Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SK0-004 Questions and Answers

Note! Following SK0-004 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is SK0-005

SK0-004 Questions and Answers

Question # 6

A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a technician realizes that a different RAID level can be used to compensate for a limited number of available disks. Which of the following is the closest RAID level the technician should deploy while minimizing the number of disks and maintaining fault tolerance?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 7

An auditor wants to reduce the server footprint in a company’s remote datacenter to decrease hosting costs. Regarding life-cycle management, which if the following is the auditor MOST likely to look for in reviewing the company’s asset data?

A.

Make, model, asset tag, and serial number

B.

Procurement date, current usage, and scheduled end of life

C.

Licensing, warranty expiration date, and efficiency

D.

Server configuration, MTBF, and replacement cost

Full Access
Question # 8

A junior systems administrator wants to know which components on a server are normally hot-swappable. Which of the following components are usually hot-swappable? (Select TWO).

A.

Hard drive

B.

CPU

C.

RAM

D.

Power supply

E.

NIC

Full Access
Question # 9

Which of the following involves finding and correcting the MOST important reason for performance issues?

A.

Root cause analysis

B.

Replicating the problem

C.

Defining preventative action

D.

Theory of probable cause

Full Access
Question # 10

A server technician is connecting a server to a switch in the server room. Both the server and the switch are equipped with 10 Gigabit Ethernet adapters. Which of the following cable choices would produce the BEST throughput?

A.

CAT6 rollover cable

B.

CAT5e straight-through cable

C.

CAT6 straight-through cable

D.

CAT5e crossover cable

Full Access
Question # 11

Which of the following components found in a legacy server has a 16-bit bus?

A.

USB

B.

PCI

C.

ISA

D.

AGP

Full Access
Question # 12

Which of the following can occur if the maximum rated load is exceeded on an uninterruptible power supply (UPS)?

A.

There is a fire hazard potential if a power outage occurs.

B.

The last system plugged into the UPS will not be provided any power.

C.

The UPS will draw more power from the circuit to compensate.

D.

The runtime of the UPS will be insufficient if a power outage occurs.

Full Access
Question # 13

Which of the following server types can be configured and joined to the existing network as a read-only server for user account verification to external websites?

A.

Syslog server

B.

Web server

C.

Directory server

D.

Messaging server

Full Access
Question # 14

An IT manager noticed that specific directories’ permissions are being changed by users. Which of the following will prevent this from occurring?

A.

Allow Read permissions only on directories

B.

Allow Write permissions only on directories

C.

Allow Full permissions on directories

D.

Allow Modify permissions only on directories

Full Access
Question # 15

A technician is implementing a RAID 10 array on a server. Which of the following is the MINIMUM number of disks needed for this array?

A.

Two

B.

Three

C.

Four

D.

Five

Full Access
Question # 16

While reviewing a network connectivity issue to a Linux server, the systems administrator issues the ifconfig command with the following results:

According to the output above, which of the following is the problem?

A.

The adapter is in “BROADCAST” mode

B.

The adapter is not in an “UP” state

C.

The broadcast address is incorrect

D.

The netmask is incorrectly configured

Full Access
Question # 17

A systems administrator is installing a new software package on a server. The software has many dependencies. Which of the following would be the BEST solution for the systems administrator to take to ensure there is no downtime with the installation of this software package?

A.

Deploy the software to production

B.

Deploy the software in a sandbox

C.

Uninstall the application software

D.

Uninstall the software updates

Full Access
Question # 18

An administrator has just upgraded a server from non-hot plug storage to all hot plug storage.

The administrator powers up the server, during POST the RAID controller is recognized but none of the drive lights flash.

Which of the following should the administrator do FIRST to troubleshoot the problem?

A.

Check the backplane cabling.

B.

Check the server BIOS.

C.

Update the RAID controller firmware.

D.

Install the latest hard drive firmware.

Full Access
Question # 19

An administrator is decommissioning a company’s old accounting system and will be sending all the hardware to an off-site recycler. Which of the following is the BEST method for the administrator to ensure no company data will be exposed before sending drives to the recycler?

A.

