11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SK0-005 Exam Dumps - CompTIA Server+ Certification Exam

Question # 4

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Full Access
Question # 5

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 6

A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?

A.

Necessary dependencies were installed for multiple architectures.

B.

There is not enough hard drive space.

C.

The server is infected with a virus.

D.

Some modules are not compatible.

Full Access
Question # 7

A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?

A.

An ACL

B.

Antivirus

C.

DLP

D.

A firewall

Full Access
Question # 8

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 9

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 10

Which of the following licensing concepts is based on the number of logical processors a server has?

A.

Per core

B.

Per socket

C.

Per instance

D.

Per server

Full Access
Question # 11

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Full Access
Question # 12

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Full Access
Question # 13

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

A.

21

B.

22

C.

443

D.

3389

Full Access
Question # 14

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Full Access
Question # 15

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Full Access
Question # 16

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Full Access
Question # 17

A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?

A.

Consult internet forums to determine which is the most common cause and deploy only that solution.

B.

Test each solution individually to determine the root cause, rolling back the changes in between each test.

C.

Implement the shortest solution first to identify the issue and minimize downtime.

D.

Test each solution in succession and restore the server from the latest snapshot.

Full Access
Question # 18

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

A.

Print

B.

File

C.

Database

D.

Messaging

Full Access
Question # 19

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Full Access
Question # 20

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

Full Access
Question # 21

A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?

A.

Alerting

B.

Retention

C.

Shipping

D.

Rotation

Full Access
Question # 22

Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?

A.

Per-server

B.

per-seat

C.

Per-concurrent user

D.

per-core

Full Access
Question # 23

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

A.

Hybrid

B.

Public

C.

Private

D.

Community

Full Access
Question # 24

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Full Access
Question # 25

Which of the following BEST describes a warm site?

A.

The site has all infrastructure and live data.

B.

The site has all infrastructure and some data

C.

The site has partially redundant infrastructure and no network connectivity

D.

The site has partial infrastructure and some data.

Full Access
Question # 26

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Full Access
Question # 27

Which of the following should be configured in pairs on a server to provide network redundancy?

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Full Access
Question # 28

An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 29

An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?

A.

Replace one drive, wait for a rebuild, and replace the next drive.

B.

Shut down the server and replace the drives.

C.

Replace both failed drives at the same time.

D.

Replace all the drives in both degraded arrays.

Full Access
Question # 30

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Full Access
Question # 31

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 32

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Full Access
Question # 33

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Full Access
Question # 34

A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient

subnet mask for this connection?

A.

/28

B.

/29

C.

/30

D.

/32

Full Access
Question # 35

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 36

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Full Access
Question # 37

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

Full Access
Question # 38

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 39

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Full Access
Question # 40

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

A.

Applying OS updates

B.

Disabling unused services

C.

Implementing HIDS

D.

Installing anti-malware

Full Access
Question # 41

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Full Access
Question # 42

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Full Access
Question # 43

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

A.

Close unneeded ports.

B.

Disable unused services.

C.

Set a BIOS password.

D.

Apply driver updates.

Full Access
Question # 44

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

A.

File

Full Access
Question # 45

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 46

A technician notices that every time a server is powered on, it turns off after several minutes. After reviewing logs, the technician notices the server registers execution of the shutdown. Which of the following should the technician do to fix this issue?

A.

Reset the memory modules

B.

Check for fan failure

C.

Change the VM password

D.

Set credentials for the remote console

Full Access
Question # 47

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

Full Access
Question # 48

Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.

Which of the following types of authentications is described in this scenario?

A.

MFA

B.

NTLM

C.

Kerberos

D.

SSO

Full Access
Question # 49

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Full Access
Question # 50

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Full Access
Question # 51

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Full Access
Question # 52

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

A.

SD card

B.

Optical

C.

Network

D.

USB

Full Access
Question # 53

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

Full Access
Question # 54

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Full Access
Question # 55

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Full Access
Question # 56

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

A.

The server has a faulty power supply

B.

The server has a CMOS battery failure

C.

The server requires OS updates

D.

The server has a malfunctioning LED panel

E.

The servers do not have NTP configured

F.

The time synchronization service is disabled on the servers

Full Access
Question # 57

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

A.

Power cycle the storage arrays and rescan RAID on the server.

B.

Boot the OS into recovery mode and rescan the disks.

C.

Restore the default RAID configuration and reboot.

D.

Perform a rescan on the server's RAID controller.

Full Access
Question # 58

Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?

A.

Loop

B.

Variable

C.

Comparator

D.

Conditional

Full Access
Question # 59

A technician replaces a single faulted disk in the following array RAID 10, Four 15K SAS HDD The technician replaces it from a disk in spare parts, and the array rebuilds the data in a few minutes. After the array rebuild is complete, the system reports the IOPS on the disk array have dropped by almost 60% Which of the following should the technician investigate first?

A.

Check the RAID controller (or background rebuild tasks

B.

Check the firmware version on the newly replaced disk.

C.

Check the RPM speed on the newly replaced disk-

D.

