1
您的位置: 线上活动  >  在线答题  >  答题题库

111

2024-12-28 23:55:03.226.0.58613

111 在线考试 答题题目
1、 Winch of the following is a type of replication in which all files are replicated, all the time?
  • A、 Constant
  • B、 Application consistent
  • C、 Synthetic full
  • D、 Full


  • 2、 A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
  • A、 11.251.196.241
  • B、 171.245.198.241
  • C、 172.16.19.241
  • D、 193.168.145.241


  • 3、 A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?
  • A、 Crash cart
  • B、 Out-of-band console
  • C、 IP KVM
  • D、 RDP


  • 4、 A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?
  • A、SD card
  • B、NAS drive
  • C、SATA drive
  • D、SAS drive


  • 5、 A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals??
  • A、A warm site
  • B、A hot site
  • C、Cloud recovery
  • D、A cold site


  • 6、 A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?
  • A、 Network connectivity on the server
  • B、 LVM status on the server
  • C、 Disk space in the /var directory
  • D、 YUM dependencies


  • 7、 A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:nfsserver:/home /home nfs defaults 0 0 However, a df -h /home command returns the following information: /dev/sda2 10G 1G 9G 10% /home Which of the following should the technician attempt FIRST to resolve the issue?
  • A、mkdir /home
  • B、umount nfsserver:/home
  • C、rmdir nfsserver:/home/dev/sda2
  • D、mount /home


  • 8、 A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.
  • A、 mantrap.
  • B、 a bollard
  • C、 geofencing
  • D、 RFID.


  • 9、 A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?
  • A、Full
  • B、Bare metal
  • C、Core
  • D、GUI


  • 10、 A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?
  • A、 RAID 0
  • B、 RAID 1
  • C、 RAID 5
  • D、 RAID 6


  • 11、(多选题) The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)
  • A、 RFID
  • B、 Proximity readers
  • C、 Signal blocking
  • D、 Camouflage
  • E、 Reflective glass
  • F、 Bollards


  • 12、 A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?
  • A、Per site
  • B、Per concurrent user
  • C、Per core
  • D、Per instance


  • 13、 An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using??
  • A、iSCSI
  • B、eSATA
  • C、NFS
  • D、FcoE


  • 14、 Which of the following is an example of load balancing?
  • A、Round robin
  • B、Active-active
  • C、Active-passive
  • D、Failover


  • 15、 Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
  • A、Utilize privacy screens.
  • B、Implement disk quotas.
  • C、Install a DLP solution
  • D、Enforce the lock-screen feature


  • 16、 Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
  • A、 Scope-based
  • B、 Role-based
  • C、 Location-based
  • D、 Rule-based


  • 17、(多选题) A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).
  • A、 Check the default gateway.
  • B、 Check the route tables.
  • C、 Check the hosts file.
  • D、 Check the DNS server.
  • E、 Run the ping command.
  • F、 Run the tracert command


  • 18、 Which of the following actions should a server administrator take once a new backup scheme has been configured?
  • A、 Overwrite the backups
  • B、 Clone the configuration
  • C、 Run a restore test
  • D、 Check the media integrity


  • 19、 A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?
  • A、The server is In the process of shutting down, so fan speed operations have been defaulted to high.
  • B、An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.
  • C、A fan failure has occurred, and the other fans have increased speed to compensate.
  • D、The server is utilizing more memory than the other servers, so it has increased the fans to compensate.


  • 20、 Which of the following can be used to map a network drive to a user profile?
  • A、 System service
  • B、 Network service
  • C、 Login script
  • D、 Kickstart script


  • 21、(多选题) Which of the following are measures that should be taken when a data breach occurs? (Select TWO).
  • A、 Restore the data from backup.
  • B、 Disclose the incident.
  • C、 Disable unnecessary ports.
  • D、 Run an antivirus scan.
  • E、 Identify the exploited vulnerability.
  • F、 Move the data to a different location.