Delete both the files and the folders from the hard drives, and then send them to the recycler

B.

After logging out and powering down the server, send the drives to the recycler

C.

Format all drives using the OS, and then send the drives to the recycler

D.

Physically destroy the drives, and then send the drives to the recycler

Full Access
Question # 20

A datacenter customer reports the servers are having hardware failures at an unusual rate. A server technician is dispatched to the datacenter floor and notices several racks have condensation on their cold-side doors. Which of the following is the technician likely to report as the MOST likely cause of the hardware failures?

A.

Cooling failure

B.

Overheating

C.

Power surge

D.

Humidity controls

Full Access
Question # 21

Which of the following is used in a server to ensure proper cooling and airflow when components are removed?

A.

Heatsink

B.

Voltage regulator

C.

Baffles

D.

Liquid cooling

Full Access
Question # 22

A user is unable to save an image file to the home directory on a server. The server technician checks the disk space and ACL on the user’s home directory and finds that the user has enough space and required access to write to the directory. Which of the following is the MOST likely reason why the user is unable to save the file?

A.

The user is attempting to save a file with a prohibited file extension.

B.

There are too many open files on the server.

C.

The user does not have permission to save files to the server.

D.

The hard drive containing the user’s home directory is failing.

Full Access
Question # 23

After installing a 1 TB hard drive, a technician notices the OS is reporting significantly less unformatted capacity than was expected. Which of the following is the root cause?

A.

NTFS is using up capacity

B.

The OS is reporting raw capacity

C.

The OS is reporting capacity using base 2 numbers

D.

There was old data previously stored on the drive

Full Access
Question # 24

A server has two power supplies. If power is lost to the second power supply, which of the following will occur?

A.

The server will gracefully shut down

B.

The server will remain in operation

C.

The automatic transfer switch will bring in generator power

D.

The UPS will exceed maximum load

Full Access
Question # 25

A small office has installed a server inside a writing closet. Users report losing connectivity to the server at various times throughout the day. Which of the following should have been considered before installing the server to prevent this issue from occurring?

A.

Airflow

B.

Redundant power

C.

Antivirus software

D.

Chassis lock

Full Access
Question # 26

An administrator is setting up LDAP in the environment to allow directory services authentication and login, and wants to allow secure connection only. Which of the following network ports should be allowed on the internal and external firewalls?

A.

443

B.

989

C.

3268

D.

3389

Full Access
Question # 27

An administrator is asked to change a configuration using a GUI on a Windows server, but does not have access to a KVM. Which of the following is BEST to make the change?

A.

SSH

B.

SCP

C.

RDP

D.

NTP

Full Access
Question # 28

In order for a server to fully function as a web server, which of the following default ports should be open? (Select TWO).

A.

22

B.

80

C.

443

D.

445

E.

631

F.

8080

Full Access
Question # 29

Network devices between two firewalls are included in which of the following?

A.

VPN

B.

SAN

C.

VLAN

D.

DMZ

Full Access
Question # 30

Which of the following are required characteristics of database servers in high transaction environments? (Select THREE).

A.

Two-factor authentication

B.

High bandwidth

C.

Higher RPM drives

D.

Load balancing

E.

High latency

F.

Hotswappable drives

G.

Encryption

Full Access
Question # 31

An administrator is tasked with deploying a server in a telephone switching station. Which of the following voltages will MOST likely be available at the facility?

A.

-48VDC

B.

120VDC

C.

220VAC

D.

440VAC

Full Access
Question # 32

An administrator is updating the server infrastructure at a company's disaster recovery site. Currently, an enormous amount of effort is required by the administrator to replicate operations. Which of the following types of site is the administrator currently using?

A.

Cold site

B.

Hot site

C.

Warm site

D.

Replication site

Full Access
Question # 33

Which of the following is the MOST redundant power solution?

A.

Two power supplies, each hooked up to individual legs of one 3-phase circuit.

B.

Two power supplies, each hooked up to the same 1-phase circuit.

C.

Two power supplies, each hooked up to separate 1-phase circuits.

D.

One power supply hooked up to two 1-phase circuits.

Full Access
Question # 34

Which of the following is the purpose of an NTP server?

