1
您的位置: 线上活动  >  在线答题  >  答题题库

222

2025-04-05 17:43:49.226.0.61768

222 在线考试 答题题目
1、 A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?
  • A、Static
  • B、Router-assigned
  • C、APIPA
  • D、DHCP


  • 2、 A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?
  • A、 1U
  • B、 2U
  • C、 3U
  • D、 4U


  • 3、 An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?
  • A、 The UPS batteries were overcharged.
  • B、 Redundant power supplies require 220V power
  • C、 Both power supplies were connected to the same power feed
  • D、 The power supplies werenot cross-connected


  • 4、 A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?
  • A、 10.3.7.27
  • B、 127.0.0.1
  • C、 192.168.7.1
  • D、 216,176,128.10


  • 5、(多选题) A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO)
  • A、Close unneeded ports.
  • B、Disable unneeded physical ports.
  • C、Set a BIOS password.
  • D、Install a SIEM
  • E、Disable unneeded services
  • F、Install a HIDS.


  • 6、 While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?
  • A、 21
  • B、 22
  • C、 443
  • D、 3389


  • 7、 Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?
  • A、 Hybrid
  • B、 Public
  • C、 Private
  • D、 Community


  • 8、 Which of the following backup types copies changed data from a server and then combines the backups on the backup target?
  • A、 Differential
  • B、 Incremental
  • C、 Synthetic full
  • D、 Snapshot


  • 9、 A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?
  • A、 RA,NAT
  • B、 ICMP
  • C、 VLAN
  • D、 NIDS


  • 10、 A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?
  • A、 Enable HIDS.
  • B、 Change the service account permissions.
  • C、 Check the host firewall I rule.
  • D、 Roll back the applied patch.


  • 11、(多选题) The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.One of the alerts contains the following information: Exploit Alert Attempted User Privilege Gain 2/2/07-3: 09:09 10.1.200.32 --> 208.206.12.9:80 This server application is part of a cluster in which two other servers are also servicing clients. The server dministrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two).
  • A、 Disable all services on the affected application server.
  • B、 Perform a vulnerability scan on all the servers within the cluster and patch accordingly.
  • C、 Block access to 208.206.12.9 from all servers on the network.
  • D、 Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.
  • E、 Enable GPO to install an antivirus on all the servers and perform a weekly reboot.
  • F、 Perform an antivirus scan on all servers within the cluster and reboot each server.


  • 12、 A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?
  • A、 Link aggregation
  • B、 Heartbeat
  • C、 Most recently used
  • D、 Active-active


  • 13、 A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?
  • A、 A full, weekly backup with daily open-file backups
  • B、 A full, weekly backup with daily archive backups
  • C、 A full, weekly backup with daily incremental backups
  • D、 A full, weekly backup with daily differential backups


  • 14、 An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?
  • A、 Use a RDP/VNC session
  • B、 Modify the startup configuration.
  • C、 Use a PowerSheII/Bash script.
  • D、 Use the BIOS/UEFI setup.


  • 15、 Which of the following asset management documents is used to identify the location of a serves within a data center?
  • A、 Infrastructure diagram
  • B、 Workflow diagram
  • C、 Rack layout
  • D、 Service manual


  • 16、 A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?
  • A、 Unattended scripted OS installation
  • B、 P2V
  • C、 VM cloning


  • 17、 A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?
  • A、 Alerting
  • B、 Retention
  • C、 Shipping
  • D、 Rotation


  • 18、 A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?
  • A、 Fail over
  • B、 Fault tolerance
  • C、 Load balancing
  • D、 Link aggregation


  • 19、 An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?
  • A、 135
  • B、 636
  • C、 3268
  • D、 3389


  • 20、 An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?
  • A、 DHCP
  • B、 WINS
  • C、 DNS
  • D、 TCP


  • 21、 Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing; Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?
  • A、chmod 777 filename
  • B、chown Joe filename.
  • C、Chmod g+w filename
  • D、chgrp IT filename


