1
您的位置: 线上活动  >  在线答题  >  答题题库

111

2024-12-28 23:55:03.226.0.58613

111 在线考试 答题题目
1、 An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the following installation options should the administrator use?
  • A、 Bare metal
  • B、Headless
  • C、Virtualized
  • D、Slipstreamed


  • 2、 A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?
  • A、 DLF configuration
  • B、 MBR failure
  • C、 ECC support
  • D、 MD5 checksum


  • 3、 A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?
  • A、 1U
  • B、 2U
  • C、 3U
  • D、 4U


  • 4、 A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?
  • A、 Separate circuits
  • B、Load balancing
  • C、Server monitoring
  • D、Redundancy


  • 5、 Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?
  • A、The DHCP exclusion needs to be removed.
  • B、The DHCP scope is full.
  • C、The DHCP scope options are misconfigured
  • D、The DHCP lease times are too short.
  • E、The DHCP reservations need to be configured.


  • 6、 An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?
  • A、 Use the keyboard command AH+F12 to switch to the kernel log screen
  • B、 Perform a hard reboot on the server and monitor the server startup
  • C、 Collect a screenshot of the PSOD and note the details after the line detailing the OS version
  • D、 Collect a core dump from the server and store locally before rebooting the hardware


  • 7、 A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?
  • A、 Reinstall the OS and programs.
  • B、 Configure old drives to RAID.
  • C、 Reconfigure the RAID.
  • D、 Install from backup.


  • 8、 A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?
  • A、 The RAID card
  • B、 The BIOS
  • C、 The backplane
  • D、 The HBA


  • 9、 A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?
  • A、 Set up the warm site as a DR cold site.
  • B、 Set up a DR site that is in the cloud and in the same region.
  • C、 Set up the warm site as a DR hot site.
  • D、 Set up a DR site that is geographically located in another region.


  • 10、 Which of the following distributes a load across all interfaces?
  • A、 Link aggregation group
  • B、 Most recently used algorithm
  • C、 Active-passive configuration
  • D、 Failover


  • 11、 An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?
  • A、 Document the findings and actions.
  • B、 Escalate the issue to the management team.
  • C、 Implement the solution.
  • D、 Establish an action plan.


  • 12、 A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?
  • A、 VPN
  • B、 TFTP
  • C、 SSH
  • D、 HTTP


  • 13、 Which of the following is an example of load balancing?
  • A、Round robin
  • B、Active-active
  • C、Active-passive
  • D、Failover


  • 14、 A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?
  • A、 Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
  • B、 Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
  • C、 Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
  • D、 Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.


  • 15、 An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?
  • A、 RAID
  • B、 RAID 1
  • C、 RAID5
  • D、 RAID 10


  • 16、 Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?
  • A、 Aggregation
  • B、 Subscription
  • C、 Merging
  • D、 Collection


  • 17、 The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?
  • A、Drive
  • B、Database
  • C、Folder
  • D、File


  • 18、 A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?
  • A、 Print
  • B、 File
  • C、 Database
  • D、 Messaging


  • 19、 A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?
  • A、 RAID 0
  • B、 RAID 5
  • C、 RAID 6
  • D、 RAID 10


  • 20、 Which of the following backup types copies changed data from a server and then combines the backups on the backup target?
  • A、 Differential
  • B、 Incremental
  • C、 Synthetic full
  • D、 Snapshot


  • 21、 A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?
  • A、Build a warm site and perform a fail over of the application.
  • B、Build a cloud laaS and perform a fail over of the application.
  • C、Build a hot site and perform a fail over of the application.
  • D、Build a cold site and perform a fail over of the application.
  • E、Perform a tabletop fail over of the application.