Check the cache settings on the RAID controller.

Full Access
Question # 60

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Full Access
Question # 61

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Full Access
Question # 62

An administrator is working locally in a data center with multiple server racks. Which of the following is the best low-cost option to connect to any server while on site?

A.

Crash cart

B.

IPKVM

C.

Remote console access

D.

IPMI

Full Access
Question # 63

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

A.

Direct access

B.

Overprovisioning

C.

Link aggregation

D.

Component redundancy

E.

Scalability

Full Access
Question # 64

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 65

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

A.

53

B.

80

C.

389

D.

443

E.

445

F.

3389

G.

8080

Full Access
Question # 66

Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?

A.

Overprovisioning

B.

Scalability

C.

Thin clients

D.

Resource Monitor

Full Access
Question # 67

A server administrator created a new script and included the path to the script binary as the first line of the script. Which of the following scripting languages did the administrator most likely use?

A.

Batch

B.

Java

C.

Bash

D.

PowerShell

Full Access
Question # 68

A Linux server requires repetitive tasks for reconfiguration. Which of the following would be the best scripting language to use?

A.

PowerShell

B.

Batch command file

C.

Bash

D.

Visual Basic

Full Access
Question # 69

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Full Access
Question # 70

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Full Access
Question # 71

A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,

copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to

narrow down the issue?

A.

Disk IOPS

B.

CPU utilization

C.

RAM utilization

D.

Network latency

Full Access
Question # 72

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 73

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Full Access
Question # 74

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Full Access
Question # 75

Which of the following factors would most likely impact the selection of an organization's cloud provider?

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

Full Access
Question # 76

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Full Access
Question # 77

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Full Access
Question # 78

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Full Access
Question # 79

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Full Access
Question # 80

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Full Access
Question # 81

Which of the following should a technician verify first before decommissioning and wiping a file server?

A.

The media destruction method

B.

The recycling policy

C.

Asset management documentation

D.

Document retention policy

Full Access
Question # 82

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 83

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Full Access
Question # 84

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Full Access
Question # 85

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Full Access
Question # 86

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Full Access
Question # 87

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 88

A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?

A.

Build a warm site and perform a fail over of the application.

B.

Build a cloud laaS and perform a fail over of the application.

C.

Build a hot site and perform a fail over of the application.

D.

Build a cold site and perform a fail over of the application.

E.

Perform a tabletop fail over of the application.

Full Access
Question # 89

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Full Access
Question # 90

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Full Access
Question # 91

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Full Access
Question # 92

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Full Access
Question # 93

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?

A.

Hardware failure

B.

Marware

C.

Data corruption

D.

Insider threat

Full Access
Question # 94

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Full Access
Question # 95

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Full Access
Question # 96

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 97

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Full Access
Question # 98

A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?

A.

Snapshot

B.

Deduplication

C.

System Restore

D.

Template

Full Access
Question # 99

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?

A.

Encrypt all network traffic

B.

Implement MFA on all the servers with encrypted data

C.

Block the servers from using an encrypted USB

D.

Implement port security on the switches

Full Access
Question # 100

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163 mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Full Access
Question # 101

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Full Access
Question # 102

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Full Access
Question # 103

Which of the following would be BEST to help protect an organization against social engineering?

A.

More complex passwords

B.

Recurring training and support

C.

Single sign-on

D.

An updated code of conduct to enforce social media

Full Access
Question # 104

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Full Access
Question # 105

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Full Access
Question # 106

Which of the following techniques can be configured on a server for network redundancy?

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Full Access
Question # 107

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 108

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Full Access
Question # 109

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Full Access
Question # 110

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Full Access
Question # 111

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 112

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Full Access
Question # 113

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

A.

Network connectivity on the server

B.

LVM status on the server

C.

Disk space in the /var directory

D.

YUM dependencies

Full Access
Question # 114

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Full Access
Question # 115

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Full Access
Question # 116

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 117

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Full Access
Question # 118

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning

Full Access
Question # 119

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Full Access
Question # 120

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 121

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 122

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 123

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Full Access
Question # 124

Which of the following backup types only records changes to the data blocks on a virtual machine?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthetic full

Full Access
Question # 125

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

A.

Chmod +w startup.sh

B.

Chmod 444 startup.sh

C.

Chmod+x startup.sh

D.

Chmod 466 startUp,sh

Full Access
Question # 126

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Full Access
Question # 127

Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?

A.

Check the power supplies

B.

Review the log files.

C.

Reinstall the ESX server.

D.

Reseat the processors.

Full Access
Question # 128

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Full Access
Question # 129

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Full Access
Question # 130

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Full Access
Question # 131

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Full Access
Question # 132

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 133

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 134

Which of the following BEST describes overprovisioning in a virtual server environment?

A.

Committing more virtual resources to virtual machines than there are physical resources present

B.

Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion

C.

Allowing a virtual machine to utilize more resources than are allocated to it based on the server load

D.

Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure

Full Access
Question # 135

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Full Access
Question # 136

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 137

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Full Access