A.

For hosting instant messaging applications

B.

For synchronizing clocks on network devices

C.

For file sharing and collaboration

D.

For hosting newsgroups

Full Access
Question # 35

Which of the following methods should a technician perform to properly clear a hard drive before disposal?

A.

Delete the FAT

B.

Zero all block sectors

C.

Delete the partition

D.

Zero the NTFS journal

Full Access
Question # 36

A server administrator is configuring a new server for an organization. The server will function as a firewall and proxy server, as well as provide NAT services for other devices on the network. Which of the following BEST describes how the network hardware on the server should be configured?

A.

The server should have at least two NICs: one configured with an IP address on the inside network, and one with an IP address on the outside network.

B.

The server should have at least two NICs: each NIC should be configured with an IP address on the same network segment.

C.

The server requires only one NIC, as the NIC can be configured with two IP addresses: one for the inside network segment, and one for the outside network segment.

D.

The server requires at least three NICs: one configured with an IP address for the intranet clients, one with an IP address on the inside network, and one with an IP address on the outside network.

Full Access
Question # 37

A system administrator needs to directly control a server that has no network connectivity. Which of the following should be used to accomplish this?

A.

SSH

B.

KVM

C.

RDP

D.

iLO/iDRAC

Full Access
Question # 38

Maintaining operations in the event of a complete power outage requires a tested and established:

A.

hardware maintenance plan

B.

site recovery plan

C.

business continuity plan

D.

incident response plan

Full Access
Question # 39

A systems administrator is troubleshooting a server that will not turn on. The LED lights are not blinking, and no status light indicators are available. The administrator has checked the PDU and UPS to verify proper functionality. Which of the following components is the MOST likely cause of this problem?

A.

NIC failure

B.

Memory failure

C.

CPU failure

D.

Power supply failure

Full Access
Question # 40

Which of the following can limit cabling mistakes?

A.

Proper labeling

B.

Asset management

C.

Keeping good vendor logs

D.

Keeping up-to-date repair logs

Full Access
Question # 41

Which of the following file types can Microsoft servers package for remote installation by default?

A.

.exe

B.

.ini

C.

.msi

D.

.dll

Full Access
Question # 42

A technician has traveled to a company's alternate site to assess current operations of the network infrastructure. Following the assessment, the technician has informed management that everything is operational, with all applications and data mirrored. Which of the following types of site does the company have?

A.

Warm site

B.

Cold site

C.

Hot site

D.

Standby site

Full Access
Question # 43

A technician receives an error message when trying to boot the server stating the operating system was not found. Change management logs indicate a new hard drive backplane was installed in the server last night. Which of the following should the technician do FIRST when troubleshooting the issue?

A.

Check system board cables

B.

Rebuild RAID array

C.

Reinstall server OS

D.

Remove newly installed hardware

Full Access
Question # 44

A server administrator is setting up a new set of hosts for an application that requires communication between all the hosts on a dedicated private subnet. Initially, the configuration consists of four hosts and is expected to grow to 48 total as the application is implemented for the entire company. When configuring the private subnet, which of the following CIDR netmasks would allow for the full number of hosts once the application is fully in production with the least number of unused addresses allocated?

A.

/25

B.

/26

C.

/27

D.

/28

Full Access
Question # 45

When troubleshooting a failed backup, a technician runs the backup using the same tape but on a different tape drive in the same tape library. The backup fails again. Which of the following should be the FIRST item the technician should examine as a failure?

A.

Tape drive

B.

Tape library

C.

Tape media

D.

Tape capacity

Full Access
Question # 46

Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to:

A.

uninstall each server application and reinstall the two new applications.

B.

install another application to see if this improves the server response time.

C.

install antivirus and malware software.

D.

uninstall the newly installed applications one at a time.

Full Access
Question # 47

Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?

A.

Grant appropriate permissions to only users in the Accounting department for both the share and NTFS

B.

Grant all users full control permissions for the share only

C.

Grant the Accounting department full control for the share and appropriate NTFS permissions

D.

Grant modify permissions to the Accounting department and deny NTFS permissions to all other users

Full Access
Question # 48

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?

A.

