Information Technology > EXAM > CompTIA Server+ Exam Study Guide latest version Solved 100% Correct (All)
An administrator is developing a storage growth plan for a new file server. Which of the following should be implemented on the server so that storage growth is restricted? A. Disk quotas B. Disk c... ompression C. Automatic usage reports D. Automatic defragmentation - ANSWER A. Disk quotas A server administrator is researching the purchase of SSD for a server. The administrator receives a report from the datacenter technician detailing current storage requirements and future growth planning estimates as follows: ServerA: Current-15TB-Future-50% growth ServerB: Current-20TB-Future-80% growth Based on this report, which of the following represents the MINIMUM storage requirements needed? A. ServerA-18TB, ServerB-24TB B. ServerA-22TB, ServerB-22TB C. ServerA-23TB, ServerB-36TB D. ServerA-25TB, ServerB-40TB - ANSWER C A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task? A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT - ANSWER A A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences? A. Disable any unused physical ports until needed B. Implement a BIOS password on all the servers C. Install chassis locks on all the servers D. Restrict usage of flash drives in company policy - ANSWER A Network devices between two firewalls are included in which of the following? A. VPN B. SAN C. VLAN D. DMZ - ANSWER D. DMZ A system administrator is tasked with dividing the network so that each department is separate from the other. Which of the following should be used to accomplish this task? A. VLAN B. VPN C. VNC D. VM - ANSWER A. VLAN Which of the following provides two-factor authentication? A. Bank card and PIN. B. Username and password. C. Fingerprint and iris scan. D. Key and proximity badge. - ANSWER A. Bank card and PIN. Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)? A. Store the information encrypted and offline in a storage safe. B. Encrypt the information using a zip file with a password. C. Utilize a drive with full disk encryption enabled. D. Create an encrypted virtual disk for storage - ANSWER A Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department? A. Grant appropriate permissions to only users in the Accounting department for both the share and NTFS B. Grant all users full control permissions for the share only C. Grant the Accounting department full control for the share and appropriate NTFS permissions D. Grant modify permissions to the Accounting department and deny NTFS permissions to all other users - ANSWER A Which of the following methods should a technician perform to properly clear a hard drive before disposal? A. Delete the FAT B. Zero all block sectors C. Delete the partition D. Zero the NTFS journal - ANSWER B. Zero all block sectors A server unexpectedly shut down as a result of overheating. An alert was sent to the administrator's email address but the administrator was away from the workstation when the alert arrived. Which of the following would have been a more effective method for sending the alert notification? A. Broadcast messages B. SMS messages C. Telephone calls D. Console notifications - ANSWER B. SMS messages A server technician in a datacenter configures a daemon to monitor the battery health in a UPS. Over a two day time period, the daemon generates a warning message. Which of the following represents the FIRST action that should be taken by the server technician? A. Perform a test on the UPS batteries B. Immediately replace the UPS batteries C. Move the servers connected to the UPS to another existing UPS D. Immediately replace the UPS with a new UPS - ANSWER A. Perform a test on the UPS batteries A server technician is performing a server installation. This server must be able to resolve host names for users running a variety of client operating systems. At a minimum, which of the following services should be enabled on the new server? (Select TWO). A. NAT B. DNS C. LDAP D. WINS E. SNMP F. DHCP Correct Answer: - ANSWER DNS and WINS A technician has finished installing the operating system on a new server and needs to provide IP addressing information. The server will be connected to the DMZ network. Devices on the network use a default gateway address of 192.168.55.1. Which of the following is a valid IP address for a server in the DMZ network? A. IP: 192.168.55.1, NETMASK 255.255.255.0 B. IP: 192.168.55.5, NETMASK 255.255.255.128 C. IP: 192.168.55.155, NETMASK 255.255.255.128 D. IP: 192.168.55.255, NETMASK 255.255.255.0 - ANSWER B Clients cannot connect to the network. A technician determines that port 68 is not open. Which of the following protocols is being blocked? A. POP3 B. DNS C. LDAP D. DHCP - ANSWER D. DHCP A technician is asked to troubleshoot a server that constantly reboots. There are no error messages displayed on the server. Which of the following should the technician check? A. Cooling failure B. Cable mismatch C. BIOS driver failure D. Port conflict - ANSWER A. Cooling failure A technician receives an