Computer Science > QUESTIONS & ANSWERS > International Institute of Management Studies, Pune: COMPUTING Exam Review. Over 100 MCQ With Answer (All)
Q80. IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this serv... er has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three) a. Run a vulnerability scanner on the server b. Repartition the hard drive that houses the database. c. Patch the vulnerability d. Enable a host firewall e. Reformat the os on the server f. Update the antivirus software g. Remove the database software h. Air gap the server from the network Q79. A sever administrator is installing a new server in a data center. The administrator connects the server to a midpoint but does not connect any cables. Which of the following types of server is the administrator most likely installing? a. Rack b. Virtual c. Tower d. Blade Q78. A server administrator is taking advantage of all the availability of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize? a. Fail over b. Fault tolerance c. Load balancing d. Link aggregation Q77. A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would most likely help the analyst determine if the applications are running? a. User account control b. Anti-malware c. A sniffer d. A port scanner Q76. A technician has received tickets reporting a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time? a. Log rotation b. Alertsc. Reports d. Log shipping Q75. A server administrator needs to deploy five vms, all of which must have the same type of configuration. Which of the following would be the most efficient way to perform this task? a. Snapshot a VM b. Use a physical host c. Perform a P2V conversion d. Use a VM template Q74. A data center technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle reports. The technician confirms none of the configurations have changed, and the load on the server is steady from startup until the crash. Which of the following will most likely resolve the issue? a. Reseating any expansion cards in the server b. Replacing the failing hard drive c. Reinstalling the heat sink with new thermal paste d. Restoring the server from the latest full backup Q73. A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be most appropriate to facilitate this implementation? a. Security guards b. Security cameras c. Bollards d. A mantrap Q72. A very old pc is running a critical, proprietary application in MS-DOS. Administrator are concerned about the stability of this company. Installation media has been lost, and the vendor is out of business. Which of the following would be the best course of action to preserve business continuity? a. Perform schedule chkdsk tests. b. Purchase matching hardware and clone the disk c. Upgrade the hard disk to ssd d. Perform quality backups. Q71. Which of the following backup types only records changes to the data blocks on virtual machine? a. Differential b. Snapshot c. Incremental d. Synthetic full Q70. An administrator notices that a file server is filling up quickly but has many of the same files in different directories. Which of the following storage management techniques would resolve this issues?a. Provisioning b. Encryption c. Deduplication d. Partitioning Q69. A system administrator is troubleshooting performance issues on a storage on a RAID 50 array. Resource utilization on the server is the following: CPU usage = 23% RAM = 95% Network I/O = 125Mbs IOPS = 30,500 Disk usage = 43% Which of the following options will best resolve the performance issues? a. Switch from iSCSI to FCoE as the storage protocol. b. Increase IOPS available to the iSCSI LUN on the storage device. c. Upgrade to a 10G connection d. Change the RAID array from RAID 50 to RAID 60. e. Increase the amount of RAM on the system Q68. A technician is working on a linux server and is trying to access another server over the network. The technician gets server not found messages when trying to execute ping servername but no error messages when using ping servername.domain.com which of the following should the technician do to resolve the error? a. Configure the domain search variable b. Change the permission on resolv.conf c. Configure the DNS address d. Modify nsswitch.conf. Q67. A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate? a. Set up the warm site as a DR cold site b. Set up a DR site that is in the cloud and in the same region. c. Set up the warm site as a DR hot site. d. Set up a DR site that is geographically located in another region. Q66. A server administrator is deploying a new server that has two hard drives on which to install the os. Which of the following RAID configurations should be used to provide redundancy for the SO? a. Raid 0 b. Raid 1 c. Raid 5d. Raid 6 Q65. A technician runs tops on a dual-core server and notes the following conditions: Top—14:32:27, 364 days, 14 users load average 60.5 12.4 13.6 Which of the following actions should the administrator take? a. Schedule a mandatory reboot of the server. b. Wait for the load average to come back down on its own. c. Identify the runway process or processes. d. Request that users log off the server. Q64. A linux server was recently updated. Now, the server stops during the boot process with a blank screen and an fs> prompt. Which of the following is the most likely cause of this issue? a. The system is booting to a usb flash drive. b. The uefi boot was interrupted by a missing linux boot file. c. The bios cloud not find a bootable hard disk d. The bios firmware needs to be upgraded. Q63. A server administrator encounters some issues with the server os after applying monthly patches. Which of the following troubleshooting steps should the administrator perform? a. Implement rollback procedures b. Upgrade the drivers c. Reinstall the os d. Reboot the server. Q62. A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will most likely be installed on the server? a. Print b. File c. Database d. Messaging Q61. Which of the following is the most secure method to access servers located in the remote branch offices? a. Use an MFA out-of-band solution. b. Use a telnet connection c. Use a password complexity policy d. Use a role-based access policy Q60. Users report they are unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer’s support website as recommended. It has now been recalled and removed from the website, as the update unintentionally installed unauthorized software after a reboot. When of the following steps should the administrator perform to restore access to the application while minimizing downtime?a. Uninstall recent updates. b. Reimage the server with a different OS c. Run a port scan to verify open ports d. Enables a GPO to uninstall the update e. Scan and remove any malware f. Reformat the server and restore the image from the latest backup Q59. Which of the following would