Store the information encrypted and offline in a storage safe.

B.

Encrypt the information using a zip file with a password.

C.

Utilize a drive with full disk encryption enabled.

D.

Create an encrypted virtual disk for storage.

Full Access
Question # 49

An organization has agreed on the software that will be used to virtualize the company's web servers. Which of the following should the administrator reference prior to purchasing physical servers to be deployed as hosts in the new virtual architecture?

A.

The vendor's software compatibility list

B.

The vendor's service level agreement

C.

The vendor's hardware compatibility list

D.

The vendor's end user licensing agreement

Full Access
Question # 50

A technician is experiencing overheating on a rack mounted server. After powering off and removing the cover of the server, a large amount of dust is noticed on one of the fans. After cleaning out the dust and powering the server back on, the server is still overheating. Which of the following would BEST explain this issue?

A.

The power supply has failed.

B.

The server is using excessive power.

C.

The hard drives are running too hot.

D.

Some of the cooling fans are defective.

Full Access
Question # 51

Clients cannot connect to the network. A technician determines that port 68 is not open. Which of the following protocols is being blocked?

A.

POP3

B.

DNS

C.

LDAP

D.

DHCP

Full Access
Question # 52

An IT manager needs to purchase client access licenses for servers. The network has ten workstations and 100 on-site users. Which of the following licensing models should the systems administrator recommend ?

A.

per user licensing

B.

per CPU licensing

C.

per operating system licensing

D.

per device licensing

Full Access
Question # 53

A manager notices the administrators spend a lot of time running power cords and network cables when installing new servers. The manager wants to reduce the amount of time administrators spend doing the power and network cabling. Which of the following will best allow staff to reduce that time?

A.

Mainframe

B.

Tower

C.

2U rackmount server

D.

Blade server

Full Access
Question # 54

An administrator receives an alert of a failed hardware component in a virtualization host running critical services. Which of the following should the administrator perform BEFORE replacing the failed component?

A.

Migrate all VMs to another host before replacing the failed component.

B.

Shut down all VMs on the host before replacing the failed component.

C.

Reboot all VMs on the host before replacing the failed component.

D.

Suspend all VMs on the host before replacing the failed component.

Full Access
Question # 55

An administrator wants to harden the security on a web server used for e-commerce. A security scanner provides a brief summary of the web server:

The administrator wans to provide better security for data in transit. Which of the following would BEST accomplish this?

A.

Disable SSL 2.0 and 3.0

B.

Use a more secure password hashing algorithm.

C.

Enable disk encryption.

D.

Upgrade the OS to a newer version.

E.

Upgrade the web service to a newer version.

Full Access
Question # 56

An administrator has been given a CIDR/22 IP address block and needs to assign addresses to a multiple of virtual workstations. Which of the following servers will MOST likely perform this task?

A.

DNS server

B.

DHCP server

C.

RAS

D.

WINS server

Full Access
Question # 57

A new server comes with four CPU sockets. Which of the following describes how many dual-core microprocessors will fit on this server?

A.

1

B.

2

C.

4

D.

8

Full Access
Question # 58

A systems administrator wishes to improve security in a datacenter. The administrator wants to be alerted whenever a hard drive is removed from the server room. Which of the following security measures would BEST accomplish this?

A.

RFID chips

B.

Security cameras

C.

Server and cabinet locks

D.

Mantrap

E.

Proximity reader

Full Access
Question # 59

When cabling a rack, which of the following is BEST practice?

A.

Use rack specific cabling hardware

B.

Let cables hang loosely behind the servers

C.

Channel all power cables down the sides, and all network cables down the center

D.

Keep cables close to the front of the rack for better access

Full Access
Question # 60

A Unix server completes POST successfully. The server starts to boot but crashes and halts on a transport error. Which of the following components should a technician check FIRST?

A.

Video card

B.

Cooling fan

C.

Memory module

D.

Hard drive

Full Access
Question # 61

Which of the following protocols utilize SSH and TCP over port 22 for secure communication? (Choose two.)

A.

SFTP

B.

FTP

C.

TFTP

D.

SCP

E.

FTPS

F.

