Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA SK0-005 CompTIA Server+ Certification Exam Exam Practice Test

Demo: 141 questions
Total 467 questions

CompTIA Server+ Certification Exam Questions and Answers

Question 1

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

Options:

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Question 2

A Linux server was recently updated. The server now stops during the boot process with a blank screen and an fs> prompt. Which of the following is the most likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Question 3

Under which of the following should a technician implement scripting?

Options:

A.

Authenticating users

B.

Change management

C.

Business impact analysis

D.

Step-by-step tasks

Question 4

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Question 5

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Question 6

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 7

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Question 8

After installing an OS on a new server, the administrator realizes the server does not have any network connectivity. The administrator checks the network cable, and it seems to be transferring data. Which of the following should be checked next?

Options:

A.

NIC firmware

B.

IPv4 options

C.

DHCP options

D.

Firewall options

E.

DNS settings

Question 9

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

Options:

A.

Check the power cables

B.

Clean the fans.

C.

Replace the RAM.

D.

Reattach the CPU heat sink

Question 10

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Question 11

A new 40GB NIC has just been installed in a server but is not detected within the Windows server OS. Which of the following would most likely fix the issue?

Options:

A.

Update the firmware on the NIC.

B.

Update the server OS.

C.

Update the remote management console.

D.

Update the switch firmware.

Question 12

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

Options:

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Question 13

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 14

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Question 15

A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?

Options:

A.

Separate circuits

B.

Load balancing

C.

Server monitoring

D.

Redundancy

Question 16

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

Options:

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

Question 17

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

Options:

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Question 18

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Question 19

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

Options:

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Question 20

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

Options:

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Question 21

A junior administrator reported that the website used for anti-malware updates is not working. The senior administrator then discovered all requests to the anti-malware site are being redirected to a malicious site. Which of the following tools should the senior administrator check first to identify the potential cause of the issue?

Options:

A.

Data loss prevention

B.

File integrity monitor

C.

Port scanner

D.

Sniffer

Question 22

A datacenter has ten 40U racks in a hot/cold aisle configuration. The room has adequate air conditioning, but servers located near the top of the racks are shutting down due to issues with heat. Which of the following should be used to reduce issues with heat?

Options:

A.

Rack balancing

B.

Higher-capacity PDUs

C.

Rail kits

D.

Blanking panels

Question 23

The internal IT department policy for monitoring server health requires that evidence of server reboots be collected and reviewed on a regular basis. Which of the following should be monitored to best provide this evidence?

Options:

A.

Uptime

B.

IOPS

C.

CPU utilization

D.

Event logs

Question 24

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

Options:

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Question 25

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

Options:

A.

Simulated

B.

Tabletop

C.

Live

D.

Non-production

Question 26

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Question 27

An administrator is upgrading a group of legacy blade servers to the latest version of the hypervisor. After restarting the server, the upgrade is interrupted. The hypervisor is not available, and the update is not successful. Which of the following should the administrator do next to accomplish this upgrade?

Options:

A.

Change the upgrade to a new installation and overwrite the boot drive.

B.

Upgrade the blade server's firmware to support the new hypervisor.

C.

Increase the blade server’s onboard RAM.

D.

Upgrade the blade server's hardware.

Question 28

An administrator is configuring the storage for a new database server, which will host databases that are mainly used for archival lookups. Which of the following storage types will yield the fastest database read performance?

Options:

A.

NAS

B.

SSD

C.

10K rpm SATA

D.

15K rpm SCSI

Question 29

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

Options:

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Question 30

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

Options:

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Question 31

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

Options:

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Question 32

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Question 33

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

Options:

A.

Power cycle the storage arrays and rescan RAID on the server.

B.

Boot the OS into recovery mode and rescan the disks.

C.

Restore the default RAID configuration and reboot.

D.

Perform a rescan on the server's RAID controller.

Question 34

Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?

Options:

A.

Bolting door lock

B.