  • 22、 Which of the following backup types should be chosen for database servers?
  • A、 Differential
  • B、 Incremental
  • C、 Synthetic full
  • D、 Open file


  • 23、 An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?
  • A、 Modifying the MAC used on the DHCP reservation
  • B、 Updating the local hosts file with the correct IP address
  • C、 Modifying the WWNN used on the DHCP reservation
  • D、 Updating the NIC to use the correct WWNN


  • 24、(多选题) The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Select TWO).
  • A、RFID
  • B、Proximity readers
  • C、Signal blocking
  • D、Camouflage
  • E、Reflective glass
  • F、Bollards


  • 25、 Which of the following BEST describes overprovisioning in a virtual server environment?
  • A、 Committing more virtual resources to virtual machines than there are physical resources present
  • B、 Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
  • C、 Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
  • D、 Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure


  • 26、 A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?
  • A、 Consult internet forums to determine which is the most common cause and deploy only that solution.
  • B、Test each solution individually to determine the root cause, rolling back the changes in between each test.
  • C、 Implement the shortest solution first to identify the issue and minimize downtime.
  • D、 Test each solution in succession and restore the server from the latest snapshot.


  • 27、 Which of the following script types uses commands That start with sec-?
  • A、 Batch
  • B、 Bash
  • C、 PowerShell
  • D、 JavaScript


  • 28、 A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?
  • A、 The RAID card
  • B、 The BIOS
  • C、 The backplane
  • D、 The HBA


  • 29、 A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?
  • A、 The disk uses GPT.
  • B、 The partition is formatted with ext4.
  • C、 The partition is formatted with FAT32.
  • D、 The disk uses MBR.


  • 30、 A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?
  • A、Configure the drive as a base disk.
  • B、Configure the drive as a dynamic disk
  • C、Partition the drive using MBR.
  • D、Partition the drive using GPT.


  • 31、 Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?
  • A、 Private
  • B、 Hybrid
  • C、 Community
  • D、 Public


  • 32、 A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?
  • A、 25
  • B、 443
  • C、 3389
  • D、 8080


  • 33、 Which of the following commands would MOST likely be used to register a new service on a Windows OS?
  • A、 set-service
  • B、 net
  • C、 sc
  • D、 services.msc


  • 34、(多选题) A technician needs maximum power redundancy while configuring a new server rack. Which of the following should be specified? (Select two).
  • A、 Separate circuits
  • B、 Rack balancing
  • C、 Blanking panels
  • D、 High-voltage PDUs
  • E、 KVM placement
  • F、 Multiple UPSs


  • 35、 A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity must be maximized. Which of the following RAID levels should the server administrator implement?
  • A、 0
  • B、 1
  • C、 5
  • D、 6
  • E、 10


  • 36、(多选题) An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select TWO).
  • A、 53
  • B、 80
  • C、 389
  • D、 443
  • E、45
  • F、3389
  • G、8080


  • 37、 A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?
  • A、Network address translation
  • B、in-band management
  • C、Round robin
  • D、NIC teaming


  • 38、 A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient subnet mask for this connection?
  • A、 /28
  • B、 /29
  • C、 /30
  • D、 /32


  • 39、 A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users.Which of the following should the developer use when designing the web application?
  • A、 Round robin
  • B、 Link aggregation
  • C、 Network address translation
  • D、 Bridged networking


  • 40、 A staff memberwho a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?
  • A、 Installing blanking panels in all the empty rack spaces
  • B、 installing an additional POU and spreading out the power cables
  • C、 Installing servers on the shelves instead of sliding rails
  • D、 installing front bezels on all the server’s m the rack


  • 41、 A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?
  • A、 DLF configuration
  • B、 MBR failure
  • C、 ECC support
  • D、 MD5 checksum


  • 42、 The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?
  • A、 Set a BIOS/UEFI password on the server.
  • B、 Change the boot order on the server and restrict console access.
  • C、Configure the host OS to deny login attempts via USB.
  • D、 Disable all the USB ports on the server.