SMTP

Full Access
Question # 62

An administrator needs to install two hard drives in a server and configure the system for maximum

redundancy. Which of the following RAID levels would be BEST suited for the administrator?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 10

Full Access
Question # 63

A USB drive has been purchased to move files between Windows, *nix, and Macintosh servers. Which of the following filesystems is the BEST choice to ensure the drive can read and be written to by all of the servers?

A.

ext2

B.

FAT32

C.

NTFS

D.

UFS

Full Access
Question # 64

A technician is configuring switches with SFP ports on multiple floors in a building. A switch on the first floor must be connected to a switch on the second floor for trunking VLAN traffic. Which of the following would be the MOST appropriate cable type for the technician to use?

A.

Multimode fiber

B.

Coaxial cable

C.

CAT5e rollover

D.

CAT6 straight through

Full Access
Question # 65

A server technician needs to access a remote Unix server for administration. The technician has requested that ports 23, 25, and 161 be opened on the router. After the ports are opened, the technician is still unable to connect to the Unix server. Which of the following ports should be opened on the server to allow for remote administration?

A.

TCP 21

B.

TCP 22

C.

UDP 69

D.

TCP 3389

Full Access
Question # 66

When looking at an organization's file server configuration, an IT manager determines that several outages are tied to a lack of redundancy in the disk controller configuration. Which of the following features would the IT manager look for in a new configuration to correct this?

A.

Disk shadowing

B.

RAID 0

C.

Remote journaling

D.

Electronic vaulting

E.

Disk duplexing

Full Access
Question # 67

A technician needs to install six blade servers. Which of the following MUST a technician install along with the blades?

A.

Blade rail kits

B.

Blade shelves

C.

Blade enclosure

D.

Blade station

Full Access
Question # 68

Which of the following is a reason to have a remote cold site readily available in case of a disaster in the primary datacenter?

A.

It provides a company with a redundant location that mirrors the primary datacenter hardware but requires no data restoration.

B.

It provides a company with a backup location to install the necessary equipment to restore critical services.

C.

It provides a company with a backup location equipped with resources necessary for immediate restoration of critical services.

D.

It provides a company with a redundant location that mirrors the primary datacenter hardware and data.

Full Access
Question # 69

An administrator needs to control servers locally via a console. The administrator wants a rack mounted solution for easy access. Which of the following should be installed?

A.

iDRAC

B.

KVM

C.

ILO

D.

RDP

Full Access
Question # 70

A technician performs monthly backups on a file server to a NAS device that can hold 1TB of data. The size of the monthly backups has been as follows:

Month 1 = 50GB

Month 2 = 65GB

Month 3 = 80GB

Starting with Month 1, based on the current rate of growth, in how many months will the NAS run out of available storage space?

A.

4

B.

5

C.

9

D.

11

Full Access
Question # 71

Which of the following is the MOST secure to erase data before disposal of server hard drives?

A.

Hard wipe

B.

Reformat

C.

Degaussing

D.

Delete partitions

Full Access
Question # 72

Which of the following expansion slots is 64-bit?

A.

PCIx

B.

PCI

C.

ISA

D.

PCIe

Full Access
Question # 73

The last available backup is from 12 months ago. Which of the following should an administrator perform prior to applying a critical application patch to a guest OS? (Choose two.)

A.

Full backup

B.

Database snapshot

C.

Incremental backup

D.

Virtual machine snapshot

E.

File system copy

Full Access
Question # 74

A server technician has changed a hard disk in a RAID 5 array. The array status is now reported as being in a

“degraded” state. Given this scenario, which of the following should the technician do NEXT?

A.

Monitor the database index

B.

Monitor the array rebuild

C.

Rebuild the filesystem table

D.

Rebuild the boot sector

Full Access
Question # 75

A security administrator is investigating strange network behavior on a single VLAN that is used only by vendors. Which of the following tools would BEST allow the administrator to look at network traffic and investigate specific packets?

A.

Port scanner

B.

Cipher

C.

Sniffer

D.