  • 22、 Which of the following will correctly map a script to a home directory for a user based on username?
  • A、\\server\users$\username
  • B、\\server\%username%
  • C、\\server\FirstInitialLastName
  • D、\\server\$username$


  • 23、 An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?
  • A、 Linked list
  • B、 String
  • C、 Loop
  • D、 Constant


  • 24、 Which of the following is typical of software licensing in the cloud?
  • A、 Per socket
  • B、 Perpetual
  • C、 Subscription-based
  • D、 Site-based


  • 25、(多选题) A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)
  • A、 Host
  • B、 Template
  • C、 Clone
  • D、 Type1
  • E、 Type2
  • F、 Guest


  • 26、(多选题) Following a recent power outage, a server in the data center has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would most likely cause this issue? (Select two).
  • A、 The server has a faulty power supply.
  • B、The server has a CMOS battery failure.
  • C、The server requires OS updates.
  • D、The server has a malfunctioning LED panel.
  • E、The servers have NTP configured.
  • F、CPU frequency scaling is set too high.


  • 27、 An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?
  • A、 Anti-malware
  • B、 Nbtstat
  • C、 Port scanner
  • D、 Sniffer


  • 28、 Which of the following script types would MOST likely be used on a modern Windows server OS?
  • A、 Batch
  • B、 VBS
  • C、 Bash
  • D、 PowerShell


  • 29、 A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?
  • A、 DLP
  • B、 A port scanner
  • C、 Anti-malware
  • D、 A sniffer


  • 30、 A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?
  • A、 The gateway is no longer being reached.
  • B、 The network firewall was enabled.
  • C、 The printer's network interface failed.
  • D、 The printer had DHCP enabled.


  • 31、 Which of the following is used for fail over, providing access to all the services currently in use by an organization without having to physically move any servers or employees?
  • A、 The cloud
  • B、 A cold site
  • C、 A warm site
  • D、 An emergency operations center


  • 32、 An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
  • A、 Load balancing
  • B、 Direct access
  • C、 Overprovisioning
  • D、 Network teaming


  • 33、 An administrator is working locally in a data center with multiple server racks. Which of the following is the best low-cost option to connect to any server while on site?
  • A、 Crash cart
  • B、 IPKVM
  • C、 Remote console access
  • D、 IPMI


  • 34、 An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user can save the updated file while maintaining least-privilege access?
  • A、 Give the user "read and execute" rights to the file.
  • B、 Give the user "modify" rights to the file.
  • C、 Give the user "list folder contents" rights to the folder.
  • D、 Give the user "full control" rights to the folder.


  • 35、 A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is su#cessful. To troubleshoot the issue, the
  • A、 A misconfigured firewall
  • B、 A misconfigured hosts.deny file
  • C、 A misconfigured hosts file
  • D、 A misconfigured hosts.allow file


  • 36、 An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
  • A、 Load balancing
  • B、 Direct access
  • C、 Overprovisioning
  • D、 Network teaming


  • 37、(多选题) A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)
  • A、 Audit all group privileges and permissions
  • B、 Run a checksum tool against all the files on the server
  • C、 Stop all unneeded services and block the ports on the firewall
  • D、 Initialize a port scan on the server to identify open ports
  • E、 Enable port forwarding on port 80
  • F、 Install a NIDS on the server to prevent network intrusions


  • 38、 A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?
  • A、 RAID 0
  • B、 RAID 1
  • C、 RAID 5
  • D、 RAID 6


  • 39、(多选题) A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).
  • A、 Drives
  • B、 Fans
  • C、 CMOSIC
  • D、 Processor
  • E、 Power supplies
  • F、 Motherboard
  • G、 Memory
  • H、 BIOS


  • 40、(多选题) Which of the following, if properly configured, would prevent a user from installing an OS on a server?(Select TWO).
  • A、Administrator password
  • B、Group Policy Object
  • C、Root password
  • D、SELInux
  • E、Bootloader password
  • F、BIOS/UEFI password


  • 41、 A server administrator is tasked with resolving an issue with the server's local storage. The administrator turns on the server and only two out of the four drives are found. After several reboots, an additional hard drive connects and disconnects randomly. Which of the following is most likely the cause?
  • A、RAM
  • B、Power supply
  • C、Cooling failure
  • D、CPU


  • 42、(多选题) Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)
  • A、 Uninstall recent updates.
  • B、 Reimage the server with a different OS.
  • C、 Run a port scan to verify open ports.
  • D、 Enable a GPO to uninstall the update.
  • E、 Scan and remove any malware.
  • F、 Reformat the server and restore the image from the latest backup.