  • 43、 A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?
  • A、 Implement rollback procedures.
  • B、 Upgrade the drivers.
  • C、 Reinstall the OS.
  • D、 Reboot the server.


  • 44、 A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?
  • A、DHCP configuration
  • B、Firewall rules
  • C、DLP software
  • D、Intrusion detection system


  • 45、 An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?
  • A、 Linked list
  • B、 String
  • C、 Loop
  • D、 Constant


  • 46、 A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?
  • A、SD card
  • B、NAS drive
  • C、SATA drive
  • D、SAS drive


  • 47、 A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?
  • A、 Variable
  • B、 Loop
  • C、 Comparator
  • D、 Conditional


  • 48、 A user logs in to a Linux server and attempts to run the following command:
  • A、visudo I grep userid
  • B、sudo -1 -U userid
  • C、cat /etc/passwd
  • D、userlist I grep userid


  • 49、 A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?
  • A、 Reinstall the OS.
  • B、 Wipe the drives.
  • C、 Degauss the drives.
  • D、 Update the IP schema.


  • 50、 A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?
  • A、 A security camera
  • B、 A mantrap
  • C、 A security guard
  • D、 A proximity card


  • 51、 A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?
  • A、 A virtual router
  • B、 A host NIC
  • C、 A VPN
  • D、 A virtual switch
  • E、 A vNlC


  • 52、 An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario.Which of the following actions should the organization perform?
  • A、 Have the facility inspect and inventory the tapes on a regular basis.
  • B、 Have duplicate equipment available at the cold site.
  • C、 Retrieve the tapes from the cold site and test them.
  • D、 Use the test equipment at the cold site to read the tapes.


  • 53、 A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?
  • A、 RAID array
  • B、 Serial Attached SCSI
  • C、 Solid-state drive
  • D、 Just a bunch of disks


  • 54、 An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes. Which of the following would BEST help answer the server performance question9
  • A、 Server performance thresholds
  • B、 A server baseline
  • C、 A hardware compatibility list
  • D、 An application service-level agreement


  • 55、 A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue. Which of the following should the server administrator do NEXT?
  • A、 Reinstall the server OS in repair mode while maintaining the data.
  • B、 Flash the BIOS with the most recent version.
  • C、 Reverse the latest change made to the server and reboot.
  • D、 Restart the server into safe mode and roll back changes.


  • 56、 An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?
  • A、 The solution reduced shutdown time.
  • B、 The solution improved load balancing,
  • C、 The solution increased power out.
  • D、 The solution extended runtime.


  • 57、 A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?
  • A、 Something you are
  • B、 Something you know
  • C、 Something you have
  • D、 Something you do


  • 58、 An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?
  • A、Backplane failure
  • B、CMOS failure
  • C、Misconfigured RAID
  • D、Cache battery failure


  • 59、 An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?
  • A、 Open-source
  • B、 Per CPU socket
  • C、 Per CPU core
  • D、 Enterprise agreement


  • 60、 A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?
  • A、 RAID 0 was configured by mistake.
  • B、 RAID 5 was configured properly.
  • C、 JBOD was configured by mistake.
  • D、 RAID 10 was configured by mistake.


  • 61、 An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?
  • A、Replace one drive, wait for a rebuild, and replace the next drive.
  • B、Shut down the server and replace the drives.
  • C、Replace both failed drives at the same time.
  • D、Replace all the drives in both degraded arrays.


  • 62、 An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?
  • A、 Replace all the array drives at once and then expand the array.
  • B、 Expand the array by changing the RAID level to 6.
  • C、 Expand the array by changing the RAID level to 10.
  • D、 Replace the array drives one at a time and then expand the array.


