Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Server+ > SK0-005

SK0-005 CompTIA Server+ Certification Exam Question and Answers

Question # 4

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Full Access
Question # 5

Which of the following backup types only backs up files that have changed since the last full backup?

A.

Differential

B.

Open file

C.

Incremental

D.

Snapshot

Full Access
Question # 6

Which of the following documents would explain the consequences of server downtime?

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Full Access
Question # 7

A senior administrator was notified that a junior administrator installed software on a server that should not have new software installed on it. The senior administrator decides to restrict the server via a Group Policy. Which of the following can be used to elevate the permissions?

A.

Computer management

B.

AD

C.

Local users and groups

D.

UAC

Full Access
Question # 8

An administrator is upgrading a group of legacy blade servers to the latest version of the hypervisor. After restarting the server, the upgrade is interrupted. The hypervisor is not available, and the update is not successful. Which of the following should the administrator do next to accomplish this upgrade?

A.

Change the upgrade to a new installation and overwrite the boot drive.

B.

Upgrade the blade server's firmware to support the new hypervisor.

C.

Increase the blade server’s onboard RAM.

D.

Upgrade the blade server's hardware.

Full Access
Question # 9

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

A.

Network

B.

Embedded

C.

Optical

D.

USB

Full Access
Question # 10

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 11

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Full Access
Question # 12

Which of the following benefits of virtualization is most important during a data center migration?

A.

Portability

B.

Orchestration

C.

Overprovisioning

D.

Scalability

Full Access
Question # 13

A server recently started sending error messages about running out of memory while in use. After a maintenance period during which more memory was added, the server is still unable to consistently remain powered on. Which of the following should the technician check first?

A.

Memory compatibility

B.

Memory speed

C.

Memory slots

D.

Boot order

Full Access
Question # 14

Which of the following describes when a site is considered a warm site?

A.

It has basic technical facilities connected to it.

B.

It has faulty air conditioning that is awaiting service.

C.

It is almost ready to take over all operations from the primary site.

D.

It is fully operational and continuously providing services.

Full Access
Question # 15

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Full Access
Question # 16

An administrator connects a server to an external gigabit switch, but the server can only get a speed of 100Mbps. Which of the following is the most likely cause of this issue?

A.

Defective network cable

B.

Port security

C.

Incorrect IP subnet

D.

Wrong VLAN

Full Access
Question # 17

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Full Access
Question # 18

A technician is installing a large number of servers in a data center with limited rack space. Which of the following would accomplish this goal while using the least amount of space?

A.

Blade enclosure

B.

Rack balancing

C.

Rack mount

D.

Rail kits

Full Access
Question # 19

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 20

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 21

A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights. Which of the following is most likely the issue?

A.

A single-mode fiber cable is used in place of multimode.

B.

The switchport is on the wrong virtual SAN.

C.

The HBA driver needs to be installed on the server.

D.

The zoning on the fiber switch is wrong.

Full Access
Question # 22

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

Full Access
Question # 23

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 24

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 25

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Full Access
Question # 26

An administrator is configuring the storage for a new database server, which will host databases that are mainly used for archival lookups. Which of the following storage types will yield the fastest database read performance?

A.

NAS

B.

SSD

C.

10K rpm SATA

D.

15K rpm SCSI

Full Access
Question # 27

A security team must ensure that unauthorized individuals are unable to tailgate through the data center's entrance. Which of the following should be implemented to stop this type of breach from happening?

A.

Access control vestibule

B.

Cameras

C.

Bollards

D.

Biometrics

Full Access
Question # 28

A systems administrator is setting up a second VLAN for end users. Which of the following should be provisioned for a DHCP server to be able to receive client requests from a different subnet?

A.

DHCP options

B.

NIC teaming

C.

Zone transfers

D.

Relay agent

E.

VLAN ID

Full Access
Question # 29

A technician notices a server that contains four fans is now louder than normal even though the temperature in the room has not changed and the load on the server has not increased. Which of the following is most likely the cause of the noise?