  • 43、 A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?
  • A、Separate circuits
  • B、An uninterruptible power supply
  • C、Increased PDU capacity
  • D、Redundant power supplies


  • 44、 A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?
  • A、 Applying OS updates
  • B、 Disabling unused services
  • C、 Implementing HIDS
  • D、Installing anti-malware


  • 45、 A server administrator receives the following output when trying to ping a local host:ping imhrh-vc.net Reply from imhrh-vc.net.Destination host unreachable.Which of the following is MOST likely the issue?
  • A、Firewall
  • B、DHCP
  • C、DNS
  • D、VLAN


  • 46、 Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?
  • A、 nbtstat
  • B、 netuse
  • C、 tracert
  • D、 netstst


  • 47、 A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?
  • A、 The disk uses GPT.
  • B、 The partition is formatted with ext4.
  • C、 The -partition is formatted with FAT32.
  • D、 The disk uses MBn.


  • 48、(多选题) An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select two).
  • A、 53
  • B、 80
  • C、 389
  • D、 443
  • E、 445
  • F、 3389
  • G、 8080


  • 49、 Which of the following supports virtualization?
  • A、Type 1 hypervisor
  • B、Bare-metal installation
  • C、Server-level redundancy
  • D、Active-active load balancing


  • 50、 Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
  • A、 Telnet
  • B、 Robocopy
  • C、 XCOPY
  • D、 SCP


  • 51、 A server room with many racks of servers is managed remotely with occasional on-site support. Which of thefollowing would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?
  • A、Management port
  • B、Crash cart
  • C、IP KVM
  • D、KVM


  • 52、 A staff memberwho a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same. Which of the following actions would MOST likely remediate the heal issue?
  • A、 Installing blanking panels in all the empty rack spaces
  • B、 installing an additional POU and spreading out the power cables
  • C、 Installing servers on the shelves instead of sliding rails
  • D、 installing front bezels on all the server’s m the rack


  • 53、 A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals??
  • A、A warm site
  • B、A hot site
  • C、Cloud recovery
  • D、A cold site


  • 54、 An organization recently experienced power outages. The administrator noticed the server did not have enough time to shut down properly. After the outages, the administrator had additional batteries installed in the UPS. Which of the following best describes the solution the administrator implemented?
  • A、 The solution reduced shutdown time.
  • B、 The solution improved load balancing,
  • C、 The solution increased power out.
  • D、 The solution extended runtime.


  • 55、(多选题) An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select TWO).
  • A、 53
  • B、 80
  • C、 389
  • D、 443
  • E、45
  • F、3389
  • G、8080


  • 56、(多选题) ;The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.;Application data IOPS performance is a must.;Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
  • A、Install the OS on a RAID 0 array
  • B、Install the OS on a RAID 1 array.
  • C、Configure RAID 1 for the application data.
  • D、Configure RAID 5 for the application data.
  • E、Use SSD hard drives for the data application array.
  • F、Use SATA hard drives for the data application array.
  • G、Use a single JBOD for OS and application data.


  • 57、 An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?
  • A、 /root.ssh/sshd/config
  • B、 /etc.ssh/sshd_config
  • C、 /root/.ssh/ssh_config
  • D、 /etc.sshs_shd_config


  • 58、 A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?
  • A、 Alerting
  • B、 Retention
  • C、 Shipping
  • D、 Rotation


  • 59、 Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?
  • A、 Fencing
  • B、 Bollards
  • C、 Camouflage
  • D、 Reflective glass


  • 60、 A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A portscan reports the following ports are open:
  • A、21
  • B、22
  • C、23
  • D、53
  • E、443
  • F、636


  • 61、 A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?
  • A、 Stop sharing the volume
  • B、 Replace the disk
  • C、 Shut down the SAN
  • D、 Stop all connections to the volume


  • 62、 Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?
  • A、 Disable the heartbeat network.
  • B、 Replace the disk
  • C、 Set the cluster to active-active.
  • D、 Failover all VMs.