  • 22、 A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?
  • A、virtual serial console
  • B、A KVM
  • C、An IDRAC
  • D、A crash cart


  • 23、 Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?
  • A、Connect the server to a KVM.
  • B、Use cable management.
  • C、Connect the server to a redundant network.
  • D、Connect the server to a UPS


  • 24、 After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:IPCONFIG/ALL IPV4 ADDRESS 192.168.1.5 SUBNET MASK 255.255.255.0 DEFAULT GATEWAY 192.168.1.2 REPLY FROM 192.168.1.2:Request timed out .The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?
  • A、 Network port security
  • B、 An improper VLAN configuration
  • C、 A misconfigured DHCP server
  • D、 A misconfigured NIC on the server


  • 25、 Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?
  • A、Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.
  • B、Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.
  • C、Use the longest cables possible to allow for adjustment of the server rail within the rack.
  • D、Install an Ethernet patch panel and a PDU to accommodate the network and power cables.


  • 26、(多选题) Which of the following open ports should be closed to secure the server properly? (Choose two.)
  • A、 21
  • B、 22
  • C、 23
  • D、 53
  • E、 443
  • F、 636


  • 27、 A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?
  • A、 Inspect the GPU that is being installed.
  • B、 Ensure the GPU meets HCL guidelines.
  • C、 Shut down the server.
  • D、 Disconnect the power from the rack.


  • 28、 Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?
  • A、 RTO
  • B、 MTBF
  • C、 PRO
  • D、 MTTR


  • 29、(多选题) Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)
  • A、Perform a root cause analysis
  • B、Develop a plan of action
  • C、Document the findings
  • D、Escalate the issue
  • E、Scope the issue
  • F、Notify the users


  • 30、(多选题) A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)
  • A、 Memory
  • B、 Page file
  • C、 Services
  • D、 Application
  • E、 CPU
  • F、 Heartbea


  • 31、 Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
  • A、Heartbeat
  • B、Failback
  • C、Redundancy
  • D、Load balancing


  • 32、 Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
  • A、 Encrypt the data that is leaving the SAN
  • B、 Encrypt the data at rest
  • C、 Encrypt the host servers
  • D、 Encrypt all the network traffic


  • 33、 A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
  • A、 Configure a firewall
  • B、 Close the unneeded ports
  • C、 Install a HIDS
  • D、 Disable unneeded services


  • 34、 A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?
  • A、Open file
  • B、Synthetic full
  • C、Full Incremental
  • D、Full differential


  • 35、 A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue?
  • A、 A S.M.A.R.T. error is a predictive failure notice. The drive will fail in the near future and should be replaced at the next earliest time possible
  • B、 A S.M.A.R.T. error is a write operation error. It has detected that the write sent to the drive was incorrectly formatted and has requested a retransmission of the write from the controller
  • C、 A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly
  • D、 A S.M.A.R.T. error is an ECC error. Due to error checking and correcting, the drive has corrected the missing bit and completed the write operation correctly.


  • 36、(多选题) A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)
  • A、 The server has an architecture mismatch
  • B、 The system time is not synchronized
  • C、 The technician does not have sufficient privileges
  • D、 The external firewall is blocking access
  • E、 The default gateway is incorrect
  • F、 The local system log file is full


  • 37、 A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?
  • A、 Partition the drive.
  • B、 Create a new disk quota.
  • C、 Configure the drive as dynamic.
  • D、 Set the compression.


  • 38、 Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?
  • A、 End-to-end encryption
  • B、 Encryption in transit
  • C、 Encryption at rest
  • D、 Public key encryption


  • 39、 A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?
  • A、Disable port 389 on the server
  • B、Move traffic from port 389 to port 443
  • C、Move traffic from port 389 to port 637
  • D、Enable port 389 for web traffic


  • 40、 A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following: dr-xr-xr-- /home/Ann Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
  • A、chmod777/home/Ann
  • B、chmod666/home/Ann
  • C、chmod711/home/Ann
  • D、chmod754/home/Ann


  • 41、 A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:
  • A、 BIA.
  • B、 RTO.
  • C、 MTTR.
  • D、 SLA.


