Deck 3 Flashcards

1
Q

A server technician in a datacenter configures a daemon to monitor the battery health in a
UPS. Over a two day time period, the daemon generates a warning message. Which of the
following represents the FIRST action that should be taken by the server technician?

A. Perform a test on the UPS batteries
B. Immediately replace the UPS batteries
C. Move the servers connected to the UPS to another existing UPS
D. Immediately replace the UPS with a new UPS

A

A. Perform a test on the UPS batteries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator is securing a secure web server by disabling ports. After completing this
process, clients cannot access the secure web server. The administrator should now go
back and verify whether which of the following ports is enabled?

A. 23
B. 389
C. 443
D. 445

A

C. 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator is tasked to set up zoning for a SAN infrastructure that requires
redundancy. Which of the following types of hardware should the administrator implement?

A. Multiple VLANs
B. Multiple host nodes
C. Multiple HBAs
D. Multiple routers

A

C. Multiple HBAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is tasked with creating servers that are fault tolerant and highly available.
Which of the following would be the BEST solution for this task?

A. Load balancing
B. Virtualization
C. Clustering
D. Round robin

A

C. Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system administrator has decided to create several VMs for a company. In which of the
following locations would each of the VM sreside?
A. Host
B. VNC
C. Guest
D. VPN

A

A. Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system administrator is tasked to enable authentication on a web server’s login page.
One of the requirements for the web server is to encrypt authenticated sessions over HTTP
protocol for all static HTML pages. Using the information supplied, which of the following
default port numbers should be used to satisfy these requirements?

A. 53
B. 8080
C. 143
D. 443

A

D. 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server in a small company functions as a print server. Suddenly it stops sending print
jobs to the printers. A technician verifies that the printers are working correctly. Additionally,
the print spooler had been restarted and is running on the server, it is accessible from
workstations, and it shows as being ready to accept print jobs. Which of the following has
MOST likely caused the print server to stop processing print jobs?

A. The print quota has been exceeded.
B. The server needs an updated print driver.
C. The server needs pooling enabled.
D. The server’s hard drive is out of space.

A

D. The server’s hard drive is out of space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A server technician is replacing a web server in an organization. The new server has two
integrated NICs. Which of the following describes how the NICs should be configured for
fault protection?
A. The NICs should be configured separately with one MAC address.
B. The NICs should be placed into a team with one MAC address.
C. The NICs should be configured separately with two MAC addresses.
D. The NICs should be placed into a team with two MAC addresses.

A

B. The NICs should be placed into a team with one MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user in the accounting department reports that print jobs are not printing. A user in the
software development department also cannot print to the same printer, but can print to two
other printers on different print servers. Which of the following should be the administrator’s
FIRST step?

A. Determine whether the server is out of virtual memory.
B. Check whether the print spooler service has started.
C. Reboot the print server.
D. Have the users reboot their workstations.

A

B. Check whether the print spooler service has started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following describes a rack mounted server that is 2 rack units (2U) in height?

A. 2.5 inches (6.35 cm)
B. 3.0 inches (7.62 cm)
C. 3.5 inches (8.89 cm)
D. 4.0 inches (10.16 cm)

A

C. 3.5 inches (8.89 cm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A server administrator is implementing disk redundancy in all database servers. Which of
the following RAID configurations should the administrator use so that a MINIMUM number
of disks are required?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

A

B. RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician is tasked to build a server requiring the fastest possible performance. Which of
the following would achieve this requirement?

A. 10,000 RPM SATA
B. 15,000 RPM SAS
C. SSD
D. USB

A

C. SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator has been tasked with consolidating six individual servers into one blade
enclosure. The administrator completed the task successfully.A week later, all of the
blades would not boot properly. Which of the following would MOST likely be causing this issue?

A. The blade servers are faulty.
B. The network module on the blade enclosure is faulty.
C. The backplane of the enclosure is faulty.
D. The management modules in the enclosure are faulty.

A

C. The backplane of the enclosure is faulty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following protocols is used primarily for monitoring and managing network devices?