Checksum

Full Access
Question # 76

A server technician is troubleshooting an issue regarding users who are not able to access a reporting server. The reporting server has a static IP address and is connected to a Windows domain. The technician attempts steps to narrow down the issue:

  • Pings the hostname but is not successful
  • Pings the IP address and is successful
  • Verifies the IP and DNS settings on the NIC card are okay

Which of the following should the technician do NEXT?

A.

Perform a tracert to the hostname and IP address.

B.

Reboot the computer to apply security updates to the system.

C.

Verify the DNS A record for the hostname of the server.

D.

Update the DNS configuration on the host NIC card to localhost for lookups.

E.

Perform an ipconfig on the host to verify the IP configurations.

Full Access
Question # 77

An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?

A.

The administrator improperly configured the virtual memory settings on the server.

B.

The administrator is using incorrect patch switches for the install.

C.

The administrator is trying to install security patches for software that is not installed.

D.

The administrator is trying to install patches that require hard drive encryption on the server.

Full Access
Question # 78

A server administrator is gathering full datacenter inventory of all the server hardware to submit to the IT manager for next year’s budget for a technology refresh project. Which of the following life-cycle management stages is this?

A.

Procurement

B.

Usage

C.

Disposal

D.

End-of-life

Full Access
Question # 79

A systems administrator is tasked to add an existing user to an existing group on a local Linux system. Which of the following files should be edited to accomplish this task?

A.

/etc/group file

B.

/etc/passwd file

C.

/etc/hosts file

D.

/etc/group_membership file

Full Access
Question # 80

A company has a corporate office building that is used by 50 to 100 unique visitors each day for meetings. Users routinely report that they are unable to access the network with their laptops when visiting this location.

The help desk reports that these users are not getting IP addresses automatically assigned.

After an investigation, the server administrator has determined that the DHCP service is functioning, but a minimal number of addresses are available for lease.

The building is on its own class C subnet and has 250 addresses in the scope. Which of the following represents a long term solution tothe problem?

A.

Manually delete address leases from DHCP.

B.

Create reservations in DHCP for users frequently visiting this location.

C.

Assign static IP addresses to visiting laptops.

D.

Reduce the lease duration in the DHCP scope options to one day.

Full Access
Question # 81

A server with a large amount of storage but not necessarily a very fast CPU would be BEST suited for which of the following applications?

A.

DNS server

B.

File server

C.

DHCP server

D.

Proxy server

Full Access
Question # 82

A technician troubleshooting a mail server determines that the server is low on available hard drive space and needs an additional hard drive installed. The server will need to be offline for the hardware installation. Which of the following troubleshooting steps should the technician do NEXT?

A.

Notify impacted users of the scheduled maintenance.

B.

Implement one change at a time.

C.

Collect additional information.

D.

Document findings, actions, and outcomes.

Full Access
Question # 83

Which of the following methods should be used when classified or sensitive data is stored on a server?

A.

Directory encryption

B.

Whole disk encryption

C.

File encryption

D.

Partition encryption

Full Access
Question # 84

Which of the following server types stores the list of network usernames and passwords required for authentication?

A.

File server

B.

Directory

C.

DHCP

D.

SNMP

Full Access
Question # 85

A company has 700 servers installed in 50 server racks in the datacenter. The Chief Technology Officer issued a memorandum to the IT department with a directive to reduce power and cooling consumptions by 50% in the datacenters. Which of the following should the system administrators recommend?

A.

Implement 208V 3-phase servers

B.

Implement hot aisle / cold aisle

C.

Virtualize the servers in the datacenter

D.

Replace each server with a blade server

Full Access
Question # 86

Which of the following protocols is used primarily for monitoring and managing network devices?

A.

SNMP

B.

SMTP

C.

FTPS

D.

NTP

Full Access
Question # 87

A server administrator is creating a design for a new datacenter. The servers should be configured for maximum availability and also provide caching for user information requests. Which of the following techniques should be used?

A.

Active/Passive

B.

Round robin

C.

Heartbeat

D.

Active/Active

E.

Passive/Passive

Full Access
Question # 88

The logs on a server in a datacenter indicate that the server unexpectedly shut down minutes after the night cleaning crew started their shift. Which of the following is the MOST likely reason for the shut down?

A.