  • 42、 Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?
  • A、Service-level agreement
  • B、Disaster recovery plan
  • C、Business impact analysis
  • D、Business continuity plan


  • 43、 A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as
  • A、 Copy the fileshare to an LTO-4 tape drive
  • B、 Configure a new incremental backup job for the fileshare
  • C、 Create an additional partition and move a copy of the fileshare
  • D、 Create a snapshot of the fileshare


  • 44、 Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
  • A、VBS
  • B、Shell
  • C、Java
  • D、PowerShell
  • E、Batch


  • 45、 Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?
  • A、 Disable the heartbeat network.
  • B、 Replace the disk
  • C、 Set the cluster to active-active.
  • D、 Failover all VMs.


  • 46、 A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?
  • A、 255.255.255.0
  • B、 255.255.255.128
  • C、 255.255.255.224
  • D、 255.255.255.252


  • 47、(多选题) A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
  • A、 Remote desktop
  • B、 IP KVM
  • C、 A console connection
  • D、 A virtual administration console
  • E、 Remote drive access
  • F、 A crash cart


  • 48、 Hosting data in different regional locations but not moving it for long periods of time describes:
  • A、 a cold site.
  • B、 data at rest.
  • C、 on-site retention
  • D、 off-site storage.


  • 49、 A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?
  • A、 GUI
  • B、 Core
  • C、 Virtualized
  • D、 Clone


  • 50、 A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?
  • A、Messaging
  • B、Application
  • C、Print
  • D、Database


  • 51、 Which of the following would be BEST to help protect an organization against social engineering?
  • A、 More complex passwords
  • B、 Recurring training and support
  • C、 Single sign-on
  • D、 An updated code of conduct to enforce social media


  • 52、 Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?
  • A、 Bollards
  • B、 Reflective glass
  • C、 Security guards
  • D、 Security cameras


  • 53、 An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?
  • A、 The page file is too small.
  • B、 The CPU has failed.
  • C、 There are multiple failed hard drives.
  • D、 There are mismatched RAM modules.
  • E、 RAID 5 requires four drives


  • 54、(多选题) Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)
  • A、 The server has a faulty power supply
  • B、 The server has a CMOS battery failure
  • C、 The server requires OS updates
  • D、 The server has a malfunctioning LED pane
  • E、 The servers do not have NTP configured
  • F、 The time synchronization service is disabled on the servers


  • 55、 A technician is deploying a single server to monitor and record me security cameras at a remote site, which of
  • A、Virtual
  • B、Blade
  • C、Tower
  • D、Rack mount


  • 56、 Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?
  • A、 SSO
  • B、 LDAP
  • C、 TACACS
  • D、 MFA


  • 57、 A technician wants to limit disk usage on a server. Which of the following should the technician implement?
  • A、Formatting
  • B、Compression
  • C、Disk quotas
  • D、Partitioning


  • 58、 A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do NEXT to install the firmware?
  • A、 Press F8 to enter safe mode
  • B、 Boot from the media
  • C、 Enable HIDS on the server
  • D、 Log in with an administrative account


  • 59、 A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:
  • A、 the correct firewall zone is active
  • B、 the latest firmware was applied
  • C、 NTP is running on the database system
  • D、 the correct dependencies are installed


  • 60、 A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?
  • A、 Installing the latest patches
  • B、 Closing open ports
  • C、 Enabling antivirus protection
  • D、 Enabling a NIDS


  • 61、 A very old PC is running a critical, proprietary application in MS-DOS.Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?
  • A、 Perform scheduled chkdsk tests.
  • B、 Purchase matching hardware and clone the disk.
  • C、 Upgrade the hard disk to SSD.
  • D、 Perform quarterly backups.


