Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > CompTIA > CompTIA Server+ > SK0-005

SK0-005 CompTIA Server+ Certification Exam Question and Answers

Question # 4

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Full Access
Question # 5

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Full Access
Question # 6

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Full Access
Question # 7

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Full Access
Question # 8

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Full Access
Question # 9

A server administrator created a new script and included the path to the script binary as the first line of the script. Which of the following scripting languages did the administrator most likely use?

A.

Batch

B.

Java

C.

Bash

D.

PowerShell

Full Access
Question # 10

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 11

An administrator is configuring the storage for a new database server, which will host databases that are mainly used for archival lookups. Which of the following storage types will yield the fastest database read performance?

A.

NAS

B.

SSD

C.

10K rpm SATA

D.

15K rpm SCSI

Full Access
Question # 12

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Full Access
Question # 13

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216.176.128.10

Full Access
Question # 14

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Full Access
Question # 15

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 16

Which of the following symbols is used to write a text description per line within a PowerShell script?

A.

%

B.

@

C.

&

D.

#

Full Access
Question # 17

Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?

A.

Overprovisioning

B.

Scalability

C.

Thin clients

D.

Resource Monitor

Full Access
Question # 18

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Full Access
Question # 19

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Full Access
Question # 20

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

Full Access
Question # 21

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Full Access
Question # 22

A server administrator has received tickets from users who report the system runs very slowly and various unrelated messages pop up when they try to access an internet-facing web application using default ports. The administrator performs a scan to check for open ports and reviews the following report:

Starting Nmap 7.70 https://nmap.org) at 2019-09-19 14:30 UTC

Nmap scan report for www.abc.com (172.45.6.85)

Host is up (0.0021s latency)

Other addresses for www.abc.com (not scanned) : 4503 : F7b0 : 4293: 703: : 3209

RDNS record for 172.45.6.85: 1ga45s12-in-f1.2d100.net

Port State Service

21/tcp filtered ftp

22/tcp filtered ssh

23/tcp filtered telnet

69/tcp open @username.com

80/tcp open http

110/tcp filtered pop

143/tcp filtered imap

443/tcp open https

1010/tcp open www.popup.com

3389/tcp filtered ms-abc-server

Which of the following actions should the server administrator perform on the server?

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Full Access
Question # 23

Which of the following distributes a load across all interfaces?

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Full Access
Question # 24

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 25

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 26

Which of the following documents would explain the consequences of server downtime?

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Full Access
Question # 27

Which of the following is a benefit of failover NIC teaming?

A.

Decreased latency

B.

Increased transmission size

C.

Increased system resources

D.

Increased fault tolerance

Full Access
Question # 28

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 29

Which of the following factors would most likely impact the selection of an organization's cloud provider?

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

Full Access
Question # 30

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Full Access
Question # 31

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Full Access
Question # 32

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

Full Access
Question # 33

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?

A.

IP KVM

B.

VNC

C.

A crash cart

D.

RDP

E.

SSH

Full Access
Question # 34

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Full Access
Question # 35

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Full Access
Question # 36

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Full Access
Question # 37

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 38

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Full Access
Question # 39

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 40

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

A.

eSATA

B.

FCoE

C.

CIFS

D.

SAS

Full Access
Question # 41

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Full Access
Question # 42

Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 43

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Full Access
Question # 44

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 45

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 46

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 47

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Full Access
Question # 48

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

A.

the correct firewall zone is active

B.

the latest firmware was applied

C.

NTP is running on the database system

D.

the correct dependencies are installed

Full Access
Question # 49

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Full Access
Question # 50

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Full Access
Question # 51

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Full Access
Question # 52

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 53

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Full Access
Question # 54

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Full Access
Question # 55

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Full Access
Question # 56

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Full Access
Question # 57

Which of the following policies would be BEST to deter a brute-force login attack?

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Full Access
Question # 58

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Full Access
Question # 59

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Full Access
Question # 60

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 61

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Full Access
Question # 62

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Full Access
Question # 63

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?

A.

Encrypt all network traffic

B.

Implement MFA on all the servers with encrypted data

C.

Block the servers from using an encrypted USB

D.

Implement port security on the switches

Full Access
Question # 64

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

A.

Consult the HCL to ensure everything is supported.

B.

Migrate the physical server to a virtual server.

C.

Low-level format the hard drives to ensure there is no old data remaining.

D.

Make sure the case and the fans are free from dust to ensure proper cooling.

Full Access
Question # 65

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

A.

Encrypt the data that is leaving the SAN

B.

Encrypt the data at rest

C.

Encrypt the host servers

D.

Encrypt all the network traffic

Full Access
Question # 66

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Full Access
Question # 67

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 68

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Full Access
Question # 69

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 70

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

A.

Network connectivity on the server

B.

LVM status on the server

C.

Disk space in the /var directory

D.

YUM dependencies

Full Access
Question # 71

A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?

A.