Combination door lock

C.

Electronic door lock

D.

Biometric door lock

Question 35

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

Options:

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Question 36

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

Options:

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

Question 37

An administrator is patching a file and print server After rebooting the server, it begins acting strangely. The administrator tries to open Print Management, but it will not open Upon inspection, the spooler service has been disabled. The administrator then notices the server has services that should be enabled but are disabled. Which of the following actions should the administrator take next to resolve the issue as quickly as possible?

Options:

A.

Roll back the installed updates

B.

Set the services to restart automatically and reboot the server

C.

Enable the spooler service.

D.

Reboot the server into safe mode

Question 38

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Question 39

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.

VPN

B.

TFTP

C.

SSH

D.

HTTP

Question 40

An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?

Options:

A.

1000BASE-LX 1Gb single-mode plenum fiber connection

B.

10GBASE-T 10Gb copper plenum Ethernet connection

C.

1000BASE-T 1Gb copper non-plenum Ethernet connection

D.

10GBASE-SR 10Gb multimode plenum fiber connection

Question 41

Which of the following will protect critical data during a natural disaster?

Options:

A.

Off-site storage

B.

Life-cycle management

C.

Environmental controls

D.

Data-at-rest encryption

Question 42

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

Options:

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Question 43

Which of the following should a technician verify first before decommissioning and wiping a file server?

Options:

A.

The media destruction method

B.

The recycling policy

C.

Asset management documentation

D.

Document retention policy

Question 44

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

Options:

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Question 45

Which of the following technologies can successfully back up files that are used by other processes without stopping those processes?

Options:

A.

Differential

B.

Archive

C.

Synthetic full

D.

Open file

Question 46

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Question 47

Which of the following supports virtualization?

Options:

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

Question 48

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Question 49

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Question 50

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Question 51

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Question 52

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

Options:

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Question 53

Winch of the following is a type of replication in which all files are replicated, all the time?

Options:

A.

Constant

B.

Application consistent

C.

Synthetic full

D.

Full

Question 54

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Question 55

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

Options:

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Question 56

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

Options:

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Question 57

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

Options:

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Question 58

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

Options:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Question 59

A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network. Which of the following should the technician do FIRST to return the server to service as soon as possible?

Options:

A.

Replace the NIC

B.

Make sure the NIC is on the HCL

C.

Reseat the NIC

D.

Downgrade the NIC firmware

Question 60

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

Options:

A.

SSO

B.

LDAP

C.

TACACS

D.

MFA

Question 61

A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)

Options:

A.

Remote desktop

B.

IP KVM

C.

A console connection

D.

A virtual administration console

E.

Remote drive access

F.

A crash cart

Question 62

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

Options:

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Question 63

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Options:

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Question 64

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Options:

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Question 65

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?

Options:

A.

pvdisplay

B.

mount

C.

df -h

D.

fdisk -l

Question 66

Which of the following is typical of software licensing in the cloud?

Options:

A.

Per socket

B.

Perpetual

C.

Subscription-based

D.

Site-based

Question 67

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Question 68

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

Options:

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Question 69

A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution?

Options:

A.

Copy the fileshare to an LTO-4 tape drive

B.

Configure a new incremental backup job for the fileshare

C.

Create an additional partition and move a copy of the fileshare

D.

Create a snapshot of the fileshare

Question 70

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

Options:

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 71

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?

Options:

A.

Disable port 389 on the server

B.

Move traffic from port 389 to port 443

C.

Move traffic from port 389 to port 637

D.

Enable port 389 for web traffic

Question 72

A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?

Options:

A.

Crash cart

B.

Out-of-band console

C.

IP KVM

D.

RDP

Question 73

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

Options:

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Question 74

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Options:

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Question 75

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

Options:

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning

Question 76

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Question 77

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 78

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 79

Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?

Options:

A.

Check the power supplies

B.

Review the log files.

C.

Reinstall the ESX server.

D.