  • 63、 An administrator needs to reconfigure a teamed network connection on a server in a remote data center. Which of the following will offer the most resilient connection while performing this change?
  • A、 Use of an 00B solution
  • B、 Use of a crash cart
  • C、 Use of a VNC console
  • D、 Use of an RDP console


  • 64、 A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files.Which of the following would be BEST for the technician to deploy?
  • A、iSCSI
  • B、CIFS
  • C、HTTPS
  • D、DAS


  • 65、 Which of the following licensing models allows the greatest number of concurrent Windows VMS to run on a host for the lowest cost?
  • A、 per user
  • B、 per core
  • C、 Per instance
  • D、 Per concurrent user


  • 66、 Which of the following BEST describes a warm site?
  • A、 The site has all infrastructure and live data.
  • B、 The site has all infrastructure and some data
  • C、The site has partially redundant infrastructure and no network connectivity
  • D、 The site has partial infrastructure and some data.


  • 67、 Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?
  • A、 Usage
  • B、 End-of-life
  • C、 Procurement
  • D、 Disposal


  • 68、 An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?
  • A、 Remove all the data from the server drives using the least destructive method.
  • B、 Repurpose and recycle any usable server components.
  • C、 Remove all the components from the server.
  • D、 Review all company polices.


  • 69、 A server administrator notices the /var/log/audit/audit.log file on a Linux server is rotating loo frequently. The administrator would like to decrease the number of times the leg rotates without losing any of the information in the logs. Which of the following should the administrator configure?
  • A、 increase the audit. log file size in the appropriate confutation file.
  • B、 Decrease the duration of the log rotate cycle tor the audit. log file.
  • C、 Remove the tog rotate directive from the audit .log We configuration.
  • D、 Move the audit. leg files to a remote syslog server.


  • 70、 A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?
  • A、 The system is booting to a USB flash drive
  • B、 The UEFI boot was interrupted by a missing Linux boot file
  • C、 The BIOS could not find a bootable hard disk
  • D、 The BIOS firmware needs to be upgraded


  • 71、 A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?
  • A、 nslookup
  • B、 nbtstat
  • C、 telnet
  • D、 netstat -a


  • 72、 Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?
  • A、 Humidity control system
  • B、 Sensors
  • C、 Fire suppression
  • D、 Heating system


  • 73、(多选题) A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)
  • A、 Host
  • B、 Template
  • C、 Clone
  • D、 Type1
  • E、 Type2
  • F、 Guest


  • 74、 A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?
  • A、 Off-site backups
  • B、 Full backups
  • C、 Differential backups
  • D、 Incremental backups


  • 75、 After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers. Which of the following is the first step the technician should take?
  • A、 Add more memory.
  • B、 Check if the cache is turned on.
  • C、 Install faster hard drives.
  • D、 Enable link aggregation.


  • 76、 A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?
  • 0
  • B、1
  • C、5
  • D、6


  • 77、 The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?
  • A、 Tape
  • B、 Cloud
  • C、 Disk
  • D、 Print


  • 78、 An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?
  • A、 Network encapsulation
  • B、 Off-site data
  • C、 Secure FTP
  • D、 Data in transit


  • 79、 A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?
  • A、Build a warm site and perform a fail over of the application.
  • B、Build a cloud laaS and perform a fail over of the application.
  • C、Build a hot site and perform a fail over of the application.
  • D、Build a cold site and perform a fail over of the application.
  • E、Perform a tabletop fail over of the application.


  • 80、 After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?
  • A、Remove the original network card and attempt to boot using only the new network card.
  • B、Check that the BIOS is configured to recognize the second network card.
  • C、Ensure the server has enough RAM to run a second network card.
  • D、Verify the network card is on the HCL for the OS.


  • 81、 Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?
  • A、Pet site
  • B、Per server
  • C、Per user
  • D、Per core


  • 82、 A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?
  • A、 Set up the warm site as a DR cold site.
  • B、 Set up a DR site that is in the cloud and in the same region.
  • C、 Set up the warm site as a DR hot site.
  • D、 Set up a DR site that is geographically located in another region.