A.

Defective fan

B.

Change in UEFI

C.

Unseated drive

D.

Firmware upgrade needed

Full Access
Question # 30

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 31

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 32

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

A.

Intrusion detection is blocking the port.

B.

The new application's DNS entry is incorrect.

C.

The application should be changed to use port 443.

D.

The core switch has a network issue.

Full Access
Question # 33

Which of the following attacks is the most difficult to mitigate with technology?

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Full Access
Question # 34

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

A.

Hybrid

B.

Public

C.

Private

D.

Community

Full Access
Question # 35

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

A.

is fully operational and continuously providing services.

Full Access
Question # 36

The internal IT department policy for monitoring server health requires that evidence of server reboots be collected and reviewed on a regular basis. Which of the following should be monitored to best provide this evidence?

A.

Uptime

B.

IOPS

C.

CPU utilization

D.

Event logs

Full Access
Question # 37

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Full Access
Question # 38

A server in the data center reportedly has a BSOD and is not responding. The server needs to be rebooted. Which of the following is the best method to reboot the server remotely?

A.

Crash cart

B.

KVM

C.

IRMI

D.

shutdown -r

Full Access
Question # 39

A startup is migrating a stand-alone application that stores Pll to the cloud. Which of the following should be encrypted?

A.

Datain transit

B.

Dataat rest

C.

Databackups

D.

Dataarchives

Full Access
Question # 40

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Full Access
Question # 41

Following a recent power outage, a server on a server farm has been running slowly. A technician receives a ticket with a request to check for anything out of the ordinary. The technician sees an orange light on the front console of the server, indicating an error. Which of the following should the technician check next?

A.

CPU

B.

Power supply

C.

RAM

D.

RAID battery

Full Access
Question # 42

Which of the following is a benefit of failover NIC teaming?

A.

Decreased latency

B.

Increased transmission size

C.

Increased system resources

D.

Increased fault tolerance

Full Access
Question # 43

A systems administrator notices the fans are running at full speed in a newly upgraded server. Which of the following should be done to address this issue?

A.

Replace the PSU.

B.

Reseat the video card.

C.

Reseat the RAM.

D.

Reattach the heat sink.

Full Access
Question # 44

An administrator is patching a file and print server After rebooting the server, it begins acting strangely. The administrator tries to open Print Management, but it will not open Upon inspection, the spooler service has been disabled. The administrator then notices the server has services that should be enabled but are disabled. Which of the following actions should the administrator take next to resolve the issue as quickly as possible?

A.

Roll back the installed updates

B.

Set the services to restart automatically and reboot the server

C.

Enable the spooler service.

D.

Reboot the server into safe mode

Full Access
Question # 45

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Full Access
Question # 46

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Full Access
Question # 47

A systems administrator is performing a routine update to a server. The administrator applies the update, restarts the server, and then conducts routine testing that reveals the critical functionality provided by the server is unavailable. Event logs indicate a core service is failing to start. The service is configured to start automatically, and rolling back the update does not correct the issue. Which of the following is most likely causing the service failure?

A.

The server requires another reboot to complete the rollback.

B.

The administrator is not authorized to run the service.

C.

The server requires further updates of other software components.

D.

The account used to run the service has expired.

Full Access
Question # 48

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Full Access
Question # 49

Which of the following BEST describes a warm site?

A.

The site has all infrastructure and live data.

B.

The site has all infrastructure and some data

C.

The site has partially redundant infrastructure and no network connectivity

D.

The site has partial infrastructure and some data.

Full Access
Question # 50

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

A.

Implement data loss prevention.

B.

Configure intrusion detection.

C.

Turn on User Account Control.

D.

Disable anonymous access.

Full Access
Question # 51

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

A.

Per socket

B.

Open-source

C.

Per concurrent user

D.

Volume

Full Access
Question # 52

A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?

A.

Variable

B.

Loop

C.

Comparator

D.

