Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A systems administrator needs to create a data volume out of four disks with the MOST redundancy. Which of the following is the BEST solution?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 5

A snapshot is a feature that can be used in hypervisors to:

A.

roll back firmware updates.

B.

restore to a previous version.

C.

roll back application drivers.

D.

perform a backup restore.

Full Access
Question # 6

Which of the following concepts is in use when dual power supplies are connected to different power sources?

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Full Access
Question # 7

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Full Access
Question # 8

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Full Access
Question # 9

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Full Access
Question # 10

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Full Access
Question # 11

Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.

Which of the following types of authentications is described in this scenario?

A.

MFA

B.

NTLM

C.

Kerberos

D.

SSO

Full Access
Question # 12

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Full Access
Question # 13

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Full Access
Question # 14

Which of the following can be used to map a network drive to a user profile?

A.

System service

B.

Network service

C.

Login script

D.

Kickstart script

Full Access
Question # 15

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 16

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Full Access
Question # 17

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Full Access
Question # 18

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Full Access
Question # 19

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Full Access
Question # 20

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Full Access
Question # 21

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Full Access
Question # 22

Which of the following is an example of load balancing?

A.

Round robin

B.

Active-active

C.

Active-passive

D.

Failover

Full Access
Question # 23

A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?

(Choose two.)

A.

Adware is installed on the users’ devices

B.

The firewall rule for the server is misconfigured

C.

The server is infected with a virus

D.

Intrusion detection is enabled on the network

E.

Unnecessary services are disabled on the server

F.

SELinux is enabled on the server

Full Access
Question # 24

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Full Access
Question # 25

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

A.

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.

B.

Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.

C.

Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.

D.

Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.

Full Access
Question # 26

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?

A.

Messaging

B.

Application

C.

Print

D.

Database

Full Access
Question # 27

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Full Access
Question # 28

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Full Access
Question # 29

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

A.

Full

B.

Bare metal

C.

Core

D.

GUI

Full Access
Question # 30

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Full Access
Question # 31

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Full Access
Question # 32

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

Full Access
Question # 33

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Full Access
Question # 34

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A.

Stop sharing the volume

B.

Replace the disk

C.

Shut down the SAN

D.

Stop all connections to the volume

Full Access
Question # 35

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

  • Drive

  • Database

  • Folder

A.

File

Full Access
Question # 36

Which of the following would a systems administrator implement to ensure all web traffic is secure?

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Full Access
Question # 37

Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Full Access
Question # 38

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

A.

20

B.

21

C.

22

D.

23

E.

53

Full Access
Question # 39

A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?

A.

Static

B.

Router-assigned

C.

APIPA

D.

DHCP

Full Access
Question # 40

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Full Access
Question # 41

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Full Access
Question # 42

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 43

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 44

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Full Access
Question # 45

Which of the following backup types resets the archive bit each time it is run?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthic full

Full Access
Question # 46

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Full Access
Question # 47

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

A.

Linked list

B.

String

C.

Loop

D.

Constant

Full Access
Question # 48

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

A.

135

B.

636

C.

3268

D.

3389

Full Access
Question # 49

Which of the following techniques can be configured on a server for network redundancy?

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Full Access
Question # 50

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Full Access
Question # 51

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Full Access
Question # 52

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Full Access
Question # 53

A staff member who a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?

A.

Installing blanking panels in all the empty rack spaces

B.

installing an additional POU and spreading out the power cables

C.

Installing servers on the shelves instead of sliding rails

D.

installing front bezels on all the server’s m the rack

Full Access
Question # 54

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

A.

The boot log

B.

The BIOS

C.

The HCL

D.

The event log

Full Access
Question # 55

Which of the following ensures a secondary network path is available if the primary connection fails?

A.

Link aggregation

B.

Most recently used

C.

Heartbeat

D.

Fault tolerance

Full Access
Question # 56

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Full Access
Question # 57

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Full Access
Question # 58

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

A.

Print

B.

File

C.

Database

D.

Messaging

Full Access
Question # 59

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Full Access
Question # 60

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 61

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Full Access
Question # 62

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Full Access
Question # 63

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.

Press F8 to enter safe mode

B.

Boot from the media

C.

Enable HIDS on the server

D.

Log in with an administrative account

Full Access
Question # 64

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.

C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 65

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 66

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Full Access
Question # 67

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Full Access
Question # 68

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Full Access
Question # 69

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Full Access
Question # 70

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Full Access
Question # 71

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Full Access
Question # 72

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Full Access
Question # 73

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Full Access
Question # 74

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

Full Access
Question # 75

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Full Access
Question # 76

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent

unauthorized server access? (Choose two.)

A.

Audit all group privileges and permissions

B.

Run a checksum tool against all the files on the server

C.

Stop all unneeded services and block the ports on the firewall

D.