  • 83、 Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?
  • A、 RTO
  • B、 SLA
  • C、 MTBF
  • D、 MTTR


  • 84、 In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?
  • A、Waterfall
  • B、Synthetic full
  • C、Tower of Hanoi
  • D、Grandfather-father-son


  • 85、 Which of the following concepts refers to prioritizing a connection that had previously worked successfully?
  • A、 Round robin
  • B、 SCP
  • C、 MRU
  • D、 Link aggregation


  • 86、 A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?
  • A、Install the latest patches.
  • B、Disable unneeded hardware.
  • C、Set the boot order.
  • D、Enable a BIOS password.


  • 87、 A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?
  • A、 The jumbo frames are not enabled.
  • B、 The subnet mask is incorrect.
  • C、 There is an IP address conflict.
  • D、 There is an improper DNS configuration.


  • 88、 Which of the following is used for fail over, providing access to all the services currently in use by an organization without having to physically move any servers or employees?
  • A、 The cloud
  • B、 A cold site
  • C、 A warm site
  • D、 An emergency operations center


  • 89、 A server administrator needs to ensure all Window-based servers within a data center have RDP disabled. There are thousands of servers performing various roles. Which of the following is the best way to meet this requirement?
  • A、 Run chkconfig ——1eve1 345 RDP off.
  • B、 Create a PowerSheII script to disable the RDP service.
  • C、 Run chkconfig —— list RDP.
  • D、 Create a Bash shell script to disable the Windows Remote Management service.
  • E、 Create a GPO to disable the Windows Remote Management service.


  • 90、 Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?
  • A、 Active-passive
  • B、 Failover
  • C、 Active-active
  • D、 Fallback


  • 91、 An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?
  • A、 Option A
  • B、 Option B
  • C、 Option C
  • D、 Option D


  • 92、 A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?
  • A、 A. Lockout
  • B、 Length
  • C、 Complexity
  • D、 Minimum age


  • 93、 A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?
  • A、Rack
  • B、Virtual
  • C、Tower
  • D、Blade


  • 94、 A server technician arrives at a data center to troubleshoot a physical server that is not responding to remote management software. The technician discovers the servers in the data center are not connected to a KVM switch, and their out-of-band management cards have not been configured. Which of the following should the technician do to access the server for troubleshooting purposes?
  • A、 Connect the diagnostic card to the PCle connector.
  • B、 Connect a console cable to the server NIC.
  • C、 Connect to the server from a crash cart.
  • D、 Connect the virtual administration console.


  • 95、 A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?
  • A、 Telnet connections are disabled on the server.
  • B、 Role-based access control is misconfigured.
  • C、 There are misconfigured firewall rules.
  • D、 Group policies have not been applied.


  • 96、 Which of the following concepts is in use when dual power supplies are connected to different power
  • A、 Fault tolerance
  • B、 Active-passive
  • C、 Component redundancy
  • D、 Heartbeat
  • E、 Link aggregation


  • 97、 A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?
  • A、 Configure the domain search variable
  • B、 Change the permissions on resolv. conf
  • C、 Configure the DNS address
  • D、 Modify nsswitch. Conf.


  • 98、 A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?
  • A、 Per socket
  • B、 Open-source
  • C、 Per concurrent user
  • D、 Volume


  • 99、 An administrator is installing a new file server that has four drive bays available.Which of the following RAID types would provide the MOST storage as well as disk redundancy?
  • A、 RAID0
  • B、 RAID1
  • C、 RAID5
  • D、 RAID10


  • 100、 Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?
  • A、 Aggregation
  • B、 Subscription
  • C、 Merging
  • D、 Collection


  • 101、 An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?
  • A、 The server has high page utilization.
  • B、 The server has high disk latency.
  • C、 The application is single-threaded.
  • D、 The application cannot be virtualized.


  • 102、 An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?
  • A、 rsync
  • B、 copy
  • C、 scp
  • D、 robocopy


  • 103、 A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the followingshould the technician check first?
  • A、 The boot log
  • B、 The BIOS
  • C、 The HCL
  • D、 The event log


  • 104、 The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:
  • A、 website traffic is protected while traversing the internet.
  • B、 files stored on the server are protected against physical theft.
  • C、 attachments that are emailed from this server cannot be intercepted.
  • D、 databases in use are protected from remote hackers.