Conditional

Full Access
Question # 53

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Full Access
Question # 54

A staff memberwho a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?

A.

Installing blanking panels in all the empty rack spaces

B.

installing an additional POU and spreading out the power cables

C.

Installing servers on the shelves instead of sliding rails

D.

installing front bezels on all the server’s m the rack

Full Access
Question # 55

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

A.

Remove all the data from the server drives using the least destructive method.

B.

Repurpose and recycle any usable server components.

C.

Remove all the components from the server.

D.

Review all company polices.

Full Access
Question # 56

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 57

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Full Access
Question # 58

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Full Access
Question # 59

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which ofthefollowing should the developer use when designing the web application?

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Full Access
Question # 60

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Full Access
Question # 61

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

A.

set-service

B.

net

C.

sc

D.

services.msc

Full Access
Question # 62

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 63

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Full Access
Question # 64

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Full Access
Question # 65

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Full Access
Question # 66

An administrator is working locally in a data center with multiple server racks. Which of the following is the best low-cost option to connect to any server while on site?

A.

Crash cart

B.

IPKVM

C.

Remote console access

D.

IPMI

Full Access
Question # 67

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

A.

20

B.

21

C.

22

D.

23

E.

53

Full Access
Question # 68

A server administrator noticesthe/var/log/audit/audit.logfileon a Linux server is rotating loo frequently. The administrator would like to decrease the number of times the leg rotates without losing any of the information in the logs. Which of the following should the administrator configure?

A.

increase theaudit. log file size in the appropriate confutation file.

B.

Decrease the duration of the log rotate cycle tor theaudit. log file.

C.

Remove the tog rotate directive from the audit .log We configuration.

D.

Move the audit. leg files to a remote syslog server.

Full Access
Question # 69

Which of the following BEST describes overprovisioning in a virtual server environment?

A.

Committing more virtual resources to virtual machines than there are physical resources present

B.

Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion

C.

Allowing a virtual machine to utilize more resources than are allocated to it based on the server load

D.

Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure

Full Access
Question # 70

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.

Open file

B.

Synthetic full

C.

Full incremental

D.

Full differential

Full Access
Question # 71

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 72

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216,176,128.10

Full Access
Question # 73

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Full Access
Question # 74

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 75

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Full Access
Question # 76

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Full Access
Question # 77

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe tohaveaccess without granting excessive access to others?

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Full Access
Question # 78

Which of the following backup types resets the archive bit each time it is run?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthic full

Full Access
Question # 79

An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

A.

Modifying the MAC used on the DHCP reservation

B.

Updating the local hosts file with the correct IP address

C.

Modifying the WWNN used on the DHCP reservation

D.

Updating the NIC to use the correct WWNN

Full Access
Question # 80

A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?

A.

1U

B.

2U

C.

3U

D.

4U

Full Access
Question # 81

A server administrator needs to ensure all Window-based servers within a data center have RDP disabled. There are thousands of servers performing various roles. Which of the following is the best way to meet this requirement?

A.

Run chkconfig ——1eve1 345 RDP off.

B.

Create a PowerSheII script to disable the RDP service.

C.

Run chkconfig —— list RDP.

D.

Create a Bash shell script to disable the Windows Remote Management service.

E.

Create a GPO to disable the Windows Remote Management service.

Full Access
Question # 82

A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?

A.

Consult internet forums to determine which is the most common cause and deploy only that solution.

B.

Test each solution individually to determine the root cause, rolling back the changes in between each test.

C.

Implement the shortest solution first to identify the issue and minimize downtime.

D.

Test each solution in succession and restore the server from the latest snapshot.

Full Access
Question # 83

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 84

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Full Access
Question # 85

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Full Access
Question # 86

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

A.

0

B.

1

C.

5

D.

6

E.

10

Full Access
Question # 87

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Full Access
Question # 88

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

    HTTP

A.

FTP

B.

SCP

C.

USB

Full Access
Question # 89

Which of the following asset management documents is used to identify the location of a serves within a data center?