A hard disk on the server failed.

B.

A power surge occurred.

C.

The CPU on the server overheated.

D.

A memory module on the server failed.

Full Access
Question # 89

A host server in a small business environment does not have virtual switching configured. The NIC on a guest is configured with an IP address that is on a different subnet from the host server. Which of the following would MOST likely happen in this case?

A.

The guest will not have network access to the host or network resources.

B.

The guest would have access to all network resources.

C.

The guest would have network access to everything but the host.

D.

The guest will have network access to the host server.

Full Access
Question # 90

A user reports that a script \\Server\Share\Runme.bat, which is run on a daily basis, cannot be accessed. Which of the following is the FIRST step to take in resolving this issue?

A.

Check the network cable.

B.

Ping the gateway.

C.

Verify the workstation IP address.

D.

Ping the server.

Full Access
Question # 91

A system administrator has just performed a backup. Which of the following should the administrator perform to easily identify the backup tape?

A.

Label the tape

B.

Mount the tape in the drive

C.

Place the tape in the rack

D.

Update the site log

Full Access
Question # 92

An administrator purchases a new server, which contains only one Xeon processor. This server is also known as a:

A.

load balancing server.

B.

multicore server.

C.

redundant server.

D.

single-core server.

Full Access
Question # 93

Users in the accounting department report that they are unable to access a shared network drive used by all departments. Upon troubleshooting, a technician determines that three users in the marketing department, two in sales, five in human resources, and ten in IT are all successfully accessing the shared network drive. Which of the following is MOST likely causing the issue?

A.

Corrupt user profiles

B.

Incorrect NTFS group permissions

C.

The share is unsecured

D.

Excessive page filing on server

Full Access
Question # 94

Which of the following power plug types would MOST likely be found in a medical facility?

A.

Tip/Ring/Sleeve

B.

Speed lock

C.

Tip/Ring

D.

Twist lock

Full Access
Question # 95

A server administrator is deploying a new database server and wishes to maximize the number of IOPS. Which of the following disk types would BEST accomplish this goal?

A.

500 GB SATA SSD drives

B.

600 GB 15000 rpm SAS drives

C.

800 GB 10000 rpm SAS drives

D.

1 TB 7200 rpm SATA drives

Full Access
Question # 96

An administrator is installing a server to be used to dynamically assign IP addresses to the network devices. Which of the following server roles must be used?

A.

RAS

B.

DNS

C.

DHCP

D.

WINS

Full Access
Question # 97

A user cannot save a 2 GB file to a file server. A technician determines that permissions are correct and the file system has 10 MB of available space for new files. The technician wants to enable compression as a short-term fix. Which of the following should the technician do FIRST?

A.

Free enough disk space to hold the largest file’s uncompressed size

B.

Decrease the amount of system CPU and memory requirements

C.

Encrypt the file system on the server

D.

Install at least enough memory to hold the largest file’s uncompressed size

Full Access
Question # 98

Which of the following memory technologies has the HIGHEST cost to implement?

A.

ECC

B.

RAID

C.

Pairing

D.

Registered

Full Access
Question # 99

A technician notices inlet temperatures to rack-mounted servers are significantly higher in the center of the rack as compared to the top and bottom of the rack. Which of the following is the MOST likely reason?

A.

Lack of front-mounted blanking panels

B.

Too much humidity in the room

C.

Room temperature set too high

D.

Air conditioning units sized incorrectly

Full Access
Question # 100

Which of the following are the MOST appropriate permissions to set on files required to be publicly accessible but only modified by the file’s original owner?

A.

rw-rw-r--

B.

r--r--r--

C.

rwxrwxr--

D.

rwxrwxr-x

Full Access
Question # 101

A new server has a battery-backed RAID controller built onto the motherboard. Which of the following will occur if the RAID controller fails?

A.

The array configuration information will be lost.

B.

The battery will provide enough power to save the array information.

C.

All data stored on the array is lost.

D.

The array will continue to function in a degraded state.

Full Access
Question # 102

An administrator has purchased monitoring software that can be configured to send alerts when hardware and applications are having issues. Which of the following must be installed on the monitoring server so that it can properly monitor details on vendor specific devices?