  • 105、 A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?
  • A、 The IP address
  • B、 The default gateway
  • C、 The VLAN
  • D、 The subnet mask


  • 106、 A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?
  • A、 Open file
  • B、 Synthetic full
  • C、 Full incremental
  • D、 Full differential


  • 107、 Which of the following backup types resets the archive bit each time it is run?
  • A、 Differential
  • B、 Snapshot
  • C、 Incremental
  • D、 Synthic full


  • 108、 A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?
  • A、 20
  • B、 21
  • C、 22
  • D、 23
  • E、 53


  • 109、 Which of the following licensing concepts is based on the number of logical processors a server has?
  • A、 Per core
  • B、 Per socket
  • C、 Per instance
  • D、 Per server


  • 110、 The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?
  • A、 Copy the existing data to an external USB 3 0 enclosure.
  • B、 Place the existing data on a DVD and use the internal DVD-ROM drive.
  • C、 Transfer the existing data to an external eSATA enclosure.
  • D、 Move the existing data to a new. larger internal hard drive.


  • 111、 A senior administrator instructs a technician to run the following script on a Linux server:or i in {1..65536); do echo Si; telnet localhost $i; done The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this: 80 Connected to localhost 443 Connected to localhost Which of the following actions should the technician perform NEXT?
  • A、Look for an unauthorized HTTP service on this server
  • B、Look for a virus infection on this server
  • C、Look for an unauthorized Telnet service on this server
  • D、Look for an unauthorized port scanning service on this server.


  • 112、 Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?
  • A、 Tabletcp
  • B、 Backup recovery test
  • C、 Lrverail over
  • D、 Hot-site visit audit


  • 113、(多选题) Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)
  • A、 Uninstall recent updates.
  • B、 Reimage the server with a different OS.
  • C、 Run a port scan to verify open ports.
  • D、 Enable a GPO to uninstall the update.
  • E、 Scan and remove any malware.
  • F、 Reformat the server and restore the image from the latest backup.


  • 114、 An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used
  • A、 Implement data loss prevention.
  • B、 Configure intrusion detection.
  • C、 Turn on User Account Control.
  • D、 Disable anonymous access.


  • 115、 A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?
  • A、Creating an exclusion to the antivirus for the application
  • B、Disabling real-time scanning by the antivirus
  • C、Validating the checksum for the downloaded installation package
  • D、Checking for corruption of the downloaded installation package


  • 116、 Which of the following should a technician verify FIRST before decommissioning and wiping a file server?
  • A、The media destruction method
  • B、The recycling poke?
  • C、Asset management documentation
  • D、Non-utilization


  • 117、 A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?
  • A、Unplug the power cables from the redundant power supplies, leaving just the minimum required.
  • B、Convert the physical servers to the hypervisors and retire the ten servers.
  • C、Reimage the physical servers and retire all ten servers after the migration is complete.
  • D、Convert the ten servers to power-efficient core editions.


  • 118、 An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?
  • A、 Anti-malware
  • B、 Nbtstat
  • C、 Port scanner
  • D、 Sniffer


  • 119、 A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?
  • A、 Security guards
  • B、 Security cameras
  • C、 Bollards
  • D、 An access control vestibule


  • 120、 A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?
  • A、 Biometrics
  • B、 Push notifications
  • C、 Smart carts
  • D、 Physical tokens


  • 121、 The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?
  • A、 SSH
  • B、 VPN
  • C、 SELinux
  • D、 FTPS


  • 122、 A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?
  • A、 The disk uses GPT.
  • B、 The partition is formatted with ext4.
  • C、 The -partition is formatted with FAT32.
  • D、 The disk uses MBn.


  • 123、 A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen. Which of the following is the next step the administrator should take to diagnose the error without opening the machine?
  • A、 Perform a cold reboot.
  • B、 Listen for POST code beeps.
  • C、 Call technical support.
  • D、 Check the monitor connection.