  • 62、 A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
  • A、User account control
  • B、Anti-malware
  • C、A sniffer
  • D、A port scanner


  • 63、 A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?
  • A、Partitioning
  • B、Deduplication
  • C、Disk quotas
  • D、Compression


  • 64、 A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?
  • A、 Take a snapshot of the original VM
  • B、 Clone the original VM
  • C、 Convert the original VM to use dynamic disks
  • D、 Perform a P2V of the original VM


  • 65、 Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?
  • A、 SLA
  • B、 BIA
  • C、 RTO
  • D、 MTTR


  • 66、 A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?
  • A、 Alternate the direction of the airflow
  • B、 Install the heaviest server at the bottom of the rack
  • C、 Place a UPS at the top of the rack
  • D、 Leave 1U of space between each server


  • 67、 A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps.Which of the following testing methods is the administrator MOST likely performing?
  • A、Backup recovery
  • B、Simulated
  • C、Tabletop
  • D、Live failover


  • 68、 A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?
  • A、 The VLAN Is improperly configured.
  • B、 The DNS configuration Is invalid.
  • C、 The OS version is not compatible with the network switch vendor.
  • D、 The HIDS is preventing the connection.


  • 69、 A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?
  • A、 pvdisplay
  • B、 mount
  • C、 df -h
  • D、 fdisk -l


  • 70、 A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?
  • A、Install security cameras
  • B、Utilize security guards
  • C、Install bollards
  • D、Install a mantrap


  • 71、 An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?
  • A、 /root.ssh/sshd/config
  • B、 /etc.ssh/sshd_config
  • C、 /root/.ssh/ssh_config
  • D、 /etc.sshs_shd_config


  • 72、 A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?
  • A、 RAID 0
  • B、 RAID 5
  • C、 RAID 6
  • D、 RAID 10


  • 73、 A server room with many racks of servers is managed remotely with occasional on-site support. Which of thefollowing would be the MOST cost-effective option to administer and troubleshoot network problems locally
  • A、Management port
  • B、Crash cart
  • C、IP KVM
  • D、KVM


  • 74、 A server administrator is exporting Windows system files before patching and saving them to the following location: \\server1\ITDept\ Which of the following is a storage protocol that the administrator is MOST likely using to save this data?
  • A、 eSATA
  • B、 FCoE
  • C、 CIFS
  • D、 SAS


  • 75、 A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network. Which of the following should the technician do FIRST to return the server to service as soon as possible?
  • A、 Replace the NIC
  • B、 Make sure the NIC is on the HCL
  • C、 Reseat the NIC
  • D、 Downgrade the NIC firmware


  • 76、 An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?
  • A、 SAS SSD
  • B、 SATA SSD
  • C、 SAS drive with 10000rpm
  • D、 SATA drive with 15000rpm


  • 77、 A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?
  • A、 Remote desktop
  • B、 Access via a crash cart
  • C、 Out-of-band management
  • D、 A Secure Shell connection


  • 78、 systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?
  • A、 Port 443 is not open on the firewall
  • B、 The server is experiencing a downstream failure
  • C、 The local hosts file is blank
  • D、 The server is not joined to the domain


  • 79、 A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?
  • A、 Initialize the volume
  • B、 Format the volume
  • C、 Replace the volume
  • D、 Rebuild the volume


  • 80、 Which of the following will correctly map a script to a home directory for a user based on username?
  • A、\\server\users$\username
  • B、\\server\%username%
  • C、\\server\FirstInitialLastName
  • D、\\server\$username$


  • 81、 Which of the following BEST describes the concept of right to downgrade?
  • A、It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
  • B、It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
  • C、It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
  • D、It allows a previous version of an OS to be installed and covered by the same license as the newer


  • 82、(多选题) ;The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.;Application data IOPS performance is a must.;Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
  • A、Install the OS on a RAID 0 array
  • B、Install the OS on a RAID 1 array.
  • C、Configure RAID 1 for the application data.
  • D、Configure RAID 5 for the application data.
  • E、Use SSD hard drives for the data application array.
  • F、Use SATA hard drives for the data application array.
  • G、Use a single JBOD for OS and application data.