A. SNMP
B. SMTP
C. FTPS
D. NTP

A

A. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator sees a message in the system console that a drive is bad in the single-
volume JBOD storage array. A few minutes later, a user calls the help desk to report an
inability to read a file from a mapped drive. Which of the following should the administrator do?

A. Swap out the failed drive and let the array rebuild.
B. Allow the array rebuild automatically using the hotspare.
C. Replace the failed drive and restore the data from the last backup.
D. Reseat the failed drive and restore the array using the parity drive.

A

C. Replace the failed drive and restore the data from the last backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The logs on a server in a datacenter indicate that the server unexpectedly shut down
minutes after the night cleaning crew started their shift. Which of the following is the MOST
likely reason for the shut down?

A. A hard disk on the server failed.
B. A power surge occurred.
C. The CPU on the server overheated.
D. A memory module on the server failed.

A

B. A power surge occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is a benefit of utilizing a type 2 hypervisor to manage guests?

A. The administration of the guest OS is significantly less complex.
B. There is reduced resource overhead since there is no OS layer.
C. A type 2 hypervisor offers increased performance over a type 1 hypervisor.
D. There is increased hardware support since there is an OS layer.

A

D. There is increased hardware support since there is an OS layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An administrator has been tasked with making recommendations for purchasing new disks
for a low I/O file server. Keeping in mind that budget and capacity are the primary
concerns, which the following disk types should the administrator recommend?

A. SATA
B. FC
C. SCSI
D. SAS

A

A. SATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A system administrator is tasked with dividing the network so that each department is
separate from the other. Which of the following should be used to accomplish this task?

A. VLAN
B. VPN
C. VNC
D. VM

A

A. VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician would like to restrict when internal hardware components on the server are
accessed. Which of the following server hardening techniques should the technician
implement?

A. Intrusion detection
B. BIOS password
C. Chassis lock
D. Disable WOL

A

C. Chassis lock

21
Q

A blade server indicates it has a failed hard disk in Slot 0. This is the third instance of Slot 0
disk failure in three months. Which of the following is the MOST likely cause of the failed
hard disk in Slot 0?

A. Host bus adapter
B. Backplane
C. Network interface card
D. Central Processing Unit

A

B. Backplane

22
Q

A server administrator is creating a design for a new datacenter. The servers should be
configured for maximum availability and also provide caching for user information requests.
Which of the following techniques should be used?

A. Active/Passive
B. Round robin
C. Heartbeat
D. Active/Active
E. Passive/Passive
A

D. Active/Active

23
Q

Users on a network segment report that they are unable to connect to a newly installed file
server. The file server IP address settings are as follows:
IP address: 10.0.10.254
Subnet Mask: 255.255.255.0
Default Gateway: 10.10.10.1
Which of the following changes should the server administrator make?

A. Change the IP address on the server to 10.10.0.254.
B. Change the IP address on the server to 10.10.10.254.
C. Change the default gateway on the server to 10.10.10.254.
D. Change the subnet mask on the server to 255.255.0.0.

A

B. Change the IP address on the server to 10.10.10.254.

24
Q

A company is being audited by its operating system vendor. The company needs to report
the number of operating systems in use, the versions of the operating systems, and the
product keys. Which of the following will be MOST helpful in passing the audit?

A. Asset management documentation
B. Change management logs
C. Service manuals
D. Server baselines

A

A. Asset management documentation

25
Q

A technician has finished installing the operating system on a new server and needs to
provide IP addressing information. The server will be connected to the DMZ network.
Devices on thenetwork use a default gateway address of 192.168.55.1. Which of the
following is a valid IP address for a server in the DMZ network?

A. IP: 192.168.55.1, NETMASK 255.255.255.0
B. IP: 192.168.55.5, NETMASK 255.255.255.128
C. IP: 192.168.55.155, NETMASK 255.255.255.128
D. IP: 192.168.55.255, NETMASK 255.255.255.0

A

B. IP: 192.168.55.5, NETMASK 255.255.255.128

26
Q

A database server stops responding to requests, and the administrator suspects that the
server is experiencing memory faults during heavy network traffic and database access.
Which of the following is the FIRST troubleshooting step?

