New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

A.

25

B.

443

C.

3389

D.

8080

Full Access
Question # 5

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Full Access
Question # 6

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Full Access
Question # 7

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 8

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Full Access
Question # 9

Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?

A.

Overprovisioning

B.

Scalability

C.

Thin clients

D.

Resource Monitor

Full Access
Question # 10

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

Full Access
Question # 11

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Full Access
Question # 12

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 13

A server administrator set up a monitoring application on various servers to keep track of CPU usage, memory consumption, and disk space utilization. Which of the following should be configured on the application so it can send email alerts about a specific issue?

A.

Event logs

B.

Thresholds

C.

Disk quotas

D.

Uptime lengths

Full Access
Question # 14

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Full Access
Question # 15

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

A.

Direct access

B.

Overprovisioning

C.

Link aggregation

D.

Component redundancy

E.

Scalability

Full Access
Question # 16

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Full Access
Question # 17

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Full Access
Question # 18

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Full Access
Question # 19

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

A.

The server has a faulty power supply

B.

The server has a CMOS battery failure

C.

The server requires OS updates

D.

The server has a malfunctioning LED panel

E.

The servers do not have NTP configured

F.

The time synchronization service is disabled on the servers

Full Access
Question # 20

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Full Access
Question # 21

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 22

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Full Access
Question # 23

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Full Access
Question # 24

Which of the following can be used to map a network drive to a user profile?

A.

System service

B.

Network service

C.

Login script

D.

Kickstart script

Full Access
Question # 25

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?

A.

IP KVM

B.

VNC

C.

A crash cart

D.

RDP

E.

SSH

Full Access
Question # 26

Which of the following actions should a server administrator take once a new backup scheme has been configured?

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Full Access
Question # 27

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

A.

eSATA

B.

FCoE

C.

CIFS

D.

SAS

Full Access
Question # 28

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Full Access
Question # 29

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 30

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 31

Which of the following would a systems administrator implement to ensure all web traffic is secure?

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Full Access
Question # 32

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Full Access
Question # 33

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 34

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Full Access
Question # 35

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 36

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

A.

the correct firewall zone is active

B.

the latest firmware was applied

C.

NTP is running on the database system

D.

the correct dependencies are installed

Full Access
Question # 37

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Full Access
Question # 38

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 39

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

A.

Connect the server to a KVM

B.

Use cable management

C.

Connect the server to a redundant network

D.

Connect the server to a UPS

Full Access
Question # 40

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Full Access
Question # 41

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Full Access
Question # 42

A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?

(Choose two.)

A.

Adware is installed on the users’ devices

B.

The firewall rule for the server is misconfigured

C.

The server is infected with a virus

D.

Intrusion detection is enabled on the network

E.

Unnecessary services are disabled on the server

F.

SELinux is enabled on the server

Full Access
Question # 43

A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.

The kernel is corrupt.

B.

Resources are misallocated.

C.

The backplane has failed.

D.

The drives need to be reseated.

Full Access
Question # 44

Hosting data in different regional locations but not moving it for long periods of time describes:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Full Access
Question # 45

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

A.

PKI

B.

SSL

C.

LDAP

D.

DNS

Full Access
Question # 46

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 47

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Full Access
Question # 48

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

A.

Schedule a mandatory reboot of the server

B.

Wait for the load average to come back down on its own

C.

Identify the runaway process or processes

D.

Request that users log off the server

Full Access
Question # 49

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Full Access
Question # 50

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 51

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

Full Access
Question # 52

A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?

A.

Snapshot

B.

Deduplication

C.

System Restore

D.

Template

Full Access
Question # 53

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

A.

Consult the HCL to ensure everything is supported.

B.

Migrate the physical server to a virtual server.

C.

Low-level format the hard drives to ensure there is no old data remaining.

D.

Make sure the case and the fans are free from dust to ensure proper cooling.

Full Access
Question # 54

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Full Access
Question # 55

Which of the following is typical of software licensing in the cloud?

A.

Per socket

B.

Perpetual

C.

Subscription-based

D.

Site-based

Full Access
Question # 56

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Full Access
Question # 57

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Full Access
Question # 58

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Full Access
Question # 59

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Full Access
Question # 60

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Full Access
Question # 61

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Full Access
Question # 62

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

A.