  • 124、 Which of the following is the MOST secure method to access servers located in remote branch offices?
  • A、 Use an MFAout-of-band solution.
  • B、 Use a Telnet connection.
  • C、 Use a password complexity policy.
  • D、 Use a role-based access policy.


  • 125、 Which of the following should be configured in pairs on a server to provide network redundancy?
  • A、MRU
  • B、SCP
  • C、DLP
  • D、CPU
  • E、NIC


  • 126、 A systems administrator needs to create a data volume out of four disks with the MOST redundancy. Which of the following is the BEST solution?
  • A、 RAID 0
  • B、 RAID 1
  • C、 RAID 5
  • D、 RAID 6


  • 127、 Which of the following life-cycle management phases deals with a server that is no longer in operation?
  • A、 End-of-life
  • B、 Disposal
  • C、 Usage
  • D、 Procurement


  • 128、 Which of the following backup methods protects all the changes that have occurred since the last full backup?
  • A、 Incremental
  • B、 Archive
  • C、 Differential
  • D、 Snapshot


  • 129、 Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?
  • A、 Bollards
  • B、 Signal blocking
  • C、 Reflective glass
  • D、 Data center camouflage


  • 130、 A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors.Which of the following is the MOST likely source of the issue?
  • A、A local firewall is blocking authentication requests.
  • B、The users have expired passwords
  • C、The system clock is off by more than five minutes
  • D、The server has no access to the LDAP host


  • 131、 A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?
  • A、 An ACL
  • B、 Antivirus
  • C、 DLP
  • D、 A firewall


  • 132、 An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?
  • A、 RAID 1
  • B、 RAID 5
  • C、 RAID 6
  • D、 RAID 10


  • 133、 A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?
  • A、Fibre Channel
  • B、FCoE
  • C、iSCSI
  • D、eSATA


  • 134、 Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?
  • A、The DHCP exclusion needs to be removed.
  • B、The DHCP scope is full.
  • C、The DHCP scope options are misconfigured
  • D、The DHCP lease times are too short.
  • E、The DHCP reservations need to be configured.


  • 135、 An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?
  • A、 Configure a RAID array.
  • B、 Replace the current drives with higher-capacity disks.
  • C、 Implement FCoE for more storage capacity.
  • D、 Connect the server to a SAN


  • 136、 A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?
  • A、HTTP
  • B、FTP
  • C、 SCP
  • D、 USB


  • 137、 A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?
  • A、 Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
  • B、 Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
  • C、 Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
  • D、 Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.


  • 138、 A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?
  • A、 Reinstall the OS and programs.
  • B、 Configure old drives to RAID.
  • C、 Reconfigure the RAID.
  • D、 Install from backup.


  • 139、 A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?
  • A、 The system is booting to a USB flash drive.
  • B、 The UEFI boot was interrupted by a missing Linux boot file.
  • C、 The BIOS could not find a bootable hard disk.
  • D、 The BIOS firmware needs to be upgraded.


  • 140、 A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?
  • A、 A firewall
  • B、 An antivirus
  • C、 AHIDS
  • D、 User account control


  • 141、 A technician has received tickets responding a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?
  • A、Log rotation
  • B、Alerts
  • C、Reports
  • D、Log stopping


  • 142、 A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?
  • A、 Manage the fileshare from an RDP session.
  • B、 Audit the permissions of the fileshare.
  • C、 Audit the access to the physical fileshare.
  • D、 Manage the permissions from the fileshare.


  • 143、 An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the MINIMUM number of disks needed for this application?
  • A、 6
  • B、 7
  • C、 8
  • D、 9


  • 144、 A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?
  • A、 Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
  • B、 Perform a complete OS reinstall on the server using the same media that was used during the initial install.
  • C、 Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
  • D、 Set a BIOS password to prevent server technicians from making any changes to the system.