Initialize a port scan on the server to identify open ports

E.

Enable port forwarding on port 80

F.

Install a NIDS on the server to prevent network intrusions

Full Access
Question # 77

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 78

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Full Access
Question # 79

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Full Access
Question # 80

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Full Access
Question # 81

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Full Access
Question # 82

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Full Access
Question # 83

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Full Access
Question # 84

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.

Open file

B.

Synthetic full

C.

Full incremental

D.

Full differential

Full Access
Question # 85

An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:

The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 86

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Full Access
Question # 87

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Full Access
Question # 88

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 89

A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?

A.

Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.

B.

Perform a complete OS reinstall on the server using the same media that was used during the initial install.

C.

Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.

D.

Set a BIOS password to prevent server technicians from making any changes to the system.

Full Access
Question # 90

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

A.

/root.ssh/sshd/config

B.

/etc.ssh/sshd_config

C.

/root/.ssh/ssh_config

D.

/etc.sshs_shd_config

Full Access
Question # 91

Which of the following actions should a server administrator take once a new backup scheme has been configured?

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Full Access
Question # 92

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Full Access
Question # 93

A server administrator notices the /var/log/audit/audit.log file on a Linux server is rotating loo frequently. The administrator would like to decrease the number of times the leg rotates without losing any of the information in the logs. Which of the following should the administrator configure?

A.

increase the audit. log file size in the appropriate confutation file.

B.

Decrease the duration of the log rotate cycle tor the audit. log file.

C.

Remove the tog rotate directive from the audit .log We configuration.

D.

Move the audit. leg files to a remote syslog server.

Full Access
Question # 94

An administrator is configuring the storage for a new database server, which will host databases that are mainly used for archival lookups. Which of the following storage types will yield the fastest database read performance?

A.

NAS

B.

SSD

C.

10K rpm SATA

D.

15K rpm SCSI

Full Access
Question # 95

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Full Access
Question # 96

Which of the following will correctly map a script to a home directory for a user based on username?

A.

\\server\users$\username

B.

\\server\%username%

C.

\\server\FirstInitialLastName

D.

\\server\$username$

Full Access
Question # 97

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Full Access
Question # 98

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Full Access
Question # 99

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

A.

SD card

B.

Optical

C.

Network

D.

USB

Full Access
Question # 100

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Full Access
Question # 101

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Full Access
Question # 102

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?

A.

A drive failed in the OS array.

B.

A drive failed and then recovered in the data array.

C.

A drive failed in both of the arrays.

D.

A drive failed in the data array.

Full Access
Question # 103

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Full Access
Question # 104

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

A.

The VLAN Is improperly configured.

B.

The DNS configuration Is invalid.

C.

The OS version is not compatible with the network switch vendor.

D.

The HIDS is preventing the connection.

Full Access
Question # 105

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.

A virtual router

B.

A host NIC

C.

A VPN

D.

A virtual switch

E.

A vNlC

Full Access
Question # 106

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

A.

Network

B.

Embedded

C.

Optical

D.

USB

Full Access
Question # 107

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Full Access
Question # 108

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Full Access
Question # 109

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

A.

Private

B.

Hybrid

C.

Community

D.

Public

Full Access
Question # 110

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Full Access
Question # 111

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Full Access
Question # 112

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.

21

B.

22

C.

23

D.

443

Full Access
Question # 113

Which of the following attacks is the most difficult to mitigate with technology?

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Full Access
Question # 114

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

A.

set-service

B.

net

C.

sc

D.

services.msc

Full Access
Question # 115

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

A.

0

B.

1

C.

5

D.

6

Full Access
Question # 116

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

A.

rsync

B.

copy

C.

scp

D.

robocopy

Full Access
Question # 117

A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient

subnet mask for this connection?

A.

/28

B.

/29

C.

/30

D.

/32

Full Access
Question # 118

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?

A.

Hardware failure

B.

Marware

C.

Data corruption

D.

Insider threat

Full Access
Question # 119

A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?

A.

Alerting

B.

Retention

C.

Shipping

D.

Rotation

Full Access
Question # 120

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Full Access
Question # 121

A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue?

A.

A S.M.A.R.T. error is a predictive failure notice. The drive will fail in the near future and should be replaced at the next earliest time possible

B.

A S.M.A.R.T. error is a write operation error. It has detected that the write sent to the drive was incorrectly formatted and has requested a retransmission of the write from the controller

C.

A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly

D.

A S.M.A.R.T. error is an ECC error. Due to error checking and correcting, the drive has corrected the missing bit and completed the write operation correctly.

Full Access
Question # 122

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Full Access
Question # 123

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Full Access
Question # 124

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

A.

Per socket

B.

Open-source

C.

Per concurrent user

D.

Volume

Full Access