Reseat the processors.

Question 80

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

Options:

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Question 81

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

Options:

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Question 82

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?

Options:

A.

IP KVM

B.

VNC

C.

A crash cart

D.

RDP

E.

SSH

Question 83

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Question 84

Which of the following would be BEST to help protect an organization against social engineering?

Options:

A.

More complex passwords

B.

Recurring training and support

C.

Single sign-on

D.

An updated code of conduct to enforce social media

Question 85

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

Options:

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Question 86

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

Options:

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Question 87

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

Options:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Question 88

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

Options:

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Question 89

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

Options:

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Question 90

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent

unauthorized server access? (Choose two.)

Options:

A.

Audit all group privileges and permissions

B.

Run a checksum tool against all the files on the server

C.

Stop all unneeded services and block the ports on the firewall

D.

Initialize a port scan on the server to identify open ports

E.

Enable port forwarding on port 80

F.

Install a NIDS on the server to prevent network intrusions

Question 91

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

Options:

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Question 92

Which of the following policies would be BEST to deter a brute-force login attack?

Options:

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Question 93

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

Options:

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Question 94

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

Options:

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Question 95

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

Options:

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Question 96

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Question 97

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

Options:

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Question 98

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Question 99

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

Options:

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Question 100

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

Options:

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Question 101

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

Options:

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Question 102

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Question 103

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

Options:

A.

rsync

B.

copy

C.

scp

D.

robocopy

Question 104

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

Options:

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Question 105

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full incremental

D.

Full differential

Question 106

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Options:

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Question 107

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 108

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

Options:

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Question 109

Which of the following refers to the requirements that dictate when to delete data backups?

Options:

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Question 110

Which of the following licensing concepts is based on the number of logical processors a server has?

Options:

A.

Per core

B.

Per socket

C.

Per instance

D.

Per server

Question 111

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Question 112

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Question 113

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Question 114

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

Options:

A.

set-service

B.

net

C.

sc

D.

services.msc

Question 115

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

Options:

A.

A firewall blocking the ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entries for the print server are incorrect.

D.

The hosts file misconfigured.

Question 116

Which of the following should be configured in pairs on a server to provide network redundancy?

Options:

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Question 117

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Question 118

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

Options:

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Question 119

A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?

Options:

A.

Unattended scripted OS installation

B.

P2V

C.

VM cloning

Question 120

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

Options:

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Question 121

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

Options:

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Question 122

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

Options:

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Question 123

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Question 124

An administrator needs to reconfigure a teamed network connection on a server in a remote data center. Which of the following will offer the most resilient connection while performing this change?

Options:

A.

Use of an 00B solution

B.

Use of a crash cart

C.

Use of a VNC console

D.

Use of an RDP console

Question 125

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

Options:

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Question 126

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Question 127

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

Options:

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Question 128

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

Options:

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Question 129

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

Options:

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Question 130

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

Options:

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Question 131

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

Options:

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Question 132

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Question 133

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Question 134

A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?

Options:

A.

Build a warm site and perform a fail over of the application.

B.

Build a cloud laaS and perform a fail over of the application.

C.

Build a hot site and perform a fail over of the application.

D.

Build a cold site and perform a fail over of the application.

E.

Perform a tabletop fail over of the application.

Question 135

A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do NEXT?

Options:

A.

Reinstall the server OS in repair mode while maintaining the data.

B.

Flash the BIOS with the most recent version.

C.

Reverse the latest change made to the server and reboot.

D.

Restart the server into safe mode and roll back changes.

Question 136

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Question 137

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

Options:

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Question 138

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

Options:

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Question 139

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

Options:

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Question 140

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 141

A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen.

Which of the following is the next step the administrator should take to diagnose the error without opening the machine?

Options:

A.

Perform a cold reboot.

B.

Listen for POST code beeps.

C.

Call technical support.

D.

Check the monitor connection.

Demo: 141 questions
Total 467 questions