A. Check the security log.
B. Check the application logs.
C. Check the debug report.
D. Check the POST error log.

A

B. Check the application logs.

27
Q

Which of the following services provides users with directory services?

A. IMAP
B. LDAP
C. SFTP
D. DHCP
E. DNS
A

B. LDAP

28
Q

Which of the following is an example of the principle of least privilege and is the MOST
secure when granting access to a shared network drive used by the Accounting department?

A. Grant appropriate permissions to only users in the Accounting department for both the share and NTFS
B. Grant all users full control permissions for the share only
C. Grant the Accounting department full control for the share and appropriate NTFS permissions
D. Grant modify permissions to the Accounting department and deny NTFS permissions to all other users

A

A. Grant appropriate permissions to only users in the Accounting department for both the share and NTFS

29
Q

Users in the accounting department report that they are unable to access a shared network
drive used by all departments. Upon troubleshooting, a technician determines that three
users in the marketing department, two in sales, five in human resources, and ten in IT are
all successfully accessing the shared network drive. Which of the following is MOST likely
causing the issue?

A. Corrupt user profiles
B. Incorrect NTFS group permissions
C. The share is unsecured
D. Excessive page filing on server

A

B. Incorrect NTFS group permissions

30
Q

A technician is replacing a faulty NIC in a server. According to best practices, which of the
following should be used to configure the IP address on the server?

A. DNS reservation
B. DHCP IP address
C. DHCP reservation
D. Static IP address

A

D. Static IP address

31
Q

A technician is working on a server that is experiencing network connectivity issues. The
technician replaces the NIC on the server, but this does not resolve the issue. Which of the
following troubleshooting steps should the technician do NEXT?

A. Establish a new theory of probable cause
B. Perform a root cause analysis
C. Document findings, actions, and outcomes
D. Identify additional changes to the server

A

A. Establish a new theory of probable cause

32
Q

An administrator was tasked to enforce disk quotas on the Windows file server. The
administrator allocated 1GB of space to each user. A month later, the users were still able
to save beyond 1GB. Which of the following check boxes should have been selected?

A. Enable compression
B. Prohibit read/write if limit is reached
C. Deny access if limit is reached
D. Log an event if disk space is reached

A

C. Deny access if limit is reached

33
Q

A new DHCP server is placed on a network segment during off hours. When work
resumes, users on a different network segment report connectivity issues. Users on the
same network segment report no connectivity issues. Which of the following is the MOST
likely reason for the connectivity issues?

A. The DHCP server was configured without specifying a WINS server address for the users.
B. The DHCP server was configured without specifying a DNS server address for the users.
C. The DHCP relay agent was not configured on the adjacent network segment.
D. The DHCP server was configured to use private IP addressing to all network segments.

A

C. The DHCP relay agent was not configured on the adjacent network segment.

34
Q

A server is giving a fault code indicating that a RAM chip is producing errors and should be
replaced. According to best practices, which of the following is the proper sequence of
steps to replace the faulty module?

A. Attach ESD protection, open server case, replace module, close server case, baseline configuration
B. Open server case, baseline configuration, attach ESD protection, replace module, close server case
C. Attach ESD protection, baseline configuration, open server case, replace module, close server case
D. Open server case, replace module, attach ESD protection, close server case, baseline configuration

A

A. Attach ESD protection, open server case, replace module, close server case, baseline configuration

35
Q

An administrator needs to perform a backup of all servers for an upcoming disaster recovery
exercise at a company cold site. Which of the following types of backup should be performed?

A. Snapshot
B. Incremental
C. Differential
D. Full

A

D. Full

36
Q

A system administrator has just performed a backup. Which of the following should the administrator perform to easily identify the backup tape?