Fibre Channel

B.

FCoE

C.

iSCSI

D.

eSATA

Full Access
Question # 63

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 64

A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?

A.

Alerting

B.

Retention

C.

Shipping

D.

Rotation

Full Access
Question # 65

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Full Access
Question # 66

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Full Access
Question # 67

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Full Access
Question # 68

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 69

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Full Access
Question # 70

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Full Access
Question # 71

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

A.

Replace all the array drives at once and then expand the array.

B.

Expand the array by changing the RAID level to 6.

C.

Expand the array by changing the RAID level to 10.

D.

Replace the array drives one at a time and then expand the array.

Full Access
Question # 72

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Full Access
Question # 73

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Full Access
Question # 74

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Full Access
Question # 75

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Full Access
Question # 76

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Full Access
Question # 77

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

A.

Implement rollback procedures.

B.

Upgrade the drivers.

C.

Reinstall the OS.

D.

Reboot the server.

Full Access
Question # 78

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 79

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Full Access
Question # 80

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Full Access
Question # 81

Which of the following refers to the requirements that dictate when to delete data backups?

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Full Access
Question # 82

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Full Access
Question # 83

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Full Access
Question # 84

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Full Access
Question # 85

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

A.

The keyboard is defective and needs to be replaced.

B.

The system failed before the display card initialized.

C.

The power supply is faulty and is shutting down the system.

D.

The NIC has failed, and the system cannot make a network connection.

Full Access
Question # 86

A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?

A.

Off-site backups

B.

Full backups

C.

Differential backups

D.

Incremental backups

Full Access
Question # 87

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 88

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

A.

set-service

B.

net

C.

sc

D.

services.msc

Full Access
Question # 89

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Full Access
Question # 90

A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?

A.

nslookup

B.

nbtstat

C.

telnet

D.

netstat -a

Full Access
Question # 91

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

    HTTP

A.

FTP

B.

SCP

C.

USB

Full Access
Question # 92

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

A.

Hybrid

B.

Public

C.

Private

D.

Community

Full Access
Question # 93

Which of the following describes when a site is considered a warm site?

A.

It has basic technical facilities connected to it.

B.

It has faulty air conditioning that is awaiting service.

C.

It is almost ready to take over all operations from the primary site.

D.

It is fully operational and continuously providing services.

Full Access
Question # 94

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Full Access
Question # 95

A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?

A.

DHCP configuration

B.

Firewall rules

C.

DLP software

D.

Intrusion detection system

Full Access
Question # 96

An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).

A.

21

B.

22

C.

53

D.

67

E.

69

F.

110

G.

123

Full Access
Question # 97

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Full Access
Question # 98

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Full Access
Question # 99

A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen.

Which of the following is the next step the administrator should take to diagnose the error without opening the machine?

A.

Perform a cold reboot.

B.

Listen for POST code beeps.

C.

Call technical support.

D.

Check the monitor connection.

Full Access
Question # 100

Which of the following should be configured in pairs on a server to provide network redundancy?

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Full Access
Question # 101

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Full Access
Question # 102

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Full Access
Question # 103

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Full Access
Question # 104

A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do NEXT?

A.

Reinstall the server OS in repair mode while maintaining the data.

B.

Flash the BIOS with the most recent version.

C.

Reverse the latest change made to the server and reboot.

D.

Restart the server into safe mode and roll back changes.

Full Access
Question # 105

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Full Access
Question # 106

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Full Access
Question # 107

An administrator received an alert that a backup job has been unsuccessful in the previous three attempts. The administrator discovers the issue occurred while backing up a user's data on a network share. Which of the following actions would be best to allow the job to complete successfully?

A.

Enabling open file backups in the backup job

B.

Moving the user's data off the network share

C.

Excluding the user's data from the backup

D.

Changing the backup job to exclude certain file types

Full Access
Question # 108

Which of the following actions should the server administrator perform on the server?

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Full Access
Question # 109

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Full Access
Question # 110

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Full Access
Question # 111

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Full Access
Question # 112

Which of the following will protect critical data during a natural disaster?

A.

Off-site storage

B.

Life-cycle management

C.

Environmental controls

D.