  • 63、 Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
  • A、 Live failover
  • B、 Simulated failover
  • C、 Asynchronous
  • D、 Tabletop


  • 64、 A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?
  • A、 Apply security updates.
  • B、 Disable unneeded hardware.
  • C、 Set a BIOS password.
  • D、 Configure the boot order.


  • 65、 A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?
  • 0
  • B、1
  • C、5
  • D、6


  • 66、 A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?
  • A、CIFS
  • B、FTP
  • C、SFTP
  • D、NFS


  • 67、 Which of the following life-cycle management phases deals with a server that is no longer in operation?
  • A、 End-of-life
  • B、 Disposal
  • C、 Usage
  • D、 Procurement


  • 68、 A technician runs top on a dual-core server and notes the following conditions:top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6 Which of the following actions should the administrator take?
  • A、 Schedule a mandatory reboot of the server
  • B、 Wait for the load average to come back down on its own
  • C、 Identify the runaway process or processes
  • D、 Request that users log off the server


  • 69、 A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?
  • A、Disable port 389 on the server
  • B、Move traffic from port 389 to port 443
  • C、Move traffic from port 389 to port 637
  • D、Enable port 389 for web traffic


  • 70、 A user logs in to a Linux server and attempts to run the following command:
  • A、visudo I grep userid
  • B、sudo -1 -U userid
  • C、cat /etc/passwd
  • D、userlist I grep userid


  • 71、 A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?
  • A、 Inform the impacted users.
  • B、Make the changes to the system.
  • C、Determine the probable causes.
  • D、Identify changes to the server.


  • 72、 Which of the following BEST describes overprovisioning in a virtual server environment?
  • A、 Committing more virtual resources to virtual machines than there are physical resources present
  • B、 Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
  • C、 Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
  • D、 Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure


  • 73、 An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?
  • A、 Load balancing
  • B、Direct access
  • C、Overprovisioning
  • D、Network teaming


  • 74、 The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?
  • A、 Set a BIOS/UEFI password on the server.
  • B、 Change the boot order on the server and restrict console access.
  • C、Configure the host OS to deny login attempts via USB.
  • D、 Disable all the USB ports on the server.


  • 75、 A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?
  • A、Full
  • B、Bare metal
  • C、Core
  • D、GUI


  • 76、 A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:nfsserver:/home /home nfs defaults 0 0 However, a df -h /home command returns the following information: /dev/sda2 10G 1G 9G 10% /home Which of the following should the technician attempt FIRST to resolve the issue?
  • A、mkdir /home
  • B、umount nfsserver:/home
  • C、rmdir nfsserver:/home/dev/sda2
  • D、mount /home


  • 77、 A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?
  • A、QSFP+
  • B、10 GigE
  • C、SFP
  • D、SFP+


  • 78、 A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?
  • A、 The read and write performance will be impacted.
  • B、 The read performance will be impacted.
  • C、 The performance will not be impacted.
  • D、 The write performance will be impacted.


  • 79、 A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?
  • A、Rack
  • B、Virtual
  • C、Tower
  • D、Blade


  • 80、 Which of the following backup types should be chosen for database servers?
  • A、 Differential
  • B、 Incremental
  • C、 Synthetic full
  • D、 Open file


  • 81、 A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non- essential ports be disabled on the firewall.Which of the following ports must remain open?
  • A、 25
  • B、53
  • C、443
  • D、3389
  • E、8080


  • 82、 A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?
  • A、 255.255.255.0
  • B、 255.255.255.128
  • C、 255.255.255.224
  • D、 255.255.255.252


  • 83、 A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?
  • A、Out-of-band management
  • B、Crash cart access
  • C、Virtual administrator console
  • D、Local KVM setup
  • E、RDP connection


  • 84、 A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?
  • A、 setenforce 0
  • B、 setenforce permissive
  • C、 Hot
  • D、 setenforce disabled