  • 145、 Which of the following script types would MOST likely be used on a modern Windows server OS?
  • A、 Batch
  • B、 VBS
  • C、 Bash
  • D、 PowerShell


  • 146、 Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?
  • A、SLA
  • B、BIA
  • C、RTO
  • D、MTTR


  • 147、 An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?
  • A、 A firewall blocking the ICMP echo reply.
  • B、 The DHCP scope option is incorrect
  • C、 The DNS entries for the print server are incorrect.
  • D、 The hosts file misconfigured.


  • 148、 A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?
  • A、 The keyboard is defective and needs to be replaced.
  • B、 The system failed before the display card initialized.
  • C、 The power supply is faulty and is shutting down the system.
  • D、 The NIC has failed, and the system cannot make a network connection.


  • 149、 A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?
  • A、 Apply security updates.
  • B、 Disable unneeded hardware.
  • C、 Set a BIOS password.
  • D、 Configure the boot order.


  • 150、 Which of the following ensures a secondary network path is available if the primary connection fails?
  • A、 Link aggregation
  • B、 Most recently used
  • C、 Heartbeat
  • D、 Fault tolerance


  • 151、 Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?
  • A、 nbtstat
  • B、 netuse
  • C、 tracert
  • D、 netstst


  • 152、 A server administrator receives the following output when trying to ping a local host:ping imhrh-vc.net Reply from imhrh-vc.net.Destination host unreachable.Which of the following is MOST likely the issue?
  • A、Firewall
  • B、DHCP
  • C、DNS
  • D、VLAN


  • 153、 A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?
  • A、 The read and write performance will be impacted.
  • B、 The read performance will be impacted.
  • C、 The performance will not be impacted.
  • D、 The write performance will be impacted.


  • 154、 Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?
  • A、 Third-party acceptable use policy
  • B、 Customer data encryption and masking
  • C、 Non-disclosure and indemnity agreements
  • D、 Service- and operational-level agreements


  • 155、 A technician needs to restore data from a backup. The technician has these files in the backup inventory01012020/100M Which of the following backup types is being used if the file 01062020.bak requires another file to restore data?
  • A、Full
  • B、Incremental
  • C、Snapshot
  • D、Differential


  • 156、 An administrator discovers a Bash script file has the following permissions set in octal notation; 777 Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?
  • A、chmod go-rw>:
  • B、chmod u=rwx
  • C、chmod u+wx
  • D、chmod g-rwx


  • 157、 A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?
  • A、 Print
  • B、 File
  • C、 Database
  • D、 Messaging


  • 158、 Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?
  • A、 Per-server
  • B、 per-seat
  • C、 Per-concurrent user
  • D、 per-core


  • 159、 A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?
  • A、 Disable the user's account and inform the security team.
  • B、 Create a new log-in to the external database.
  • C、 Ask the user to use the link again to reset the password.
  • D、 Reset the user's password and ask the user to log in again.


  • 160、 Which of the following refers to the requirements that dictate when to delete data backups?
  • A、 Retention policies.
  • B、 Cloud security impact
  • C、 Off-site storage
  • D、 Life-cycle management


  • 161、 A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?
  • A、 Rack balancing
  • B、 Cable management
  • C、 Blade enclosure
  • D、 Rail kit


  • 162、 A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?
  • A、 Necessary dependencies were installed for multiple architectures.
  • B、 There is not enough hard drive space.
  • C、 The server is infected with a virus.
  • D、 Some modules are not compatible.


  • 163、 An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?
  • A、 A hard drive test
  • B、 A RAM test
  • C、 A power supply swap
  • D、 A firmware update


  • 164、 Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?
  • A、 SIEM
  • B、 DLP
  • C、 HIDS
  • D、 IPS


  • 165、 An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?
  • A、 RAID
  • B、 RAID 1
  • C、 RAID5
  • D、 RAID 10


  • 166、 Which of the following licensing models was created by software companies in response to the increasing density of processors?
  • A、 Per-instance
  • B、 Per-server
  • C、 per-user
  • D、 per-core


  • 微信扫一扫 在线答题 在线出卷 随机出题小程序 闯关答题软件 出题答题小程序