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Full Access
Question # 90

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 91

Which of the following refers to the requirements that dictate when to delete data backups?

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Full Access
Question # 92

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Full Access
Question # 93

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 94

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

A.

The VLAN Is improperly configured.

B.

The DNS configuration Is invalid.

C.

The OS version is not compatible with the network switch vendor.

D.

The HIDS is preventing the connection.

Full Access
Question # 95

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Full Access
Question # 96

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Full Access
Question # 97

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Full Access
Question # 98

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 99

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Full Access
Question # 100

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Full Access
Question # 101

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

A.

eSATA

B.

FCoE

C.

CIFS

D.

SAS

Full Access
Question # 102

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Full Access
Question # 103

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 104

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

A.

DLP

B.

A port scanner

C.

Anti-malware

D.

A sniffer

Full Access
Question # 105

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Full Access
Question # 106

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Full Access
Question # 107

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Full Access
Question # 108

A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?

A.

Determine whether there is a common element in the symptoms causing multiple problems.

B.

Perform a root cause analysis.

C.

Make one change at a time and test.

D.

Document the findings, actions, and outcomes throughout the process.

Full Access
Question # 109

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 110

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Full Access
Question # 111

Which of the following policies would be BEST to deter a brute-force login attack?

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Full Access
Question # 112

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 113

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

A.

Consult the HCL to ensure everything is supported.

B.

Migrate the physical server to a virtual server.

C.

Low-level format the hard drives to ensure there is no old data remaining.

D.

Make sure the case and the fans are free from dust to ensure proper cooling.

Full Access
Question # 114

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 115

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Full Access
Question # 116

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Full Access
Question # 117

An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).

A.

21

B.

22

C.

53

D.

67

E.

69

F.

110

G.

123

Full Access
Question # 118

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Full Access
Question # 119

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 120

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?

A.

IP KVM

B.

VNC

C.

A crash cart

D.

RDP

E.

SSH

Full Access
Question # 121

A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps. Which of the following testing methods is the administrator MOST likely performing?

A.

Backup recovery

B.

Simulated

C.

Tabletop

D.

Live failover

Full Access
Question # 122

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Full Access
Question # 123

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Full Access
Question # 124

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 125

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 126

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Full Access
Question # 127

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Full Access
Question # 128

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Full Access
Question # 129

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Full Access
Question # 130

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Full Access
Question # 131

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 132

A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?

A.

Crash cart

B.

Out-of-band console

C.

IP KVM

D.

RDP

Full Access
Question # 133

Which of the following can be used to map a network drive to a user profile?

A.

System service

B.

Network service

C.

Login script

D.

Kickstart script

Full Access
Question # 134

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Full Access
Question # 135

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Full Access
Question # 136

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Full Access
Question # 137

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Full Access
Question # 138

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 139

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Full Access
Question # 140

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Full Access
Question # 141

Which of the following is an example of load balancing?

A.

Round robin

B.

Active-active

C.

Active-passive

D.

Failover

Full Access
Question # 142

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 143

Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?

A.

Loop

B.

Variable

C.

Comparator

D.

Conditional

Full Access
Question # 144

A technician is investigating a server's configuration to secure it from physical threats. The technician checks the BIOS and sees the following boot order:

USB Drive CDROM Drive Network Adapter RAID Controller

Additionally, the server's host OS is stored on mirrored drives. Which of the following should the technician do to secure the server?

A.

Disable all except RAID Controller.

B.

Block USB ports on the server.

C.

Set BIOS password.

D.

Move RAID Controller to the top of the list.

Full Access
Question # 145

Multiple users have reported an issue accessing files on a specific server. Which of the following should be the first step in troubleshooting this issue?

A.

Notify the key stakeholders of an outage.

B.

Immediately execute a backup of the server.

C.

Identify changes made to the environment.

D.

Correct the permissions on the folder containing the files.

Full Access
Question # 146

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Full Access
Question # 147

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Full Access