  • 85、 Which of the following script types uses commands That start with sec-?
  • A、 Batch
  • B、 Bash
  • C、 PowerShell
  • D、 JavaScript


  • 86、 A server administrator has received tickets from users who report the system runs very slowly and various unrelated messages pop up when they try to access an internet-facing web application using default ports. The administrator performs a scan to check for open ports and reviews the following report: Starting Nmap 7.70 https://nmap.org) at 2019-09-19 14:30 UTC Nmap scan report for www.abc.com (172.45.6.85)Host is up (0.0021s latency) Other addresses for www.abc.com (not scanned) : 4503 : F7b0 : 4293: 703: : 3209 RDNS record for 172.45.6.85: 1ga45s12-in-f1.2d100.net Port State Service 21/tcp filtered ftp 22/tcp filtered ssh 23/tcp filtered telnet 69/tcp open @username.com 80/tcp open http 110/tcp filtered pop 143/tcp filtered imap 443/tcp open https 1010/tcp open www.popup.com 3389/tcp filtered ms-abc-server Which of the following actions should the server administrator perform on the server?
  • A、 Close ports 69 and 1010 and rerun the scan.
  • B、 Close ports 80 and 443 and rerun the scan.
  • C、 Close port 3389 and rerun the scan.
  • D、 Close all ports and rerun the scan.


  • 87、 Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?
  • A、 Loop
  • B、 Variable
  • C、Comparator
  • D、Conditional


  • 88、 A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses. Which of the following will the technician MOST likely use for the IP address assignment?
  • A、Static
  • B、Router-assigned
  • C、APIPA
  • D、DHCP


  • 89、 An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?
  • A、 135
  • B、 636
  • C、 3268
  • D、 3389


  • 90、 A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:
  • A、 the correct firewall zone is active
  • B、 the latest firmware was applied
  • C、 NTP is running on the database system
  • D、 the correct dependencies are installed


  • 91、 A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?
  • A、 The IP address
  • B、 The default gateway
  • C、 The VLAN
  • D、 The subnet mask


  • 92、 An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?
  • A、 Anti-malware
  • B、 Nbtstat
  • C、 Port scanner
  • D、 Sniffer


  • 93、 An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?
  • A、 Replace all the array drives at once and then expand the array.
  • B、 Expand the array by changing the RAID level to 6.
  • C、 Expand the array by changing the RAID level to 10.
  • D、 Replace the array drives one at a time and then expand the array.


  • 94、 Which of the following describes the concept of allocating more resources than what is available on a hypervisor?
  • A、 Direct access
  • B、Overprovisioning
  • C、Link aggregation
  • D、Component redundancy
  • E、Scalability


  • 95、(多选题) Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)
  • A、 The server has a faulty power supply
  • B、 The server has a CMOS battery failure
  • C、 The server requires OS updates
  • D、 The server has a malfunctioning LED pane
  • E、 The servers do not have NTP configured
  • F、 The time synchronization service is disabled on the servers


  • 96、 Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?
  • A、 Incremental
  • B、Differential
  • C、Archive
  • D、Snapshot
  • E、Full


  • 97、 A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue?
  • A、 A S.M.A.R.T. error is a predictive failure notice. The drive will fail in the near future and should be replaced at the next earliest time possible
  • B、 A S.M.A.R.T. error is a write operation error. It has detected that the write sent to the drive was incorrectly formatted and has requested a retransmission of the write from the controller
  • C、 A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly
  • D、 A S.M.A.R.T. error is an ECC error. Due to error checking and correcting, the drive has corrected the missing bit and completed the write operation correctly.


  • 98、 A server administrator is reviewing the following specifications:VM01 Host: CPU: 2 Physical, 4 Cores RAM: 16GB Storage: 16TB Server 1 on VM01: CPU: 1 virtual socket, 1 core per socket RAM: 4GB Storage: 8TB Server 2 on VM01: CPU: 2 virtual sockets, 2 cores per socket RAM: 8GB Storage: 10TB Which of the following is described given these specifications?
  • A、 Virtual switch
  • B、 Host vs. guest
  • C、 Overprovisioning
  • D、 Scalability


  • 99、 A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?
  • A、 Copy and send an SSD to the site.
  • B、 Copy and send a DVD to the site.
  • C、 Copy and send a SATA drive to the site.
  • D、 Copy and send a microSD card to the site.


