New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Server+ > SK0-005

SK0-005 CompTIA Server+ Certification Exam Question and Answers

Question # 4

A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?

A.

Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.

B.

Perform a complete OS reinstall on the server using the same media that was used during the initial install.

C.

Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.

D.

Set a BIOS password to prevent server technicians from making any changes to the system.

Full Access
Question # 5

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Full Access
Question # 6

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 7

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Full Access
Question # 8

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Full Access
Question # 9

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Full Access
Question # 10

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Full Access
Question # 11

Which of the following concepts is in use when dual power supplies are connected to different power sources?

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Full Access
Question # 12

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Full Access
Question # 13

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

A.

Per socket

B.

Open-source

C.

Per concurrent user

D.

Volume

Full Access
Question # 14

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Full Access
Question # 15

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Full Access
Question # 16

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

A.

The boot log

B.

The BIOS

C.

The HCL

D.

The event log

Full Access
Question # 17

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

A.

Linked list

B.

String

C.

Loop

D.

Constant

Full Access
Question # 18

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Full Access
Question # 19

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Full Access
Question # 20

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Full Access
Question # 21

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Full Access
Question # 22

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 23

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

A.

A firewall blocking the ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entries for the print server are incorrect.

D.

The hosts file misconfigured.

Full Access
Question # 24

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Full Access
Question # 25

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Full Access
Question # 26

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Full Access
Question # 27

Which of the following refers to the requirements that dictate when to delete data backups?

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Full Access
Question # 28

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Full Access
Question # 29

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Full Access
Question # 30

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

A.

Implement data loss prevention.

B.

Configure intrusion detection.

C.

Turn on User Account Control.

D.

Disable anonymous access.

Full Access
Question # 31

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Full Access
Question # 32

A server technician arrives at a data center to troubleshoot a physical server that is not responding to remote management software. The technician discovers the servers in the data center are not connected to a KVM switch, and their out-of-band management cards have not been configured. Which of the following should the technician do to access the server for troubleshooting purposes?

A.

Connect the diagnostic card to the PCle connector.

B.

Connect a console cable to the server NIC.

C.

Connect to the server from a crash cart.

D.

Connect the virtual administration console.

Full Access
Question # 33

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Full Access
Question # 34

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Full Access
Question # 35

A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient

subnet mask for this connection?

A.

/28

B.

/29

C.

/30

D.

/32

Full Access
Question # 36

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

A.

Implement rollback procedures.

B.

Upgrade the drivers.

C.

Reinstall the OS.

D.

Reboot the server.

Full Access
Question # 37

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 38

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

A.

set-service

B.

net

C.

sc

D.

services.msc

Full Access
Question # 39

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Full Access
Question # 40

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Full Access
Question # 41

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Full Access
Question # 42

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Full Access
Question # 43

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Full Access
Question # 44

An administrator is upgrading a group of legacy blade servers to the latest version of the hypervisor. After restarting the server, the upgrade is interrupted. The hypervisor is not available, and the update is not successful. Which of the following should the administrator do next to accomplish this upgrade?

A.

Change the upgrade to a new installation and overwrite the boot drive.

B.

Upgrade the blade server's firmware to support the new hypervisor.

C.

Increase the blade server’s onboard RAM.

D.

Upgrade the blade server's hardware.

Full Access
Question # 45

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Full Access
Question # 46

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Full Access
Question # 47

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Full Access
Question # 48

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 49

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Full Access
Question # 50

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 51

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Full Access
Question # 52

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 53

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 54

Which of the following techniques can be configured on a server for network redundancy?

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Full Access
Question # 55

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Full Access
Question # 56

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 57

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

Full Access
Question # 58

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?

A.

Management port

B.

Crash cart

C.

IP KVM

D.

KVM

Full Access
Question # 59

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Full Access
Question # 60

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Full Access
Question # 61

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Full Access
Question # 62

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Full Access
Question # 63

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 64

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Full Access
Question # 65

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Full Access
Question # 66

Which of the following policies would be BEST to deter a brute-force login attack?

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Full Access
Question # 67

Which of the following open ports should be closed to secure the server properly? (Choose two.)

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 68

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Full Access
Question # 69

Which of the following server types would benefit MOST from the use of a load balancer?

A.

DNS server

B.

File server

C.

DHCP server

D.

Web server

Full Access
Question # 70

Which of the following will correctly map a script to a home directory for a user based on username?

A.

\\server\users$\username

B.

\\server\%username%

C.

\\server\FirstInitialLastName

D.

\\server\$username$

Full Access
Question # 71

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Full Access
Question # 72

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 73

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Full Access
Question # 74

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Full Access
Question # 75

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Full Access
Question # 76

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Full Access
Question # 77

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Full Access
Question # 78

Which of the following actions should a server administrator take once a new backup scheme has been configured?