error message when trying to boot the server stating the operating system was not found. Change management logs indicate a new hard drive backplane was installed in the server last night. Which of the following should the technician do FIRST when troubleshooting the issue? A. Check system board cables B. Rebuild RAID array C. Reinstall server OS D. Remove newly installed hardware - ANSWER A. Check system board cables A database server stops responding to requests, and the administrator suspects that the server is experiencing memory faults during heavy network traffic and database access. Which of the following is the FIRST troubleshooting step? A. Check the security log. B. Check the application logs. C. Check the debug report. D. Check the POST error log. - ANSWER B. Check the application logs. A technician is troubleshooting a Linux server and wants to inspect the free disk space on the /dev/sda partition of the system. Which of the following command line tools should the administrator run to view available disk space on the partition? A. dd B. du C. ls D. df - ANSWER D. df A system administrator notices that a server is consistently getting slower and less responsive the longer it has been since the last reboot. Once the server is rebooted, the system performs at the expected baseline, but starts slowing down again until the system is unresponsive. Which of the following is the MOST likely cause of this problem? A. OS performance misconfiguration B. Service/application memory leak C. Incorrect server resource specifications D. Corrupted application files - ANSWER B. Service/application memory leak Users on a network segment report that they are unable to connect to a newly installed file server. The file server IP address settings are as follows: IP address: 10.0.10.254 Subnet Mask: 255.255.255.0 Default Gateway: 10.10.10.1 Which of the following changes should the server administrator make? A. Change the IP address on the server to 10.10.0.254. B. Change the IP address on the server to 10.10.10.254. C. Change the default gateway on the server to 10.10.10.254. D. Change the subnet mask on the server to 255.255.0.0. - ANSWER B A new DHCP server is placed on a network segment during off hours. When work resumes, users on a different network segment report connectivity issues. Users on the same network segment report no connectivity issues. Which of the following is the MOST likely reason for the connectivity issues? A. The DHCP server was configured without specifying a WINS server address for the users. B. The DHCP server was configured without specifying a DNS server address for the users. C. The DHCP relay agent was not configured on the adjacent network segment. D. The DHCP server was configured to use private IP addressing to all network segments. - ANSWER C A server administrator is notified that all three hard disks in a server array have failed. Which of the following is the MOST likely cause? A. Incompatible BIOS B. Backplane failure C. Cache battery failure D. Incorrect firmware version - ANSWER B. Backplane failure When troubleshooting a failed backup, a technician runs the backup using the same tape but on a different tape drive in the same tape library. The backup fails again. Which of the following should be the FIRST item the technician should examine as a failure? A. Tape drive B. Tape library C. Tape media D. Tape capacity - ANSWER C. Tape media An administrator is securing a secure web server by disabling ports. After completing this process, clients cannot access the secure web server. The administrator should now go back and verify whether which of the following ports is enabled? A. 23 B. 389 C. 443 D. 445 - ANSWER C. 443 A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access. Which of the following could validate this hypothesis? A. Port scanner B. Cipher tools C. Checksum analyzer D. TDR - ANSWER A. Port scanner Users report that an application is unable to connect to a server on the same network segment. Which of the following is the MOST likely reason? A. The external firewall is preventing access to the server. B. The DMZ is incorrectly configured. C. The syslog server detects malware on the server. D. The application is using a port that is closed on the server - ANSWER D A technician is replacing a faulty NIC in a server. According to best practices, which of the following should be used to configure the IP address on the server? A. DNS reservation B. DHCP IP address C. DHCP reservation D. Static IP address - ANSWER D. Static IP address A technician needs to add a processor to a server. Which of the following specifications should the technician examine? (Select THREE). A. Bus multiplier B. Processor speed C. Socket type D. Processor stepping E. L3 cache size F. Thermal specifications - ANSWER protocol speed, socket type, procesor stepping A server's runtime during power outages is too short to shut down properly. A system technician is asked to remediate the problem. Which of the following would be the result of adding additional batteries to the