Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SK0-005 Exam Dumps - CompTIA Server+ Certification Exam

Question # 4

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 5

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Full Access
Question # 6

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Full Access
Question # 7

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

A.

The boot log

B.

The BIOS

C.

The HCL

D.

The event log

Full Access
Question # 8

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Full Access
Question # 9

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Full Access
Question # 10

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 11

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Full Access
Question # 12

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A.

A full, weekly backup with daily open-file backups

B.

A full, weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Full Access
Question # 13

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Full Access
Question # 14

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 15

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

A.

Link aggregation

B.

Heartbeat

C.

Most recently used

D.

Active-active

Full Access
Question # 16

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Full Access
Question # 17

Which of the following is typical of software licensing in the cloud?

A.

Per socket

B.

Perpetual

C.

Subscription-based

D.

Site-based

Full Access
Question # 18

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Full Access
Question # 19

Which of the following asset management documents is used to identify the location of a serves within a data center?

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Full Access
Question # 20

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Full Access
Question # 21

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Full Access
Question # 22

After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:

The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?

A.

Network port security

B.

An improper VLAN configuration

C.

A misconfigured DHCP server

D.

A misconfigured NIC on the server

Full Access
Question # 23

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?

A.

Give the user "read and execute" rights to the file.

B.

Give the user "modify" rights to the file.

C.

Give the user "list folder contents" rights to the folder.

D.

Give the user "full control" rights to the folder.

Full Access
Question # 24

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 25

Which of the following backup types only records changes to the data blocks on a virtual machine?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthetic full

Full Access
Question # 26

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Full Access
Question # 27

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Full Access
Question # 28

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Full Access
Question # 29

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Full Access
Question # 30

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 31

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Full Access
Question # 32

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Full Access
Question # 33

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 34

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Full Access
Question # 35

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 36

A server administrator needs to ensure all Window-based servers within a data center have RDP disabled. There are thousands of servers performing various roles. Which of the following is the best way to meet this requirement?

A.

Run chkconfig ——1eve1 345 RDP off.

B.

Create a PowerSheII script to disable the RDP service.

C.

Run chkconfig —— list RDP.

D.

Create a Bash shell script to disable the Windows Remote Management service.

E.

Create a GPO to disable the Windows Remote Management service.

Full Access
Question # 37

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Full Access
Question # 38

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Full Access
Question # 39

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Full Access
Question # 40

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Full Access
Question # 41

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

A.

Unplug the power cables from the redundant power supplies, leaving just the minimum required.

B.

Convert the physical servers to the hypervisors and retire the ten servers.

C.

Reimage the physical servers and retire all ten servers after the migration is complete.

D.

Convert the ten servers to power-efficient core editions.

Full Access
Question # 42

Which of the following is an example of load balancing?

A.

Round robin

B.

Active-active

C.

Active-passive

D.

Failover

Full Access
Question # 43

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Full Access
Question # 44

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 45

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Full Access
Question # 46

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Full Access
Question # 47

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Full Access
Question # 48

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Full Access
Question # 49

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 50

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Full Access
Question # 51

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Full Access
Question # 52

A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?

A.

Build a warm site and perform a fail over of the application.

B.

Build a cloud laaS and perform a fail over of the application.

C.

Build a hot site and perform a fail over of the application.

D.

Build a cold site and perform a fail over of the application.

E.

Perform a tabletop fail over of the application.

Full Access
Question # 53

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Full Access
Question # 54

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Full Access
Question # 55

Which of the following techniques can be configured on a server for network redundancy?

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Full Access
Question # 56

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

A.

Network

B.

Embedded

C.

Optical

D.

USB

Full Access
Question # 57

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 58

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Full Access
Question # 59

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Full Access
Question # 60

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 61

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

A.

Linked list

B.

String

C.

Loop

D.

Constant

Full Access
Question # 62

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 63

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 64

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

A.

0

B.

1

C.

5

D.

6

Full Access
Question # 65

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 66

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Full Access
Question # 67

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

A.

Waterfall

B.

Synthetic full

C.

Tower of Hanoi

D.

Grandfather-father-son

Full Access
Question # 68

A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?

A.

1U

B.

2U

C.

3U

D.

4U

Full Access
Question # 69

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Full Access
Question # 70

A Linux server requires repetitive tasks for reconfiguration. Which of the following would be the best scripting language to use?

A.

PowerShell

B.

Batch command file

C.

Bash

D.