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Full Access
Question # 79

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Full Access
Question # 80

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Full Access
Question # 81

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Full Access
Question # 82

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Full Access
Question # 83

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Full Access
Question # 84

Which of the following is an example of load balancing?

A.

Round robin

B.

Active-active

C.

Active-passive

D.

Failover

Full Access
Question # 85

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Full Access
Question # 86

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Full Access
Question # 87

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

A.

RAIDO

B.

RAID1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access
Question # 88

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Full Access
Question # 89

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 90

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

A.

Chmod +w startup.sh

B.

Chmod 444 startup.sh

C.

Chmod+x startup.sh

D.

Chmod 466 startUp,sh

Full Access
Question # 91

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

A.

SD card

B.

Optical

C.

Network

D.

USB

Full Access
Question # 92

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Full Access
Question # 93

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Full Access
Question # 94

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is

described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Full Access
Question # 95

Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?

A.

Loop

B.

Variable

C.

Comparator

D.

Conditional

Full Access
Question # 96

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

A.

File

Full Access
Question # 97

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

A.

Drive

B.

Database

C.

Folder

D.

File

Full Access
Question # 98

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 99

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Full Access
Question # 100

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 101

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 102

Which of the following security risks provides unauthorized access to an application?

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Full Access
Question # 103

A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?

A.

Separate circuits

B.

Load balancing

C.

Server monitoring

D.

Redundancy

Full Access
Question # 104

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

Full Access
Question # 105

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 106

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

A.

25

B.

53

C.

443

D.

3389

E.

8080

Full Access
Question # 107

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 108

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Full Access
Question # 109

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 110

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Full Access
Question # 111

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

A.

Document the findings and actions.

B.

Escalate the issue to the management team.

C.

Implement the solution.

D.

Establish an action plan.

Full Access
Question # 112

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Full Access
Question # 113

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 114

Which of the following symbols is used to write a text description per line within a PowerShell script?

A.

%

B.

@

C.

&

D.

#

Full Access
Question # 115

After installing an OS on a new server, the administrator realizes the server does not have any network connectivity. The administrator checks the network cable, and it seems to be transferring data. Which of the following should be checked next?

A.

NIC firmware

B.

IPv4 options

C.

DHCP options

D.

Firewall options

E.

DNS settings

Full Access
Question # 116

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Full Access
Question # 117

An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?

A.

The user accounts are locked out

B.

The NTP on the client side is misconfigured

C.

MFA is not working

D.

The wrong time zone was set in the remote office

Full Access
Question # 118

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

Full Access
Question # 119

A systems administrator notices the fans are running at full speed in a newly upgraded server. Which of the following should be done to address this issue?

A.

Replace the PSU.

B.

Reseat the video card.

C.

Reseat the RAM.

D.

Reattach the heat sink.

Full Access
Question # 120

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

A.

is fully operational and continuously providing services.

Full Access
Question # 121

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Full Access
Question # 122

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Full Access
Question # 123

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

A.

Network

B.

Embedded

C.

Optical

D.

USB

Full Access
Question # 124

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Full Access
Question # 125

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

A.

The UPS batteries were overcharged.

B.

Redundant power supplies require 220V power

C.

Both power supplies were connected to the same power feed

D.

The power supplies were not cross-connected

Full Access
Question # 126

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 127

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Full Access
Question # 128

An administrator is configuring the storage for a new database server, which will host databases that are mainly used for archival lookups. Which of the following storage types will yield the fastest database read performance?

A.

NAS

B.

SSD

C.

10K rpm SATA

D.

15K rpm SCSI

Full Access
Question # 129

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Full Access
Question # 130

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

Full Access
Question # 131

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Full Access
Question # 132

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

A.

Applying OS updates

B.

Disabling unused services

C.

Implementing HIDS

D.

Installing anti-malware

Full Access
Question # 133

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Full Access
Question # 134

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Full Access
Question # 135

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Full Access
Question # 136

A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,

copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to

narrow down the issue?

A.

Disk IOPS

B.

CPU utilization

C.

RAM utilization

D.

Network latency

Full Access
Question # 137

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Full Access
Question # 138

When a user plugs a USB drive into a workstation and attempts to transfer a file from the server, an error appears that indicates the file cannot be copied. However, the user can copy or create new files from the local workstation. Which of the following is part of this security strategy?

A.

HIDS

B.

SIEM

C.

ACL

D.

DLP

Full Access
Question # 139

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Full Access
Question # 140

A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?

A.

Necessary dependencies were installed for multiple architectures.

B.

There is not enough hard drive space.

C.

The server is infected with a virus.

D.

Some modules are not compatible.

Full Access
Question # 141

After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?

A.

Remove the original network card and attempt to boot using only the new network card.

B.

Check that the BIOS is configured to recognize the second network card.

C.

Ensure the server has enough RAM to run a second network card.

D.

Verify the network card is on the HCL for the OS.

Full Access