A.

MIBs

B.

SMTP

C.

WMI

D.

DHCP

Full Access
Question # 103

An administrator has been tasked with making recommendations for purchasing disks that will support a transactional database where performance is of greatest concern and budget is secondary. Which the following disk types should the administrator recommend?

A.

FC

B.

iSCSI

C.

SAS

D.

SATA

Full Access
Question # 104

A user is unable to save an image file to their home directory on a server. The server technician checks the disk space and ACL on the user's home directory and finds that the user has enough space and required access to write to the directory. Which of the following is the MOST likely reason why the user is unable to save the file?

A.

The user is attempting to save a file with a prohibited file extension.

B.

There are too many open files on the server.

C.

The user does not have permission to save files to the server.

D.

The hard drive containing the user's home directory, is failing.

Full Access
Question # 105

A storage administrator needs to connect a server to a storage array shared by 12 other servers. Which of the following interface types could be used to accomplish this connection?

A.

Fibre Channel

B.

SAS

C.

USB

D.

SCSI

Full Access
Question # 106

A new version of the primary OS used by a company has been released. Due to some significant changes in the OS, a system administrator wants to see which remotely accessible services are enabled by default to access the security risk prior to upgrading to the new version. Which of the following utilities should the administrator use?

A.

Cipher program

B.

Port scanner

C.

Telnet client

D.

Packet sniffer

Full Access
Question # 107

An administrator receives multiple reports that users cannot access a secure website hosted on a server the administrator manages. The administrator investigates and discovers that the reason users cannot access the secure site is because:

A.

port 22 is closed.

B.

port 80 is closed.

C.

port 443 is closed.

D.

port 3389 is closed.

Full Access
Question # 108

A newly hired administrator is tasked to change the number of CPUs assigned to a VM. Which of the following if the FIRST step the administrator should do during a scheduled maintenance window?

A.

Create a snapshot.

B.

Back up the host.

C.

Shut down the guest.

D.

Shut down the host.

Full Access
Question # 109

An administrator thinks that a particular network connection is dropping packets. Which of the following tools would the administrator use to BEST identify where the packets are being dropped?

A.

tracert

B.

ping

C.

nslookup

D.

netstat

Full Access
Question # 110

Which of the following BEST describes RAID 0?

A.

Striping with parity

B.

Striping with mirroring

C.

Mirroring

D.

Striping

Full Access
Question # 111

Which of the following services provides users with directory services?

A.

IMAP

B.

LDAP

C.

SFTP

D.

DHCP

E.

DNS

Full Access
Question # 112

Multiple users report that an application attempting to open a file retrieved from a server reports that the file is corrupted. Which of the following applications can be used on the server to verify file integrity?

A.

Checksum

B.

Port scanner

C.

Cipher

D.

Anti-malware

Full Access
Question # 113

Which of the following MUST be configured to automate client deployment over PXE boot? (Choose two.)

A.

DNS PTR record

B.

Domain controller name

C.

TFTP server

D.

DHCP option 66

E.

Web server with OS images

Full Access
Question # 114

An outside contractor is hired to perform a business impact analysis of a simulated disaster. The contractor asks stakeholders what they think a hurricane would do to the business. This is an inadequate method because:

A.

the question is related to disaster recovery, not impact analysis

B.

the question is subjective and does not represent a complete business impact analysis

C.

it is impossible to perform an impact of anything simulated

D.

hurricanes vary in intensity, so the business impact is always unknown

Full Access
Question # 115

Which of the following default ports should be open on a server for remote administration?

A.

TCP 25

B.

TCP 389

C.

TCP 3128

D.

TCP 3389

Full Access
Question # 116

Which of the following troubleshooting methods would be performed after resolving an issue?

A.

Verify system connectivity

B.

Implement the solution

C.

Document findings

D.

Establish theory

Full Access
Question # 117

A technician needs to install another PCle NIC in a server. The server currently has four fully populated PCle slots. Which of the following must the technician install before installing the card?

A.

Install a virtual NIC

B.

Install a riser card

C.

Install a daughtercard

D.

Install a KVM

Full Access