Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA SK0-005 CompTIA Server+ Certification Exam Exam Practice Test

Demo: 124 questions
Total 414 questions

CompTIA Server+ Certification Exam Questions and Answers

Question 1

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

Options:

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Question 2

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

Options:

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Question 3

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

Options:

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Question 4

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Question 5

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Question 6

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Question 7

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

Options:

A.

21

B.

22

C.

443

D.

3389

Question 8

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

Options:

A.

IP address: 192.168.10.2/24

Default gateway: 192.168.10.1

B.

IP address: 192.168.1.2/24

Default gateway: 192.168.10.1

C.

IP address: 192.168.10.3/24

Default gateway: 192.168.20.1

D.

IP address: 192.168.10.24/24

Default gateway: 192.168.30.1

Question 9

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Question 10

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

Options:

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Question 11

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

Options:

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Question 12

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

Options:

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Question 13

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Options:

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Question 14

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

Options:

A.

Chmod +w startup.sh

B.

Chmod 444 startup.sh

C.

Chmod+x startup.sh

D.

Chmod 466 startUp,sh

Question 15

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Question 16

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

Options:

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Question 17

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?

Options:

A.

Hardware failure

B.

Marware

C.

Data corruption

D.

Insider threat

Question 18

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

Options:

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Question 19

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Question 20

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

Options:

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Question 21

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Question 22

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Question 23

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

Options:

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Question 24

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

Options:

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Question 25

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Question 26

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

Options:

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Question 27

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

Options:

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Question 28

A site is considered a warm site when it:

  • has basic technical facilities connected to it.

  • has faulty air conditioning that is awaiting service.

  • is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Question 29

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

Options:

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Question 30

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Question 31

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

Options:

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Question 32

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

Options:

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Question 33

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Question 34

After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?

Options:

A.

Remove the original network card and attempt to boot using only the new network card.

B.

Check that the BIOS is configured to recognize the second network card.

C.

Ensure the server has enough RAM to run a second network card.

D.

Verify the network card is on the HCL for the OS.

Question 35

A technician needs maximum power redundancy while configuring a new server rack. Which of the following should be specified? (Select two).

Options:

A.

Separate circuits

B.

Rack balancing

C.

Blanking panels

D.

High-voltage PDUs

E.

KVM placement

F.

Multiple UPSs

Question 36

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

Options:

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Question 37

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Question 38

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Question 39

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

Options:

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Question 40

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

Options:

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Question 41

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Question 42

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Options:

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Question 43

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Question 44

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

Options:

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Question 45

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

Options:

A.

Simulated

B.

Tabletop

C.

Live

D.

Non-production

Question 46

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Question 47

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

Options:

A.

Close unneeded ports.

B.

Disable unneeded physical ports.

C.

Set a BIOS password.

D.

Install a SIEM.

E.

Disable unneeded services.

F.

Install a HIDS.

Question 48

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

Options:

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Question 49

A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do NEXT?

Options:

A.

Reinstall the server OS in repair mode while maintaining the data.

B.

Flash the BIOS with the most recent version.

C.

Reverse the latest change made to the server and reboot.

D.

Restart the server into safe mode and roll back changes.

Question 50

A snapshot is a feature that can be used in hypervisors to:

Options:

A.

roll back firmware updates.

B.

restore to a previous version.

C.

roll back application drivers.

D.

perform a backup restore.

Question 51

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

Options:

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Question 52

Which of the following open ports should be closed to secure the server properly? (Choose two.)

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 53

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

Options:

A.

the correct firewall zone is active

B.

the latest firmware was applied

C.

NTP is running on the database system

D.

the correct dependencies are installed

Question 54

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Question 55

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Question 56

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

Options:

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Question 57

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

Options:

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Question 58

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Question 59

Which of the following policies would be BEST to deter a brute-force login attack?

Options:

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Question 60

Which of the following script types would MOST likely be used on a modern Windows server OS?

Options:

A.

Batch

B.

VBS

C.

Bash

D.

PowerShell

Question 61

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

Options:

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Question 62

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

Options:

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Question 63

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

Options:

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Question 64

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Question 65

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

Options:

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Question 66

A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?

Options:

A.

Unattended scripted OS installation

B.

P2V

C.

VM cloning

Question 67

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

Options:

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Question 68

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

Options:

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Question 69

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Options:

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Question 70

Which of the following refers to the requirements that dictate when to delete data backups?

Options:

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Question 71

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

Options:

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Question 72

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Question 73

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Question 74

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Question 75

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Question 76

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Question 77

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 78

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

Options:

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Question 79

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

Options:

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Question 80

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

Options:

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Question 81

A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?

Options:

A.

Necessary dependencies were installed for multiple architectures.

B.

There is not enough hard drive space.

C.

The server is infected with a virus.

D.

Some modules are not compatible.

Question 82

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Question 83

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

Options:

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Question 84

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

Options:

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Question 85

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Question 86

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

Options:

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Question 87

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Question 88

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

Options:

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Question 89

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Question 90

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

Options:

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Question 91

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

Options:

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Question 92

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

Options:

A.

Network

B.

Embedded

C.

Optical

D.

USB

Question 93

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Question 94

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

Options:

A.

Increasing IOPS by implementing flash storage

B.

Implementing deduplication on the storage

C.

Extending capacity by installing a 4TB SATA disk

D.

Reformatting the disk as FAT32

Question 95

Which of the following licenses would MOST likely include vendor assistance?

Options:

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Question 96

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

Options:

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Question 97

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

Options:

A.

Rack

B.

Virtual

C.

Tower

D.

Blade

Question 98

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Options:

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Question 99

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

Options:

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Question 100

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

Options:

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Question 101

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Options:

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Question 102

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

Options:

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Question 103

Which of the following licensing models allows the greatest number of concurrent Windows VMS to run on a host for the lowest cost?

Options:

A.

per user

B.

per core

C.

Per instance

D.

Per concurrent user

Question 104

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

Options:

A.

21

B.

22

C.

23

D.

443

Question 105

Which of the following should a technician verify first before decommissioning and wiping a file server?

Options:

A.

The media destruction method

B.

The recycling policy

C.

Asset management documentation

D.

Document retention policy

Question 106

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

Options:

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Question 107

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Question 108

Which of the following ensures a secondary network path is available if the primary connection fails?

Options:

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Question 109

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Question 110

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Question 111

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Options:

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Question 112

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

Options:

A.

PKI

B.

SSL

C.

LDAP

D.

DNS

Question 113

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

Options:

A.

A firewall

B.

An antivirus

C.

AHIDS

D.

User account control

Question 114

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

Options:

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Question 115

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

  • HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Question 116

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

Options:

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Question 117

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

Options:

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Question 118

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Question 119

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the

server must also be minimized. Which of the following should the administrator perform on the server? (Select two).

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

E.

Cloning

F.

Provisioning

Question 120

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Question 121

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

Options:

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Question 122

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Options:

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Question 123

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

Options:

A.

Service-level agreement

B.

Disaster recovery plan

C.

Business impact analysis

D.

Business continuity plan

Question 124

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Demo: 124 questions
Total 414 questions