A. Label the tape
B. Mount the tape in the drive
C. Place the tape in the rack
D. Update the site log

A

A. Label the tape

37
Q

An administrator needs to control servers locally via a console. The administrator wants a rack mounted solution for easy access. Which of the following should be installed?

A. iDRAC
B. KVM
C. ILO
D. RDP

A

B. KVM

38
Q

Which of the following is the height of 1U of space in a server rack?

A. 1.5 inches (3.8 cm)
B. 1.75 inches (4.4 cm)
C. 2 inches (5.1 cm)
D. 3 inches (7.6 cm)

A

B. 1.75 inches (4.4 cm)

39
Q

A mission critical server has faulted with a dead 66 MHz 3.3V PCI-X network interface card. The system administrator has been directed to get the server functional as soon as possible, even if it is connected with less bandwidth. There are no onsite spare cards available and the vendor does not expect to have the parts for at least a week. Which of the following immediately available NICs could be substituted instead?

A. 33 MHz 3.3V PCI
B. 66 MHz 5V PCI
C. 266 MHzx 3.3V PCI-X
D. 533 MHz 5V PCI-X

A

A. 33 MHz 3.3V PCI

40
Q

A host server in a small business environment does not have virtual switching configured. The NIC on a guest is configured with an IP address that is on a different subnet from the host server. Which of the following would MOST likely happen in this case?

A. The guest will not have network access to the host or network resources.
B. The guest would have access to all network resources.
C. The guest would have network access to everything but the host.
D. The guest will have network access to the host server.

A

A. The guest will not have network access to the host or network resources.

41
Q

A company is planning to replace old hardware and needs to budget accordingly. Which of the following is likely to contain a list of end of life servers?

A. The server’s warranty information.
B. The server’s life cycle schedule.
C. The asset management database.
D. The software licensing agreement.

A

C. The asset management database.

42
Q

A customer reports that connectivity to their web server has been sporadic throughout the
morning. An administrator has applied OS patches periodically throughout the morning and
rebooted the server. Which of the following has the administrator MOST likely violated?

A. Service level agreement
B. Mean time before failure
C. Mean time to repair
D. Request for proposal

A

A. Service level agreement

43
Q

A technician is troubleshooting an issue with a new server, which is unable to download OS
patches from the Internet. The technician reviews the following configuration:
Ethernet Adapter Local Area Connection:
Connection-specific DNS Suffix . : comptia.org
Link-local IPv6 Address . . . . : fe80::c95:3f59:1a01:c050%11
IPv4 Address . . . . . . . . . . : 192.168.10.20
Subnet Mask . . . . . . . . . . : 255.255.255.128
Default Gateway . . . . . . . . : 192.168.10.129
Which of the following is the reason that the server is unable to connect to the Internet?

A. Incorrect default gateway
B. Invalid IPv6 address
C. Wrong subnet mask
D. Misconfigured DNS suffix

A

A. Incorrect default gateway

44
Q

In authentication, which of the following represents something you have?

A. Password
B. Fingerprint
C. Token
D. PIN

A

C. Token

45
Q

A technician is tasked with creating a test system containing non-critical data. The technician has limited hardware, but needs maximum performance. Which of the following RAID levels should the technician use?

A. 0
B. 1
C. 5
D. 10

A

A. 0

46
Q

Which of the following allows virtual machines to share the NIC of the host?

A. Virtual LANs
B. NAT
C. Bridging
D. Virtual NICs

A

C. Bridging

47
Q

Which of the following server types stores the list of network usernames and passwords required for authentication?

A. File server
B. Directory
C. DHCP
D. SNMP

A

B. Directory

48
Q

Which of the following provides two-factor authentication?

A. Bank card and PIN.
B. Username and password.
C. Fingerprint and iris scan.
D. Key and proximity badge.

A

A. Bank card and PIN.

49
Q

Which of the following is the MOST energy efficient way of powering equipment within a datacenter with a large UPS battery bank?

A. 48V DC
B. 120V single-phase
C. 240VAC 3-phase
D. 480V 3-phase

A

A. 48V DC