  • 100、 A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?
  • A、 Crash cart
  • B、 Out-of-band console
  • C、 IP KVM
  • D、 RDP


  • 101、 A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?
  • A、 Network
  • B、 Embedded
  • C、 Optical
  • D、 USB


  • 102、 A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?
  • A、 Check the power cables
  • B、 Clean the fans.
  • C、 Replace the RAM.
  • D、 Reattach the CPU heat sink


  • 103、 A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?
  • A、 255.255.255.0
  • B、 255.255.255.128
  • C、 255.255.255.240
  • D、 255.255.255.254


  • 104、 A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?
  • A、 RAID 0
  • B、 RAID 1
  • C、 RAID 5
  • D、 RAID 6


  • 105、 A company created a new DR plan. The management team would like to begin performing a review of this plan without endangering company data and with a minimal time commitment. Which of the following testing methods would best allow for this type of review?
  • A、 Simulated
  • B、 Tabletop
  • C、 Live
  • D、 Non-production


  • 106、 Which of the following authentication types defines credentials as "something you have"?
  • A、 Swipe pattern
  • B、 PIN
  • C、 Fingerprint
  • D、 Smart card


  • 107、 A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?
  • A、 RA,NAT
  • B、 ICMP
  • C、 VLAN
  • D、 NIDS


  • 108、 The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?
  • A、 Copy the existing data to an external USB 3 0 enclosure.
  • B、 Place the existing data on a DVD and use the internal DVD-ROM drive.
  • C、 Transfer the existing data to an external eSATA enclosure.
  • D、 Move the existing data to a new. larger internal hard drive.


  • 109、 An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the MINIMUM number of disks needed for this application?
  • A、 6
  • B、 7
  • C、 8
  • D、 9


  • 110、 An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?
  • A、 Modifying the MAC used on the DHCP reservation
  • B、 Updating the local hosts file with the correct IP address
  • C、 Modifying the WWNN used on the DHCP reservation
  • D、 Updating the NIC to use the correct WWNN


  • 111、 A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:
  • A、 hardware is UEFI compliant
  • B、 volume is formatted as GPT
  • C、 volume is formatted as MBR
  • D、 volume is spanned across multiple physical disk drives


  • 112、 A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?
  • A、 GUI
  • B、 Core
  • C、 Virtualized
  • D、 Clone


  • 113、 An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?
  • A、 Use a RDP/VNC session
  • B、 Modify the startup configuration.
  • C、 Use a PowerSheII/Bash script.
  • D、 Use the BIOS/UEFI setup.


  • 114、 A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps.Which of the following testing methods is the administrator MOST likely performing?
  • A、Backup recovery
  • B、Simulated
  • C、Tabletop
  • D、Live failover


  • 115、 Which of the following types of physical security controls would most likely be a target of a social engineering attack?
  • A、A security guard
  • B、An access control vestibule
  • C、Perimeter fencing
  • D、Biometric locks
  • E、Bollards


  • 116、 A server administrator notices the /var/log/audit/audit.log file on a Linux server is rotating loo frequently. The administrator would like to decrease the number of times the leg rotates without losing any of the information in the logs. Which of the following should the administrator configure?
  • A、 increase the audit. log file size in the appropriate confutation file.
  • B、 Decrease the duration of the log rotate cycle tor the audit. log file.
  • C、 Remove the tog rotate directive from the audit .log We configuration.
  • D、 Move the audit. leg files to a remote syslog server.