UPS? A. Increased load balancing B. Extended uptime C. Greater efficiency D. Increased power output - ANSWER B. Extended uptime A system administrator wants to assure that a server is responsive. Which of the following networking tools should the administrator use to verify network connectivity? A. arp B. netstat C. ipconfig D. ping - ANSWER D. ping Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to: A. uninstall each server application and reinstall the two new applications. B. install another application to see if this improves the server response time. C. install antivirus and malware software. D. uninstall the newly installed applications one at a time. - ANSWER D Which of the following is the core software application that manages computer virtualization? A. Hypervisor B. Hyperthreading C. Console D. KVM - ANSWER A. Hypervisor Which of the following is a requirement for a server to allow guests to be installed on a hypervisor host? A. Processors with multiple cores B. Processors with available cache C. Processors that support virtualization D. Processors that support hyperthreading - ANSWER C. Processors that support virtualization Swap space or page file is reserved on the: A. motherboard. B. memory. C. hard disk. D. CPU. - ANSWER C. hard disk. An administrator needs to deploy 1000 servers in a short period of time. Which of the following deployment methods will expedite the OS installations? A. Use disk duplicating software. B. Use USB disk images to deploy servers. C. Use a disk replicator. D. Use PXE boot to retrieve an image. - ANSWER D A network administrator is installing additional devices on the network. Currently, the network segment is utilizing all allocated IP addresses. If there are additional addresses available, which of the following would be BEST for the network administrator to perform to accommodate the new network devices? A. Create a new DHCP scope for the network segment in question. B. Configure the DHCP server for IPv6. C. Configure the network to use NAT for the network segment in question. D. Increase the size of the DHCP scope for the network segment in question. - ANSWER D Which of the following allows virtual machines to share the NIC of the host? A. Virtual LANs B. NAT C. Bridging D. Virtual NICs - ANSWER C. Bridging An administrator is asked to change a configuration using a GUI on a Windows server, but does not have access to a KVM. Which of the following is BEST to make the change? A. SSH B. SCP C. RDP D. NTP - ANSWER C. RDP Several of the finance department computers are experiencing timeouts while in their financial program. The program will not open or close; however, the previous day the program was running without issues. Which of the following is MOST likely the cause of this problem? A. Service priority B. Rogue processes C. Firewall problem D. Processor affinity - ANSWER B. Rogue processes A number of users are indicating that access to a network file server is responding very slowly when reading or writing to the share. The server administrator notes that a drive has failed in a four-disk RAID 5 array. The array is running in a degraded state because no hot spare was configured. After replacing the failed disk, which of the following steps would be BEST to take to prevent slow response after a drive failure? A. Add a drive to the array, but do not configure it as a hot spare. B. Add an additional hard drive, and convert the volume to a RAID 6 configuration. C. Add an additional hard drive, and convert the volume to a RAID 10 configuration. D. Add a drive to the array, and configure it as a cold spare. - ANSWER B A server has been assigned a role of mail server. Which of the following services will be installed as a result of this selection? A. SNMP B. SMTP C. TCP D. DHCP E. SFTP - ANSWER B. SMTP Which of the following server types stores the list of network usernames and passwords required for authentication? A. File server B. Directory C. DHCP D. SNMP - ANSWER B. Directory A company is being audited by its operating system vendor. The company needs to report the number of operating systems in use, the versions of the operating systems, and the product keys. Which of the following will be MOST helpful in passing the audit? A. Asset management documentation B. Change management logs C. Service manuals D. Server baselines - ANSWER A. Asset management documentation A system administrator notices that there is a low level of available storage space on a file server. Which of the following should be implemented to limit the amount of storage space users can utilize on the file server? A. Disk shadowing B. Disk compression C. Disk quota D. Disk indexing - ANSWER C. Disk quota Which of the following is the MOST secure to erase data before disposal of server hard drives? A. Hard wipe B. Reformat C. Degaussing D. Delete partitions - ANSWER C. Degaussing Users in the accounting department report that they are unable to access a shared network drive used by all departments. Upon troubleshooting, a technician determines that three users in the