down the issue?

Options:

A.  

Disk IOPS

B.  

CPU utilization

C.  

RAM utilization

D.  

Network latency

Discussion 0
Questions 93

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

Options:

A.  

visudo I grep userid

B.  

sudo -1 -U userid

C.  

cat /etc/passwd

D.  

userlist I grep userid

Discussion 0
Questions 94

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

Options:

A.  

Anti-malware

B.  

Nbtstat

C.  

Port scanner

D.  

Sniffer

Discussion 0
Questions 95

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

Options:

A.  

Set up the warm site as a DR cold site.

B.  

Set up a DR site that is in the cloud and in the same region.

C.  

Set up the warm site as a DR hot site.

D.  

Set up a DR site that is geographically located in another region.

Discussion 0
Questions 96

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

Options:

A.  

RTO

B.  

SLA

C.  

MTBF

D.  

MTTR

Discussion 0
Questions 97

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.  

Separate circuits

B.  

An uninterruptible power supply

C.  

Increased PDU capacity

D.  

Redundant power supplies

Discussion 0
Questions 98

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

Options:

A.  

Install the OS on a RAID 0 array.

B.  

Install the OS on a RAID 1 array.

C.  

Configure RAID 1 for the application data.

D.  

Configure RAID 5 for the application data.

E.  

Use SSD hard drives for the data application array.

F.  

Use SATA hard drives for the data application array.

G.  

Use a single JBOD for OS and application data.

Discussion 0
Questions 99

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

Options:

A.  

Confirm the server has the current OS updates and security patches installed.

B.  

Confirm the server OS has a valid Active Directory account.

C.  

Confirm the server does not have the firewall running.

D.  

Confirm the server is in the collection scheduled to receive the update.

Discussion 0
Questions 100

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

Options:

A.  

53

B.  

80

C.  

389

D.  

443

E.  

445

F.  

3389

G.  

8080

Discussion 0
Questions 101

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Options:

A.  

RTO

B.  

MTBF

C.  

PRO

D.  

MTTR

Discussion 0
Questions 102

Which of the following security risks provides unauthorized access to an application?

Options:

A.  

Backdoor

B.  

Data corruption

C.  

Insider threat

D.  

Social engineering

Discussion 0
Questions 103

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

Options:

A.  

THe DHCP exclusion needs to be removed.

B.  

The DHCP scope is full.

C.  

The DHCP scope options are misconfigured.

D.  

The DHCP lease times are too short.

E.  

The DHCP reservations need to be configured.

Discussion 0
Questions 104

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

Options:

A.  

Deploying each server from a VM template

B.  

Using a kickstart file during installation

C.  

Configuring each server manually one at a time

D.  

Copying/pasting configuration commands into each server through SSH sessions

E.  

Configuring a single server and then creating clones of it

Discussion 0
Questions 105

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

Options:

A.  

nbtstat

B.  

netuse

C.  

tracert

D.  

netstst

Discussion 0
Questions 106

Which of the following distributes a load across all interfaces?

Options:

A.  

Link aggregation group

B.  

Most recently used algorithm

C.  

Active-passive configuration

D.  

Failover

Discussion 0
Questions 107

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

Options:

A.  

Remove all the data from the server drives using the least destructive method.

B.  

Repurpose and recycle any usable server components.

C.  

Remove all the components from the server.

D.  

Review all company polices.

Discussion 0
Questions 108

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

Options:

A.  

Something you are

B.  

Something you know

C.  

Something you have

D.  

Something you do

Discussion 0
Questions 109

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

Options:

A.  

Full

B.  

Bare metal

C.  

Core

D.  

GUI

Discussion 0
Questions 110

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.  

Differential

B.  

Incremental

C.  

Synthetic full

D.  

Snapshot

Discussion 0
Questions 111

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

Options:

A.  

Manage the fileshare from an RDP session.

B.  

Audit the permissions of the fileshare.

C.  

Audit the access to the physical fileshare.

D.  

Manage the permissions from the fileshare.

Discussion 0
Questions 112

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.  

RAID 1

B.  

RAID 5

C.  

RAID 6

D.  

RAID 10

Discussion 0
Questions 113

Which of the following is typical of software licensing in the cloud?

Options:

A.  

Per socket

B.  

Perpetual

C.  

Subscription-based

D.  

Site-based

Discussion 0
Questions 114

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

Options:

A.  

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.  

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.  

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.  

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Discussion 0
Questions 115

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

Options:

A.  

A firewall

B.  

An antivirus

C.  

AHIDS

D.  

User account control

Discussion 0
Questions 116

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?

Options:

A.  

Disable port 389 on the server

B.  

Move traffic from port 389 to port 443

C.  

Move traffic from port 389 to port 637

D.  

Enable port 389 for web traffic

Discussion 0
Questions 117

An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the MINIMUM number of disks needed for this application?

Options:

A.  

6

B.  

7

C.  

8

D.  

9

Discussion 0
Questions 118

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

Options:

A.  

53

B.  

80

C.  

389

D.  

443

E.  

45

F.  

3389

G.  

8080

Discussion 0
Questions 119

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

Options:

A.  

Close unneeded ports.

B.  

Disable unused services.

C.  

Set a BIOS password.

D.  

Apply driver updates.

Discussion 0
Questions 120

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.  

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.  

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.  

A fan failure has occurred, and the other fans have increased speed to compensate.

D.  

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Discussion 0
Questions 121

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

Options:

A.  

IP address: 192.168.10.2/24

Default gateway: 192.168.10.1

B.  

IP address: 192.168.1.2/24

Default gateway: 192.168.10.1

C.  

IP address: 192.168.10.3/24

Default gateway: 192.168.20.1

D.  

IP address: 192.168.10.24/24

Default gateway: 192.168.30.1

Discussion 0
Questions 122

A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).

Options:

A.  

Floor load limitations

B.  

Rack balancing

C.  

Proper lifting techniques

D.  

Power connector type

E.  

KVM placement

F.  

Cable management

G.  

UPS power requirements

Discussion 0
Questions 123

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

Options:

A.  

Fibre Channel

B.  

FCoE

C.  

iSCSI

D.  

eSATA

Discussion 0
Questions 124

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

Options:

A.  

The solution reduced shutdown time.

B.  

The solution improved load balancing,

C.  

The solution increased power out.

D.  

The solution extended runtime.

Discussion 0