Snapshot

B.

Deduplication

C.

System Restore

D.

Template

Full Access
Question # 72

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Full Access
Question # 73

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Full Access
Question # 74

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 75

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.

21

B.

22

C.

23

D.

443

Full Access
Question # 76

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 77

Which of the following server types would benefit MOST from the use of a load balancer?

A.

DNS server

B.

File server

C.

DHCP server

D.

Web server

Full Access
Question # 78

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Full Access
Question # 79

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

A.

Private

B.

Hybrid

C.

Community

D.

Public

Full Access
Question # 80

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Full Access
Question # 81

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

A.

DLP

B.

A port scanner

C.

Anti-malware

D.

A sniffer

Full Access
Question # 82

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 83

Which of the following should a technician verify FIRST before decommissioning and wiping a file server?

A.

The media destruction method

B.

The recycling poke?

C.

Asset management documentation

D.

Non-utilization

Full Access
Question # 84

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 85

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 86

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Full Access
Question # 87

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Full Access
Question # 88

Which of the following should be configured in pairs on a server to provide network redundancy?

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Full Access
Question # 89

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Full Access
Question # 90

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Full Access
Question # 91

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Full Access
Question # 92

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

A.

Fibre Channel

B.

FCoE

C.

iSCSI

D.

eSATA

Full Access
Question # 93

Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?

A.

Aggregation

B.

Subscription

C.

Merging

D.

Collection

Full Access
Question # 94

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 95

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 96

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Full Access
Question # 97

Which of the following asset management documents is used to identify the location of a serves within a data center?

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Full Access
Question # 98

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Full Access
Question # 99

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 100

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Full Access
Question # 101

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Full Access
Question # 102

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Full Access
Question # 103

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Full Access
Question # 104

An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:

The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Full Access
Question # 106

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Full Access
Question # 107

A server administrator needs to ensure all Window-based servers within a data center have RDP disabled. There are thousands of servers performing various roles. Which of the following is the best way to meet this requirement?

A.

Run chkconfig ——1eve1 345 RDP off.

B.

Create a PowerSheII script to disable the RDP service.

C.

Run chkconfig —— list RDP.

D.

Create a Bash shell script to disable the Windows Remote Management service.

E.

Create a GPO to disable the Windows Remote Management service.

Full Access
Question # 108

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Full Access
Question # 109

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.

Open file

B.

Synthetic full

C.

Full incremental

D.

Full differential

Full Access
Question # 110

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Full Access
Question # 111

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 112

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Full Access
Question # 113

Which of the following backup types should be chosen for database servers?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Full Access
Question # 114

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Full Access
Question # 115

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Full Access
Question # 116

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

A.

Unplug the power cables from the redundant power supplies, leaving just the minimum required.

B.

Convert the physical servers to the hypervisors and retire the ten servers.

C.

Reimage the physical servers and retire all ten servers after the migration is complete.

D.

Convert the ten servers to power-efficient core editions.

Full Access
Question # 117

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 118

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Full Access
Question # 119

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

A.

Replace all the array drives at once and then expand the array.

B.

Expand the array by changing the RAID level to 6.

C.

Expand the array by changing the RAID level to 10.

D.

Replace the array drives one at a time and then expand the array.

Full Access
Question # 120

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

A.

Waterfall

B.

Synthetic full

C.

Tower of Hanoi

D.

Grandfather-father-son

Full Access
Question # 121

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Full Access
Question # 122

Which of the following BEST describes a warm site?

A.

The site has all infrastructure and live data.

B.

The site has all infrastructure and some data

C.

The site has partially redundant infrastructure and no network connectivity

D.

The site has partial infrastructure and some data.

Full Access
Question # 123

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Full Access
Question # 124

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Full Access
Question # 125

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

Full Access
Question # 126

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

Full Access
Question # 127

Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?

A.

Bolting door lock

B.

Combination door lock

C.

Electronic door lock

D.

Biometric door lock

Full Access
Question # 128

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Full Access
Question # 129

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

Full Access
Question # 130

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

A.

53

B.

80

C.

389

D.

443

E.

445

F.

3389

G.

8080

Full Access
Question # 131

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

A.

Close unneeded ports.

B.

Disable unused services.

C.

Set a BIOS password.

D.

Apply driver updates.

Full Access
Question # 132

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

A.

Drive

B.

Database

C.

Folder

D.

File

Full Access
Question # 133

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

A.

Direct access

B.

Overprovisioning

C.

Link aggregation

D.

Component redundancy

E.

Scalability

Full Access
Question # 134

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Full Access
Question # 135

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

A.

Most recently used

B.

Heartbeat

C.

Link aggregation

D.

Round robin

Full Access
Question # 136

Which of the following actions should the server administrator perform on the server?

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Full Access
Question # 137

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

A.

Applying OS updates

B.

Disabling unused services

C.

Implementing HIDS

D.

Installing anti-malware

Full Access