marketing department, two in sales, five in human resources, and ten in IT are all successfully accessing the shared network drive. Which of the following is MOST likely causing the issue? A. Corrupt user profiles B. Incorrect NTFS group permissions C. The share is unsecured D. Excessive page filing on server - ANSWER B. Incorrect NTFS group permissions A network administrator is tasked to set up zoning for a SAN infrastructure that requires redundancy. Which of the following types of hardware should the administrator implement? A. Multiple VLANs B. Multiple host nodes C. Multiple HBAs D. Multiple routers - ANSWER C. Multiple HBAs The logs on a server in a datacenter indicate that the server unexpectedly shut down minutes after the night cleaning crew started their shift. Which of the following is the MOST likely reason for the shut down? A. A hard disk on the server failed. B. A power surge occurred. C. The CPU on the server overheated. D. A memory module on the server failed. - ANSWER B. A power surge occurred. A technician reads a hardware manufacturer's blog indicating a critical firmware update is available for the company's file server. Which of the following is the BEST course of action? A. Download and install a firmware update from a centralized server. B. Download the firmware update and test it on a VM. C. Download the firmware update and test it on a non-production server. D. Download the firmware update and run it on the company's file server immediately - ANSWER C A system administrator is tasked to set up a file server. The file server must be able to support access control lists and logging for auditing purposes. To meet these requirements, with which of the following file system types should the administrator format the file system? A. SMB B. NTFS C. VMFS D. CIFS - ANSWER B. NTFS A user reports that a script \\Server\Share\Runme.bat, which is run on a daily basis, cannot be accessed. Which of the following is the FIRST step to take in resolving this issue? A. Check the network cable. B. Ping the gateway. C. Verify the workstation IP address. D. Ping the server - ANSWER D. Ping the server After a migration to a new server, users report that they are unable to save files to their home directories. A check of the permissions on the home directories indicate that the permissions are set as follows: User: r-x Group: r-- Other: r-x A server administrator verifies the correct user and group ownership of the home directories. Which of the following will MOST likely resolve the issue? A. Add the w permission for the users. B. Add the x permission for the group. C. Remove the x permission for other. D. Remove the r permission for the group. - ANSWER A Which of the following is the MOST complex way to directly reduce heat for computing components? A. Liquid cooling units B. Integrated high RPM fans C. Directed airflow with baffles D. Hot aisle/cold aisle - ANSWER A. Liquid cooling units A datacenter is in a geologically active area and has no earthquake abatement installed. Which of the following drive types is BEST for general server use? A. Solid state drives B. High RPM drives C. Low RPM drives D. USB drives - ANSWER A. Solid state drives Which of the following server types requires the LARGEST amount of available hard drive space? A. Database server B. Remote access server C. Print server D. Directory server - ANSWER A. Database server A technician is configuring switches with SFP ports on multiple floors in a building. A switch on the first floor must be connected to a switch on the second floor for trunking VLAN traffic. Which of the following would be the MOST appropriate cable type for the technician to use? A. Multimode fiber B. Coaxial cable C. CAT5e rollover D. CAT6 straight through - ANSWER A. Multimode fiber A system administrator is tasked to setup a database server with failover clustering feature enabled. One of the requirements is to have one database running at all times with data being synchronized and replicated to the idle database in case the primary database server fails. Both servers will be monitored by a witness on a LUN. Which of the following cluster techniques should be implemented to meet these requirements? A. Active/Active B. Active/Passive C. Single Local Quorum D. Passive/Passive E. Shared Multiple Quorum - ANSWER B. Active/Passive A server technician is tasked to replace a RAID controller battery on a server. The server technician has no prior experience replacing a RAID controller battery. Which of the following should the server technician do to obtain the required knowledge or procedures to replace the battery? A. Review software specifications B. Review architecture diagrams C. Review service manuals D. Review service logs - ANSWER C. Review service manuals [Show More]
Last updated: 2 years ago
Preview 1 out of 47 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Oct 17, 2022
Number of pages
47
Written in
This document has been written for:
Uploaded
Oct 17, 2022
Downloads
0
Views
42
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·