Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following describes the concept of allocating more resources than what is available on a hypervisor?

A.

Direct access

B.

Overprovisioning

C.

Link aggregation

D.

Component redundancy

E.

Scalability

Full Access
Question # 5

Which of the following script types would MOST likely be used on a modern Windows server OS?

A.

Batch

B.

VBS

C.

Bash

D.

PowerShell

Full Access
Question # 6

An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

A.

Modifying the MAC used on the DHCP reservation

B.

Updating the local hosts file with the correct IP address

C.

Modifying the WWNN used on the DHCP reservation

D.

Updating the NIC to use the correct WWNN

Full Access
Question # 7

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Full Access
Question # 8

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

A.

is fully operational and continuously providing services.

Full Access
Question # 9

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Full Access
Question # 10

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 11

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Full Access
Question # 12

A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).

A.

Floor load limitations

B.

Rack balancing

C.

Proper lifting techniques

D.

Power connector type

E.

KVM placement

F.

Cable management

G.

UPS power requirements

Full Access
Question # 13

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Full Access
Question # 14

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Full Access
Question # 15

Which of the following distributes a load across all interfaces?

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Full Access
Question # 16

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Full Access
Question # 17

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 18

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

A.

Most recently used

B.

Heartbeat

C.

Link aggregation

D.

Round robin

Full Access
Question # 19

A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?

A.

Separate circuits

B.

Load balancing

C.

Server monitoring

D.

Redundancy

Full Access
Question # 20

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 21

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Full Access
Question # 22

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Full Access
Question # 23

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Full Access
Question # 24

An administrator notices a server is offline. Upon checking the console, the administrator discovers the server is stuck at:

Configuring Memory.............

After a reboot, the server still exhibits the same behavior. The administrator is able to log in to the OOB remote management but is unable to log in to the server. Which of the following is the most likely cause of this issue?

A.

A DIMM has failed

B.

The VRAM is insufficient

C.

The RAID cache has failed

D.

The BIOS needs to be updated

Full Access
Question # 25

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Full Access
Question # 26

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Full Access
Question # 27

Which of the following documents would explain the consequences of server downtime?

A.

Service-level agreement

B.

Business continuity plan

C.

Disaster recovery plan

D.

Business impact analysis

Full Access
Question # 28

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Full Access
Question # 29

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Full Access
Question # 30

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Full Access
Question # 31

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Full Access
Question # 32

Which of the following supports virtualization?

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

Full Access
Question # 33

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is

described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Full Access
Question # 34

A systems administrator notices that a SAN is running out of space. There is no additional funding in the budget to upgrade the storage space. Which of the following will significantly reduce the storage space with the least effort? (Select two).

A.

Configuring compression

B.

Deleting old and unused files

C.

Increasing the number of IOPS

D.

Decreasing the RAID level

E.

Enabling deduplication

F.

Upgrading the filesystem type

Full Access
Question # 35

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Full Access
Question # 36

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 37

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

A.

Close unneeded ports.

B.

Disable unneeded physical ports.

C.

Set a BIOS password.

D.

Install a SIEM.

E.

Disable unneeded services.

F.

Install a HIDS.

Full Access
Question # 38

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Full Access
Question # 39

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 40

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Full Access
Question # 41

Which of the following script types uses commands That start with sec-?

A.

Batch

B.

Bash

C.

PowerShell

D.

JavaScript

Full Access
Question # 42

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

A.

135

B.

636

C.

3268

D.

3389

Full Access
Question # 43

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

A.

rsync

B.

copy

C.

scp

D.

robocopy

Full Access
Question # 44

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Full Access
Question # 45

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Full Access
Question # 46

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Full Access
Question # 47

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Full Access
Question # 48

A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?

A.

Reinstall the OS.

B.

Wipe the drives.

C.

Degauss the drives.

D.

Update the IP schema.

Full Access
Question # 49

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Full Access
Question # 50

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Full Access
Question # 51

An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes. Which of the following would BEST help answer the server performance question9

A.

Server performance thresholds

B.

A server baseline

C.

A hardware compatibility list

D.

An application service-level agreement

Full Access
Question # 52

Which of the following should be configured in pairs on a server to provide network redundancy?

A.

MRU

B.

SCP

C.

DLP

D.

CPU

E.

NIC

Full Access
Question # 53

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Full Access
Question # 54

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 55

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A.

A full, weekly backup with daily open-file backups

B.

A full, weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Full Access
Question # 56

Which of the following licensing models allows the greatest number of concurrent Windows VMS to run on a host for the lowest cost?

A.

per user

B.

per core

C.

Per instance

D.

Per concurrent user

Full Access
Question # 57

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 58

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Full Access
Question # 59

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Full Access
Question # 60

Which of the following refers to the requirements that dictate when to delete data backups?

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Full Access
Question # 61

A server administrator needs to ensure all Window-based servers within a data center have RDP disabled. There are thousands of servers performing various roles. Which of the following is the best way to meet this requirement?

A.

Run chkconfig ——1eve1 345 RDP off.

B.

Create a PowerSheII script to disable the RDP service.

C.

Run chkconfig —— list RDP.

D.

Create a Bash shell script to disable the Windows Remote Management service.

E.

Create a GPO to disable the Windows Remote Management service.

Full Access
Question # 62

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

A.

Link aggregation

B.

Heartbeat

C.

Most recently used

D.

Active-active

Full Access
Question # 63

An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?

A.