  • 83、 A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?
  • A、 Stop sharing the volume
  • B、 Replace the disk
  • C、 Shut down the SAN
  • D、 Stop all connections to the volume


  • 84、 Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?
  • A、 Cloud
  • B、 Cold
  • C、 Hot
  • D、 Warm


  • 85、 Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?
  • A、 The controller has disabled the write cache.
  • B、 The controller cannot use all the available channels.
  • C、 The drive array is corrupt.
  • D、 The controller has lost its configuration.


  • 86、 A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?
  • A、 Encrypt all network traffic
  • B、 Implement MFA on all the servers with encrypted data
  • C、 Block the servers from using an encrypted USB
  • D、 Implement port security on the switches


  • 87、 A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?
  • A、 Insider threat
  • B、 Worms
  • C、 Ransomware
  • D、 Open ports
  • E、 Two-person integrity


  • 88、 A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163<UP, BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1 Which of the following BEST describes what is happening?
  • A、 The server is configured to use DHCP on a network that has multiple scope options
  • B、 The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
  • C、 The server is configured to use DHCP on a network that does not have a DHCP server
  • D、 The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting


  • 89、 A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?
  • A、Out-of-band management
  • B、Crash cart access
  • C、Virtual administrator console
  • D、Local KVM setup
  • E、RDP connection


  • 90、 A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?
  • A、PK
  • B、SSL
  • C、LDAP
  • D、DNS


  • 91、 A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?
  • A、Log rotation
  • B、Log shipping
  • C、Log alerting
  • D、Log analysis


  • 92、 A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?
  • A、Snapshot a VM.
  • B、Use a physical host.
  • C、Perform a P2V conversion
  • D、Use a VM template


  • 93、 Which of the following describes the installation of an OS contained entirely within another OS installation?
  • A、 Host
  • B、 Bridge
  • C、 Hypervisor
  • D、 Guest


  • 94、 A technician is laying out a filesystem on a new Linux server. Which of the following tools would workBEST to allow the technician to increase a partition's size in the future without reformatting it?
  • A、LVM
  • B、DiskPart
  • C、fdisk
  • D、Format


  • 95、(多选题) A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).
  • A、 The power supply
  • B、 The CPU
  • C、 The hard drive
  • D、 The GPU


  • 96、 Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
  • A、 Live failover
  • B、 Simulated failover
  • C、 Asynchronous
  • D、 Tabletop


  • 97、 A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished??
  • A、Restore the server from a snapshot.
  • B、Restore the server from backup
  • C、Swap the drive and initialize the disk.
  • D、Swap the drive and initialize the array.


  • 98、 A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?
  • A、 Asynchronous
  • B、 Incremental
  • C、 Application consistent
  • D、 Constant


  • 99、 Which of the following technologies would allow an administrator to build a software RAID on a Windows server?
  • A、 Logical volume management
  • B、 Dynamic disk
  • C、 GPT
  • D、 UEFI


  • 100、 A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?
  • A、CIFS
  • B、FTP
  • C、SFTP
  • D、NFS


  • 101、 Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?
  • A、 SLA
  • B、 MTBF
  • C、 RTO
  • D、 MTTR


  • 102、 Which of the following licenses would MOST likely include vendor assistance?
  • A、 Open-source
  • B、 Version compatibility
  • C、 Subscription
  • D、 Maintenance and support


  • 103、 Which of the following techniques can be configured on a server for network redundancy?
  • A、 Clustering
  • B、 Vitalizing
  • C、 Cloning
  • D、 Teaming


  • 104、 Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?
  • A、 Check the power supplies
  • B、 Review the log files.
  • C、 Reinstall the ESX server.
  • D、 Reseat the processors.


  • 105、(多选题) A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?(Choose two.)
  • A、Adware is installed on the users’ devices
  • B、The firewall rule for the server is misconfigured
  • C、The server is infected with a virus
  • D、Intrusion detection is enabled on the network
  • E、Unnecessary services are disabled on the server
  • F、SELinux is enabled on the server


  • 106、 An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?
  • A、 A drive failed in the OS array.
  • B、 A drive failed and then recovered in the data array.
  • C、 A drive failed in both of the arrays.
  • D、 A drive failed in the data array.