  • 117、 An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?
  • A、 The page file is too small.
  • B、 The CPU has failed.
  • C、 There are multiple failed hard drives.
  • D、 There are mismatched RAM modules.
  • E、 RAID 5 requires four drives


  • 118、 A data center has 4U rack servers that need to be replaced using VMs but without losing any data. Which of the following methods will MOST likely be used to replace these servers?
  • A、 Unattended scripted OS installation
  • B、 P2V
  • C、 VM cloning


  • 119、 A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?
  • A、 An ACL
  • B、 Antivirus
  • C、 DLP
  • D、 A firewall


  • 120、 Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?
  • A、Connect the server to a KVM.
  • B、Use cable management.
  • C、Connect the server to a redundant network.
  • D、Connect the server to a UPS


  • 121、 A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?
  • A、 Initialize the volume
  • B、 Format the volume
  • C、 Replace the volume
  • D、 Rebuild the volume


  • 122、 A junior administrator reported that the website used for anti-malware updates is not working. The senior administrator then discovered all requests to the anti-malware site are being redirected to a malicious site. Which of the following tools should the senior administrator check first to identify the potential cause of the issue?
  • A、 Data loss prevention
  • B、File integrity monitor
  • C、Port scanner
  • D、Sniffer


  • 123、 A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?
  • A、 The kernel is corrupt.
  • B、 Resources are misallocated.
  • C、 The backplane has failed.
  • D、 The drives need to be reseated.


  • 124、 Which of the following is the MOST secure method to access servers located in remote branch offices?
  • A、 Use an MFAout-of-band solution.
  • B、 Use a Telnet connection.
  • C、 Use a password complexity policy.
  • D、 Use a role-based access policy.


  • 125、 An administrator is installing a new file server that has four drive bays available.Which of the following RAID types would provide the MOST storage as well as disk redundancy?
  • A、 RAID0
  • B、 RAID1
  • C、 RAID5
  • D、 RAID10


  • 126、 Which of the following asset management documents is used to identify the location of a serves within a data center?
  • A、 Infrastructure diagram
  • B、 Workflow diagram
  • C、 Rack layout
  • D、 Service manual


  • 127、 Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?
  • A、 Warranty
  • B、 Purchase order
  • C、 License
  • D、 Baseline document


  • 128、 A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?
  • A、 Round robin
  • B、 Link aggregation
  • C、 Most recently used
  • D、 Heartbeat


  • 129、 Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
  • A、Heartbeat
  • B、Failback
  • C、Redundancy
  • D、Load balancing


  • 130、 A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?
  • A、 Partition the drive.
  • B、 Create a new disk quota.
  • C、 Configure the drive as dynamic.
  • D、 Set the compression.


  • 131、 A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?
  • A、 eSATA
  • B、 USB
  • C、 FC
  • D、 iSCSI


  • 132、 A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?
  • A、 Necessary dependencies were installed for multiple architectures.
  • B、 There is not enough hard drive space.
  • C、 The server is infected with a virus.
  • D、 Some modules are not compatible.


  • 133、 While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?
  • A、Revert any patches or updates on the server from the past 24 hours
  • B、Reproduce the issue in a test environment and confirm the database fails in the same manner
  • C、Perform a root cause analysis and report the issue to management
  • D、Collect all logs from the system and review the actions the technician performed
  • E、Perform a quick backup of the system to prevent any further issues


  • 134、 An administrator received an alert that a backup job has been unsuccessful in the previous three attempts. The administrator discovers the issue occurred while backing up a user's data on a network share. Which of the following actions would be best to allow the job to complete successfully?
  • A、 Enabling open file backups in the backup job
  • B、 Moving the user's data off the network share
  • C、 Excluding the user's data from the backup
  • D、 Changing the backup job to exclude certain file types


  • 135、 A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as
  • A、 Copy the fileshare to an LTO-4 tape drive
  • B、 Configure a new incremental backup job for the fileshare
  • C、 Create an additional partition and move a copy of the fileshare
  • D、 Create a snapshot of the fileshare


  • 136、 A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?
  • A、 echo /newdisk >> /etc/fstab
  • B、 net use /newdisk
  • C、 mount –o remount, rw /newdisk
  • D、 mount –a


  • 137、 Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
  • A、 Encrypt the data that is leaving the SAN
  • B、 Encrypt the data at rest
  • C、 Encrypt the host servers
  • D、 Encrypt all the network traffic