be best to help protect an organization against social engineering? a. More complex passwords b. Recurring training and support c. Single sign-on d. An updated code of conduct to enforce social media. Q58. A server administrator made a change in a server’s bios in an attempt to fix an issue with the os not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do next? a. Reinstall the server os in repair mode while maintaining the data. b. Flash the bios with the most recent version c. Reverse the latest change made to the server and reboot d. Restart the server into safe mode and roll back changes. Q57. Which of the following licensing concepts is based on the number of logical processors a server has? a. Per core b. Per socket c. Per instance d. Per server Q56. A developer is creating a web application that will contain five web nodes. The developer’s main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application? a. Round robin b. Link aggregation c. Network address translation d. Bridged networking Q55. A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do next once the rebuild is finished? a. Restore the server from a snapshot b. Restore the server from backup c. Swap the drive and initialize the disk d. Swap the drive and initialize the arrayQ54. A technician has moved a data drive from a new windows server to an older windows server. The hardware recognizes the drive, but the data is not visible to the os. Which of the following is the most likely cause of the issue? a. The disk uses GPT b. The partition is formatted with ext4 c. The partition is formatted with fat32 d. The disk uses MBR Q53. Joe, a user in the it department, cannot save changes to sensitive file on a linux server. A ls shows the following listing: -rw-r—r l Ann IT 6780 12 june 2019 filename Which of the following commands would best enable the server technician to allow jeo to have access without granting excessive access to others? a. Chmod 777 filename b. Chown Jeo filename c. Chmod g+w filename d. Chgrp iT filename Q52. A systems administrator has several different types of hard drives. The administrator is setting up a NAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use? a. Raid array b. Serial attached SCSI c. Solid-state drive d. Just a bunch of disks Q51. A server technician arrives at a data center to troubleshoot a physical server that is not responding to remote management software. The technician discovers that servers in the data center are not connected to a kvm switch, and their out-of-band management cards have not been configured. Which of the following should the technician do to access the server for troubleshooting purposes? a. Connect the diagnostic card to the pcis connector b. Connect a console cable to the server NIC c. Connect to the server 4. A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password? A. Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.B. Reinstall the OS in overlay mode. Reset the root password from the install GUI screen. C. Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt. D. Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc. 5. Which of the following describes a configuration in which both nodes of a redundant system respond to service requests whenever possible? A. Active-passive В. Failover C. Active-active D. Failback 6. An Administrator is toubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost. The server had redundant power supplies. Which of the fedoweg is the MOST skely cause of this fallure? A. The UPS batteries were overcharged B. Redundant power supplies require 220V power C. Both power supplies were connected to the same power feed D. The power supplies were not cross-connecte 7. A server administrator has received calis regarding latency and performance issues with a file server. After reviewing all logs and server features, the administrator discovers the server with four Ethernet ports. But only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address? A. Network address translation B. in-band management C. Round robin D. NIC Teaming 8. A server technician needs to ensure the physical host machines in a company's data center will remain up during a power loss. After setting up the design, the technician tests the solution, but it fails. Which of the following should the technician do in the event of a power loss?A. Ensure each physical host is connected to a UPS. B. Install surge protectors on all the physical hosts C. Plug all the physical hosts into a power strip. D. Use a separate circuit for each physical host. 9. A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will MOST likely resolve this issue? A. Increasing IOPS by implementing flash storage B. Implementing deduplication on the storage C. Extending capacity by installing a 4TB SATA disk D. Reformatting the disk as FAT32 10. A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.224 D. 255.255.255.252 11. An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize? A. Anti-malware B. Nbtstat C. Port scanner D. Sniffer 12. A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country? A. Configure a firewallB. Close the unneeded ports C. Install a HIDS. D. Disable unneeded services 13. A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen. Which of the following is the NEXT step the administrator should take to diagnose the error without opening the machine? A. Perform a cold reboot. B. Listen for POST code beeps C. Call technical support. D. Check the monitor connection 14. After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue? A. Remove the original network card and attempt to boot using only the new network card. B. Check that the BIOS is configured to recognize the second network card. C. Ensure the server has enough RAM to run a second network card. D. Verify the network card is on the HCL for the OS 15. A technician is able to copy a file to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations? A. An AC B. Antivirus C. DLP D. A firewall 16. A snapshot is a feature that can be used in hypervisors to: A. Roll back firmware updates.B. Restore to a previous version. C. Roll back application drivers. D. Perform a backup restore 17. Which of the following script types would MOST likely be used on a modern Windows server OS? A. Batch B. VBS C. Bash D. PowerShell 18. Users have noticed a server is performing below baseline expectations. While diagnosing the server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on the controller has gone bad. Which of the following is causing the poor performance on the RAID array? A. The controller has disabled the write cache. B. The controller cannot use all the available channels C. The drive array is corrupt. D. The controller has lost its configuration 19. The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Select TWO). A. RFID B. Proximity readers C. Signal blocking D. Camouflage E. Reflective glass F. Bollards 20. An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select TWO). A. 53B. 80 C. 389 D. 443 E. 445 F. 3389 G. 8080 21. Which of the following script types uses commands that start with set-? A. Batch B. Bash C. PowerShell D. JavaScript 22. Which of the following should a technician verify FIRST before decommissioning and wiping a file server? A. The media destruction method B. The recycling policy C. Asset management documentation D. Non-utilization 23. Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage? A. SLA B. BIA C. RTO D. MTTR24. A server administrator has a system requirement to install the virtual OS on bare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO) A. Host B. Template C. Clone D. Type 1 E. Type 2 F. Guest 25. A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data? A. A full, weekly backup with daily open-file backups B. A full, Weekly backup with daily archive backups C. A full, weekly backup with daily incremental backups D. A full, weekly backup with daily differential backups 26. An application server's power cord was accidentally unplugged. After plugging the cord back in, the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of this issue? A. Backplane failure B. CMOS failure C. Misconfigured RAID D. Cache battery failure 27. Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster? A. RTO B. MTBF C. RPO D. MTTR28. An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer turn on. There are two arrays on the failed server. a two-drive RAID O set for the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred? A. A drive failed in the OS array. B. A drive failed and then recovered in the data array C. A drive failed in both of the arrays. D. A drive failed in the data array 29. A technician learns users are unable to log in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional, can communicate over the network, and is configured correctly. However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue? A. A local firewall is blocking authentication requests. B. The users have expired passwords. C. The system clock is off by more than five minutes D. The server has no access to the LDAP host. 30. A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time Which of the following should be implemented to force the employees to enter the data center properly? A. A security camera B. A mantrap C. A security guard D. A proximity card 31. Which of the following backup type’s copies changed data from a server and then combines the backups on the backup target? A. Differential в. IncrementalC. Synthetic full D. Snapshot 32. A technician is creating a network share that will be used across both UNIX and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy? A. ¡SCSI B. CIFS C. HTTPS D. DAS 33. Two developers are working together on a project, and they have built out a set of shared servers that both developers can access over the internet. Which of the following cloud models is this an example of? A. Hybrid B. Public C. Private D. Community 34. A server in a remote data center is no longer responsive. Which of the following is the BEST solution to investigate this failure? A. Remote desktop B. Access via a crash cart C. Out-of-band management D. A Secure Shell connection 35. A Human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error? A. DHCP configuration B Firewall rulesC. DLP software D. Intrusion detection system 36. While running a local network security scan, an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication to be encrypted. Which of the following ports should be closed to stop the cleartext communication? A. 21 B. 22 C. 443 D. 3389 37. Which of the following would a systems administrator implement to ensure all web traffic is secure? A. SSH B. SSL C. SMTP D. PGP 38. A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANS are configured as follows: VLAN name VIAN ID Gateway IP address Active switch ports Testing 10 192.168.10.1/24 2,4,6,8,10,12,14, 18 Production20 192.168.20.1/24 3,5,7,9,11, 13, 15,17 Administration30 192.168.30.1/24 1,24 The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 Default gateway: 192.168.10.1 A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server? A.IP address: 192.168.10.2/24 Default gateway: 192.168.10.1 B.IP address: 192.168.1.2/24 Default gateway: 192.168.10.1 C.IP address: 192.168.10.3/24 Default gateway: 192.168.20.1 D.IP address: 192.168.10.24/24 Default gateway: 192.168.30.1 39. Which of the following security risks provides unauthorized access to an application? A. BackdoorB. Data corruption C. Insider threat D. Social engineering 40. An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted Which of the following describes the type of traffic being encrypted? A. Network encapsulation B. Off-site data C. Secure FTP D. Data in transit 41. A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use? A. DLP B. A port scanner C. Anti-malware D. A sniffer 42. A technician has been tasked to install a new CPU. Prior to the installation, the server must be configured. Which of the following should the technician update? A. the RAID card B. The BIOS C. The backplane D. The HBA43. Which of the following often-overlooked parts of the asset life cycle can cause the GREATEST number of issues in relation to PII exposure? A. Usage В. End-of-life C. Procurement D. Disposal 44. Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications? A. SSO B. LDAP C. TACACS D. MFA 45. An administrator has been asked to increase the storage capacity of a stand-alone file server, but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime? A. Configure a RAID array. B. Replace the current drives with higher-capacity disks C. Implement FCoE for more storage capacity. D. Connect the server to a SAN. 46. Which of the following is a type of replication in which all files are replicated, all of the time? A. Constant B. Application consistent C. Synthetic full D. Full 47. An administrator is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently? A. rsyncB. copy С. scp D. robocopy 48. An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration. Which of the following technologies is the new connection using? A. iSCSI B. eSATA C.NFS D. FCoE 49. A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server? A. NAT B ICMP C. VLAN D. NIDS 50. Which of the following licensing models is MOST appropriate for a data center that has a variable daily equipment count? A. Per site B. Per server C. Per user D. Per core [Show More]
Last updated: 2 years ago
Preview 1 out of 20 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Mar 23, 2023
Number of pages
20
Written in
This document has been written for:
Uploaded
Mar 23, 2023
Downloads
0
Views
71
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·