  • 107、 A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?
  • A、 Two-person Integrity
  • B、 SSO
  • C、 SIEM
  • D、 Faraday cage
  • E、 MFA


  • 108、 A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady From power-on until the crash. Which of the following will MOST likely resolve the issue?
  • A、Reseating any expansion cards in the server
  • B、Replacing the failing hard drive
  • C、Reinstalling the heat sink with new thermal paste
  • D、Restoring the server from the latest full backup


  • 109、 A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A portscan reports the following ports are open:
  • A、21
  • B、22
  • C、23
  • D、53
  • E、443
  • F、636


  • 110、 A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?
  • A、 Create a group that includes all users and assign it to an ACL.
  • B、 Assign individual permissions on the folder to each user.
  • C、 Create a group that includes all users and assign the proper permissions.
  • D、 Assign ownership on the folder for each user


  • 111、 A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:
  • A、Duplicate IP address
  • B、Incorrect default gateway
  • C、DHCP misconfiguration
  • D、Incorrect routing table


  • 112、 Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?
  • A、 Cable management
  • B、 Rail kits
  • C、 A wireless connection
  • D、 A power distribution unit


  • 113、(多选题) Which of the following, if properly configured, would prevent a user from installing an OS on a server?(Select TWO).
  • A、Administrator password
  • B、Group Policy Object
  • C、Root password
  • D、SELInux
  • E、Bootloader password
  • F、BIOS/UEFI password


  • 114、 Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?
  • A、 Install local external hard drives for affected users.
  • B、 Add extra memory to the server where data is stored.
  • C、 Compress the data to increase available space.
  • D、 Deploy a new Fibre Channel SAN solution.


  • 115、 A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?
  • A、Separate circuits
  • B、An uninterruptible power supply
  • C、Increased PDU capacity
  • D、Redundant power supplies


  • 116、 A company is running an application on a file server. A security scan reports the application has a known
  • A、Upgrade the application package
  • B、Tighten the rules on the firewall
  • C、Install antivirus software
  • D、Patch the server OS


  • 117、 A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
  • A、 Configure a firewall
  • B、 Close the unneeded ports
  • C、 Install a HIDS
  • D、 Disable unneeded services


  • 118、 A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?
  • A、 setenforce 0
  • B、 setenforce permissive
  • C、 Hot
  • D、 setenforce disabled


  • 119、 A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?
  • A、 Firmware incompatibility
  • B、 CPU overheating
  • C、 LED indicators
  • D、 ESD issues


  • 120、 Which of me following should be placed at the top of a Bash script to ensure it can be executed?
  • A、 bash
  • B、 !execute
  • C、 #!
  • D、 @eacho off


  • 121、 A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?
  • A、 Restart the server
  • B、 Configure the network on the server
  • C、 Enable the port on the server
  • D、 Check the DHCP configuration


  • 122、(多选题) A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)
  • A、 Faulty memory
  • B、 Data partition error
  • C、 Incorrectly seated memory
  • D、 Incompatible disk speed
  • E、 Uninitialized disk
  • F、 Overallocated memory


  • 123、 A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?
  • A、 21
  • B、 22
  • C、 23
  • D、 443


  • 124、 A snapshot is a feature that can be used in hypervisors to:?
  • A、roll back firmware updates.
  • B、restore to a previous version.
  • C、roll back application drivers.
  • D、perform a backup restore


  • 125、 A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?
  • A、 SFP+
  • B、 GBIC
  • C、 SFP
  • D、 QSFP+


  • 126、 An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console??
  • A、IP KVM
  • B、VNC
  • C、RDP
  • D、SSH


  • 127、 A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?
  • A、Snapshot
  • B、 Deduplication
  • C、 System Restore
  • D、 Template


  • 128、 A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?
  • A、 echo /newdisk >> /etc/fstab
  • B、 net use /newdisk
  • C、 mount –o remount, rw /newdisk
  • D、 mount –a


  • 微信扫一扫 在线答题 在线出卷 随机出题小程序 闯关答题软件 出题答题小程序