  • 138、 A startup is migrating a stand-alone application that stores Pll to the cloud. Which of the following should be encrypted?
  • A、 Datain transit
  • B、Dataat rest
  • C、Databackups
  • D、Dataarchives


  • 139、 An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?
  • A、 The user accounts are locked out
  • B、 The NTP on the client side is misconfigured
  • C、 MFA is not working
  • D、The wrong time zone was set in the remote office


  • 140、 An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconfig:The application server is reading the following output from ipconf ig:Which of the following most likely contains an error?
  • A、 IP address
  • B、 DHCP
  • C、 Gateway
  • D、 Subnet mask


  • 141、 Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?
  • A、 Hybrid
  • B、 Public
  • C、 Private
  • D、 Community


  • 142、 An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using??
  • A、iSCSI
  • B、eSATA
  • C、NFS
  • D、FcoE


  • 143、 A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?
  • A、Log rotation
  • B、Log shipping
  • C、Log alerting
  • D、Log analysis


  • 144、 Which of the following should a technician verify FIRST before decommissioning and wiping a file server?
  • A、The media destruction method
  • B、The recycling poke?
  • C、Asset management documentation
  • D、Non-utilization


  • 145、 A technician wants to limit disk usage on a server. Which of the following should the technician implement?
  • A、Formatting
  • B、Compression
  • C、Disk quotas
  • D、Partitioning


  • 146、 Which of the following symbols is used to write a text description per line within a PowerShell script?
  • A、 %
  • B、 @
  • C、 &
  • D、 #


  • 147、 Which of the following describes when a site is considered a warm site?
  • A、It has basic technical facilities connected to it.
  • B、It has faulty air conditioning that is awaiting service.
  • C、It is almost ready to take over all operations from the primary site.
  • D、It is fully operational and continuously providing services.


  • 148、 Which of the following licenses would MOST likely include vendor assistance?
  • A、 Open-source
  • B、 Version compatibility
  • C、 Subscription
  • D、 Maintenance and support


  • 149、(多选题) Which of the following open ports should be closed to secure the server properly? (Choose two.)
  • A、 21
  • B、 22
  • C、 23
  • D、 53
  • E、 443
  • F、 636


  • 150、 Which of the following licensing models was created by software companies in response to the increasing density of processors?
  • A、 Per-instance
  • B、 Per-server
  • C、 per-user
  • D、 per-core


  • 151、 A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?
  • A、 MTBF
  • B、 RTO
  • C、 MTTR
  • D、 RPO


  • 152、 A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?
  • A、 QSFP+
  • B、 10 GigE
  • C、 SFP
  • D、 SFP+


  • 153、 A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?
  • A、 The jumbo frames are not enabled.
  • B、 The subnet mask is incorrect.
  • C、 There is an IP address conflict.
  • D、 There is an improper DNS configuration.


  • 154、 A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?
  • A、 SFP+
  • B、 GBIC
  • C、 SFP
  • D、 QSFP+


  • 155、 A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?
  • A、 Off-site backups
  • B、 Full backups
  • C、 Differential backups
  • D、 Incremental backups


  • 156、 Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?
  • A、 Private
  • B、 Hybrid
  • C、 Community
  • D、 Public


  • 157、 Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services. Which of the following types of authentications is described in this scenario?
  • A、 MFA
  • B、 NTLM
  • C、 Kerberos
  • D、 SSO


  • 158、 A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?
  • A、PK
  • B、SSL
  • C、LDAP
  • D、DNS


  • 159、 A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?
  • A、 VLAN
  • B、 vNIC
  • C、 Link aggregation
  • D、 Failover


  • 160、 A technician is laying out a filesystem on a new Linux server. Which of the following tools would workBEST to allow the technician to increase a partition's size in the future without reformatting it?
  • A、LVM
  • B、DiskPart
  • C、fdisk
  • D、Format


  • 微信扫一扫 在线答题 在线出卷 随机出题小程序 闯关答题软件 出题答题小程序