Visual Basic

Full Access
Question # 71

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Full Access
Question # 72

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Full Access
Question # 73

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Full Access
Question # 74

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

A.

Drive

B.

Database

C.

Folder

D.

File

Full Access
Question # 75

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

A.

IP address: 192.168.10.2/24

Default gateway: 192.168.10.1

B.

IP address: 192.168.1.2/24

Default gateway: 192.168.10.1

C.

IP address: 192.168.10.3/24

Default gateway: 192.168.20.1

D.

IP address: 192.168.10.24/24

Default gateway: 192.168.30.1

Full Access
Question # 76

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Full Access
Question # 77

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

A.

Increasing IOPS by implementing flash storage

B.

Implementing deduplication on the storage

C.

Extending capacity by installing a 4TB SATA disk

D.

Reformatting the disk as FAT32

Full Access
Question # 78

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 79

A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?

A.

An ACL

B.

Antivirus

C.

DLP

D.

A firewall

Full Access
Question # 80

An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 81

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 82

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 83

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 84

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Full Access
Question # 85

Which of the following security risks provides unauthorized access to an application?

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Full Access
Question # 86

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Full Access
Question # 87

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Full Access
Question # 88

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

A.

The UPS batteries were overcharged.

B.

Redundant power supplies require 220V power

C.

Both power supplies were connected to the same power feed

D.

The power supplies were not cross-connected

Full Access
Question # 89

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Full Access
Question # 90

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Full Access
Question # 91

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Full Access
Question # 92

An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?

A.

Replace one drive, wait for a rebuild, and replace the next drive.

B.

Shut down the server and replace the drives.

C.

Replace both failed drives at the same time.

D.

Replace all the drives in both degraded arrays.

Full Access
Question # 93

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Full Access
Question # 94

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Full Access
Question # 95

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 96

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Full Access
Question # 97

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Full Access
Question # 98

Which of the following distributes a load across all interfaces?

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Full Access
Question # 99

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

A.

Simulated

B.

Tabletop

C.

Live

D.

Non-production

Full Access
Question # 100

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

A.

Implement data loss prevention.

B.

Configure intrusion detection.

C.

Turn on User Account Control.

D.

Disable anonymous access.

Full Access
Question # 101

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Full Access
Question # 102

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Full Access
Question # 103

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Full Access
Question # 104

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Full Access
Question # 105

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Full Access
Question # 106

A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?

A.

DHCP configuration

B.

Firewall rules

C.

DLP software

D.

Intrusion detection system

Full Access
Question # 107

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

A.

the correct firewall zone is active

B.

the latest firmware was applied

C.

NTP is running on the database system

D.

the correct dependencies are installed

Full Access
Question # 108

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Full Access
Question # 109

Which of the following script types uses commands That start with sec-?

A.

Batch

B.

Bash

C.

PowerShell

D.

JavaScript

Full Access
Question # 110

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Full Access
Question # 111

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

A.

Install security cameras

B.

Utilize security guards

C.

Install bollards

D.

Install a mantrap

Full Access
Question # 112

An administrator is working locally in a data center with multiple server racks. Which of the following is the best low-cost option to connect to any server while on site?

A.

Crash cart

B.

IPKVM

C.

Remote console access

D.

IPMI

Full Access
Question # 113

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Full Access
Question # 114

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

A.

Schedule a mandatory reboot of the server

B.

Wait for the load average to come back down on its own

C.

Identify the runaway process or processes

D.

Request that users log off the server

Full Access
Question # 115

Which of the following attacks is the most difficult to mitigate with technology?

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Full Access
Question # 116

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Full Access
Question # 117

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Full Access
Question # 118

A recent power Outage caused email services to go down. A sever administrator also received alerts from the datacenter’s UPS.

After some investigation, the server administrator learned that each POU was rated at a maximum Of 12A.

INSTRUCTIONS

Ensure power redundancy is implemented throughout each rack and UPS alarms are resolved. Ensure the maximum potential PDU consumption does not exceed 80% or 9.6A).

a. PDU selections must be changed using the pencil icon.

b. VM Hosts 1 and 2 and Mail Relay can be moved between racks.

c. Certain devices contain additional details

Full Access
Question # 119

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 120

Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 121

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Full Access
Question # 122

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.

21

B.

22

C.

23

D.

443

Full Access
Question # 123

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Full Access
Question # 124

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

A.

20

B.

21

C.

22

D.

23

E.

53

Full Access