Data-at-rest encryption

Full Access
Question # 113

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 114

A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?

A.

Simulated

B.

Tabletop

C.

Live

D.

Non-production

Full Access
Question # 115

Which of the following should a server administrator configure to ensure access to motherboard software is restricted?

A.

Biometric lock

B.

Data-at-rest encryption

C.

BIOS password

D.

Bootloader authentication

Full Access
Question # 116

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 117

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 118

A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?

A.

Separate circuits

B.

Load balancing

C.

Server monitoring

D.

Redundancy

Full Access
Question # 119

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Full Access
Question # 120

A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?

A.

RAM

B.

Power supply

C.

Cooling failure

D.

CPU

Full Access
Question # 121

Several mobile users are reporting intermittent performance issues when attempting to access network shares on the file server. After some investigation, the server administrator notices the server resources are running at maximum capacity, even during non-peak usage times. A recent port scan of the network identified this server as having too many unnecessary ports open to the public. Which of the following is the most likely cause of the performance issues?

A.

Incorrect share permissions for mobile users

B.

Improper privilege escalation

C.

A virus infection

D.

A misconfigured firewall rule

Full Access
Question # 122

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Full Access
Question # 123

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Full Access
Question # 124

A systems administrator notices the fans are running at full speed in a newly upgraded server. Which of the following should be done to address this issue?

A.

Replace the PSU.

B.

Reseat the video card.

C.

Reseat the RAM.

D.

Reattach the heat sink.

Full Access
Question # 125

Which of the following supports virtualization?

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

Full Access
Question # 126

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 127

A technician needs to replace two RAID controllers on a database server as part of an upgrade. The server has six external storage arrays and eight internal disks that are controlled by the two RAID controllers. The technician completes the replacement and powers the systems back on, but the server OS detects several missing disks in the configuration. Which of the following steps should the technician take first to resolve this issue?

A.

Reboot to the RAID controller BIOS and rescan for attached disks and arrays

B.

Start the motherboard UEFI and confirm the RAID controller start order is correct

C.

Turn off the external arrays and reboot the server to redetect the internal disks first

D.

Turn off all components and confirm all external and internal cables before rebooting

Full Access
Question # 128

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 129

A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights. Which of the following is most likely the issue?

A.

A single-mode fiber cable is used in place of multimode.

B.

The switchport is on the wrong virtual SAN.

C.

The HBA driver needs to be installed on the server.

D.

The zoning on the fiber switch is wrong.

Full Access
Question # 130

A Windows server has experienced a BSOD, and the administrator needs to monitor the reboot. The server is in a datacenter with no OOB management. Which of the following tools should the administrator use to complete this task?

A.

Crash cart

B.

IP KVM

C.

Virtual administration console

D.

Serial connection

Full Access
Question # 131

An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?

A.

1000BASE-LX 1Gb single-mode plenum fiber connection

B.

10GBASE-T 10Gb copper plenum Ethernet connection

C.

1000BASE-T 1Gb copper non-plenum Ethernet connection

D.

10GBASE-SR 10Gb multimode plenum fiber connection

Full Access
Question # 132

Which of the following technologies can successfully back up files that are used by other processes without stopping those processes?

A.

Differential

B.

Archive

C.

Synthetic full

D.

Open file

Full Access
Question # 133

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

Full Access
Question # 134

Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?

A.

Bolting door lock

B.

Combination door lock

C.

Electronic door lock

D.

Biometric door lock

Full Access
Question # 135

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Full Access
Question # 136

Which of the following backup methods can be performed while a server is running, will not interrupt files in use, and can be used to fully restore the server if needed?

A.

Snapshot

B.

Archive

C.

Open file

D.

Differential

Full Access
Question # 137

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Full Access
Question # 138

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

A.

is fully operational and continuously providing services.

Full Access
Question # 139

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Full Access
Question # 140

Which of the following factors would most likely impact the selection of an organization's cloud provider?

A.

Industry standards

B.

Government regulations

C.

Company policy

D.

Organizational procedures

Full Access
Question # 141

Under which of the following should a technician implement scripting?

A.

Authenticating users

B.

Change management

C.

Business impact analysis

D.

Step-by-step tasks

Full Access