Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Server+ > SK0-005

SK0-005 CompTIA Server+ Certification Exam Question and Answers

Question # 4

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

A.

Print

B.

File

C.

Database

D.

Messaging

Full Access
Question # 5

A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?

A.

1U

B.

2U

C.

3U

D.

4U

Full Access
Question # 6

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Full Access
Question # 7

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Full Access
Question # 8

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 9

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Full Access
Question # 10

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 11

Which of the following refers to the requirements that dictate when to delete data backups?

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Full Access
Question # 12

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Full Access
Question # 13

A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?

A.

Unattended scripted OS installation

B.

P2V

C.

VM cloning

Full Access
Question # 14

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Full Access
Question # 15

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

Full Access
Question # 16

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Full Access
Question # 17

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Full Access
Question # 18

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Full Access
Question # 19

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 20

An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:

The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 22

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Full Access
Question # 23

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Full Access
Question # 24

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Full Access
Question # 25

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Full Access
Question # 26

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Full Access
Question # 27

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 28

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Full Access
Question # 29

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Full Access
Question # 30

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Full Access
Question # 31

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Full Access
Question # 32

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Full Access
Question # 33

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 34

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

A.

0

B.

1

C.

5

D.

6

E.

10

Full Access
Question # 35

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 36

An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes. Which of the following would BEST help answer the server performance question9

A.

Server performance thresholds

B.

A server baseline

C.

A hardware compatibility list

D.

An application service-level agreement

Full Access
Question # 37

Which of the following script types uses commands That start with sec-?

A.

Batch

B.

Bash

C.

PowerShell

D.

JavaScript

Full Access
Question # 38

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A.

A full, weekly backup with daily open-file backups

B.

A full, weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Full Access
Question # 39

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

A.

Close unneeded ports.

B.

Disable unneeded physical ports.

C.

Set a BIOS password.

D.

Install a SIEM.

E.

Disable unneeded services.

F.

Install a HIDS.

Full Access
Question # 40

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Full Access
Question # 41

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Full Access
Question # 42

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Full Access
Question # 43

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Full Access
Question # 44

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 45

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Full Access
Question # 46

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

A.

Schedule a mandatory reboot of the server

B.

Wait for the load average to come back down on its own

C.

Identify the runaway process or processes

D.

Request that users log off the server

Full Access
Question # 47

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Full Access
Question # 48

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Full Access
Question # 49

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 50

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 51

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent

unauthorized server access? (Choose two.)

A.

Audit all group privileges and permissions

B.

Run a checksum tool against all the files on the server

C.

Stop all unneeded services and block the ports on the firewall

D.

Initialize a port scan on the server to identify open ports

E.

Enable port forwarding on port 80

F.

Install a NIDS on the server to prevent network intrusions

Full Access
Question # 52

Which of the following security risks provides unauthorized access to an application?

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Full Access
Question # 53

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

A.

Waterfall

B.

Synthetic full

C.

Tower of Hanoi

D.

Grandfather-father-son

Full Access
Question # 54

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Full Access
Question # 55

Which of the following BEST describes a warm site?

A.

The site has all infrastructure and live data.

B.

The site has all infrastructure and some data

C.

The site has partially redundant infrastructure and no network connectivity

D.

The site has partial infrastructure and some data.

Full Access
Question # 56

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 57

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

A.

Power cycle the storage arrays and rescan RAID on the server.

B.

Boot the OS into recovery mode and rescan the disks.

C.

Restore the default RAID configuration and reboot.

D.

Perform a rescan on the server's RAID controller.

Full Access
Question # 58

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

A.

Configure a firewall

B.

Close the unneeded ports

C.

Install a HIDS

D.

Disable unneeded services.

Full Access
Question # 59

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

A.

Chmod +w startup.sh

B.

Chmod 444 startup.sh

C.

Chmod+x startup.sh

D.

Chmod 466 startUp,sh

Full Access
Question # 60

Which of the following would be BEST to help protect an organization against social engineering?

A.

More complex passwords

B.

Recurring training and support

C.

Single sign-on

D.

An updated code of conduct to enforce social media

Full Access
Question # 61

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Full Access
Question # 62

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

A.

53

B.

80

C.

389

D.

443

E.

445

F.

3389

G.

8080

Full Access
Question # 63

Which of the following distributes a load across all interfaces?

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Full Access
Question # 64

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Full Access
Question # 65

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

A.

Connect the server to a KVM

B.

Use cable management

C.

Connect the server to a redundant network

D.

Connect the server to a UPS

Full Access
Question # 66

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.

21

B.

22

C.

23

D.

443

Full Access
Question # 67

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

A.

21

B.

22

C.

443

D.

3389

Full Access
Question # 68

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Full Access
Question # 69

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Full Access
Question # 70

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 71

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Full Access
Question # 72

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 73

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

A.

Private

B.

Hybrid

C.

Community

D.

Public

Full Access
Question # 74

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Full Access
Question # 75

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 76

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Full Access
Question # 77

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 78

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 79

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Full Access
Question # 80

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

Full Access
Question # 81

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is

described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Full Access
Question # 82

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Full Access
Question # 83

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Full Access
Question # 84

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 85

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Full Access
Question # 86

A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?

A.

Off-site backups

B.

Full backups

C.

Differential backups

D.

Incremental backups

Full Access
Question # 87

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Full Access
Question # 88

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Full Access
Question # 89

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

A.

Implement data loss prevention.

B.

Configure intrusion detection.

C.

Turn on User Account Control.

D.

Disable anonymous access.

Full Access
Question # 90

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Full Access
Question # 91

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 92

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Full Access
Question # 93

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?

A.

Encrypt all network traffic

B.

Implement MFA on all the servers with encrypted data

C.

Block the servers from using an encrypted USB

D.

Implement port security on the switches

Full Access
Question # 94

A snapshot is a feature that can be used in hypervisors to:

A.

roll back firmware updates.

B.

restore to a previous version.

C.

roll back application drivers.

D.

perform a backup restore.

Full Access
Question # 95

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Full Access
Question # 96

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Full Access
Question # 97

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Which of the following caused the issue?

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Full Access
Question # 98

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Full Access
Question # 99

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Full Access
Question # 100

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Full Access
Question # 101

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 102

Which of the following backup types resets the archive bit each time it is run?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthic full

Full Access
Question # 103

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Full Access
Question # 104

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

A.

Replace all the array drives at once and then expand the array.

B.

Expand the array by changing the RAID level to 6.

C.

Expand the array by changing the RAID level to 10.

D.

Replace the array drives one at a time and then expand the array.

Full Access
Question # 105

Which of the following open ports should be closed to secure the server properly? (Choose two.)

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 106

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Full Access
Question # 107

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Full Access
Question # 108

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

A.

Remove all the data from the server drives using the least destructive method.

B.

Repurpose and recycle any usable server components.

C.

Remove all the components from the server.

D.

Review all company polices.

Full Access
Question # 109

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Full Access
Question # 110

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Full Access
Question # 111

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Full Access
Question # 112

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Full Access
Question # 113

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 114

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 115

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 116

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

A.

Intrusion detection is blocking the port.

B.

The new application's DNS entry is incorrect.

C.

The application should be changed to use port 443.

D.

The core switch has a network issue.

Full Access
Question # 117

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Full Access
Question # 118

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 119

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Full Access
Question # 120

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Full Access
Question # 121

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Full Access
Question # 122

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Full Access
Question # 123

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Full Access
Question # 124

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Full Access