The solution reduced shutdown time.

B.

The solution improved load balancing,

C.

The solution increased power out.

D.

The solution extended runtime.

Full Access
Question # 64

A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?

A.

nslookup

B.

nbtstat

C.

telnet

D.

netstat -a

Full Access
Question # 65

Which of the following licensing concepts is based on the number of logical processors a server has?

A.

Per core

B.

Per socket

C.

Per instance

D.

Per server

Full Access
Question # 66

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

A.

20

B.

21

C.

22

D.

23

E.

53

Full Access
Question # 67

A server administrator receives the following output when trying to ping a local host:

Which of the following is MOST likely the issue?

A.

Firewall

B.

DHCP

C.

DNS

D.

VLAN

Full Access
Question # 68

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Full Access
Question # 69

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Full Access
Question # 70

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Full Access
Question # 71

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 72

A staff member who a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?

A.

Installing blanking panels in all the empty rack spaces

B.

installing an additional POU and spreading out the power cables

C.

Installing servers on the shelves instead of sliding rails

D.

installing front bezels on all the server’s m the rack

Full Access
Question # 73

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

Full Access
Question # 74

Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?

A.

Per-server

B.

per-seat

C.

Per-concurrent user

D.

per-core

Full Access
Question # 75

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

A.

0

B.

1

C.

5

D.

6

Full Access
Question # 76

A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?

A.

Off-site backups

B.

Full backups

C.

Differential backups

D.

Incremental backups

Full Access
Question # 77

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Full Access
Question # 78

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 79

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Full Access
Question # 80

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Full Access
Question # 81

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

A.

Consult the HCL to ensure everything is supported.

B.

Migrate the physical server to a virtual server.

C.

Low-level format the hard drives to ensure there is no old data remaining.

D.

Make sure the case and the fans are free from dust to ensure proper cooling.

Full Access
Question # 82

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 83

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 84

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Full Access
Question # 85

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Full Access
Question # 86

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Full Access
Question # 87

After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:

The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?

A.

Network port security

B.

An improper VLAN configuration

C.

A misconfigured DHCP server

D.

A misconfigured NIC on the server

Full Access
Question # 88

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Full Access
Question # 89

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Full Access
Question # 90

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Full Access
Question # 91

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Full Access
Question # 92

An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?

A.

The page file is too small.

B.

The CPU has failed.

C.

There are multiple failed hard drives.

D.

There are mismatched RAM modules.

E.

RAID 5 requires four drives

Full Access
Question # 93

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Full Access
Question # 94

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 95

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?

A.

pvdisplay

B.

mount

C.

df -h

D.

fdisk -l

Full Access
Question # 96

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Full Access
Question # 97

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 98

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Full Access
Question # 99

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Full Access
Question # 100

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 101

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Full Access
Question # 102

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

Full Access
Question # 103

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163 mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Full Access
Question # 104

An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).

A.

21

B.

22

C.

53

D.

67

E.

69

F.

110

G.

123

Full Access
Question # 105

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Full Access
Question # 106

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 107

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Full Access
Question # 108

Which of the following licenses would MOST likely include vendor assistance?

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Full Access
Question # 109

Which of the following will correctly map a script to a home directory for a user based on username?

A.

\\server\users$\username

B.

\\server\%username%

C.

\\server\FirstInitialLastName

D.

\\server\$username$

Full Access
Question # 110

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Full Access
Question # 111

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Full Access
Question # 112

Which of the following server types would benefit MOST from the use of a load balancer?

A.

DNS server

B.

File server

C.

DHCP server

D.

Web server

Full Access
Question # 113

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 114

Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?

A.

Check the power supplies

B.

Review the log files.

C.

Reinstall the ESX server.

D.

Reseat the processors.

Full Access
Question # 115

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Full Access
Question # 116

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Full Access
Question # 117

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Full Access
Question # 118

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Full Access
Question # 119

Which of the following backup types only records changes to the data blocks on a virtual machine?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthetic full

Full Access
Question # 120

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Full Access
Question # 121

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Full Access
Question # 122

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Which of the following caused the issue?

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Full Access
Question # 123

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.

21

B.

22

C.

23

D.

443

Full Access
Question # 124

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Full Access
Question # 125

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Full Access
Question # 126

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 127

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

A.

Power cycle the storage arrays and rescan RAID on the server.

B.

Boot the OS into recovery mode and rescan the disks.

C.

Restore the default RAID configuration and reboot.

D.

Perform a rescan on the server's RAID controller.

Full Access
Question # 128

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

A.

25

B.

53

C.

443

D.

3389

E.

8080

Full Access
Question # 129

A bad actor leaves a USB drive with malicious code on it in a company's parking lot. Which of the following describes this scenario?

A.

Hacking

B.

Insider threat

C.

Phishing

D.

Social engineering

Full Access
Question # 130

The management team has requested that new software licenses be purchased out of the capital budget as one-time, non-renewing expenses this year. Which of the following types of software licenses would most likely be used to meet this request?

A.

Open-source

B.

Subscription

C.

Volume

D.

Perpetual

Full Access
Question # 131

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Full Access
Question # 132

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 133

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 134

A server administrator created a new script and included the path to the script binary as the first line of the script. Which of the following scripting languages did the administrator most likely use?

A.

Batch

B.

Java

C.

Bash

D.

PowerShell

Full Access
Question # 135

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Full Access
Question # 136

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Full Access
Question # 137

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Full Access