Q1. A user is unabletosave a newpresentation to the network U:\ drive. The error message indicates that there is no available space. Other users in the department arenotexperiencinganyproblems saving to the U:\ drive.Which of the following is the MOST likely cause of this issue?
A. The user does not have permissions to use the U:\ drive.
B. The user's disk quota has been exceeded on the U:\drive.
C. The user's local drive is out of space.
D. The user does not have the U:\ drive mapped.
Answer: B
Q2. A new DHCP server is placed on a network segment during off hours. When work resumes, users on a different network segment report connectivity issues. Users on the same network segment report no connectivity issues. Which of the following is the MOST likely reason for the connectivity issues?
A. The DHCP server was configured without specifying a WINS server address for the users.
B. The DHCP server was configured without specifying a DNS server address for the users.
C. The DHCP relay agent was not configured on the adjacent network segment.
D. The DHCP server was configured to use private IP addressing to all network segments.
Answer: C
Q3. A server administrator is creating a design for a new datacenter. The servers should be configured for maximum availability and also provide caching for user information requests. Which of the following techniques should be used?
A. Active/Passive
B. Round robin
C. Heartbeat
D. Active/Active
E. Passive/Passive
Answer: D
Q4. A server administrator is bringing a new host online. After the initial OS installation and configuration, the administrator is unable to reach hosts on another subnet. The administrator is able to ping and access other hosts on the same subnet. Which of the following should the administrator check FIRST?
A. Default gateway
B. Netmask
C. DNS A (AAAA) record
D. DNS reverse lookup entry
Answer: A
Q5. An administrator is securing a secure web server by disabling ports. After completing this process, clients cannot access the secure web server. The administrator should now go back and verify whether which of the following ports is enabled?
A. 23
B. 389
C. 443
D. 445
Answer: C
Q6. An emergency power off accidentally occurs in a datacenter during a fire alarm test. On recovery, the server administrator notices that an external storage array is performing consistency checks on all the volumes configured in the array. Which of the following
components of the storage array has MOST likely failed or faulted?
A. Redundant controller
B. Cold spare drive
C. Battery backed cache
D. Cache memory modules
Answer: C
Q7. As a best practice, which of the following should be determined prior to provisioning a server? (Select TWO).
A. User accounts
B. Group accounts
C. Hostname
D. MAC address
E. Domain name
F. IP address
Answer: C,F
Q8. A server technician needs to access a remote Unix server for administration. The technician has requested that ports 23, 25, and 161 be opened on the router. After the ports are opened, the technician is still unable to connect to the Unix server. Which of the following ports should be opened on the server to allow for remote administration?
A. TCP 21
B. TCP 22
C. UDP 69
D. TCP 3389
Answer: B
Q9. Which of the following methods should be used when classified or sensitive data is stored on a server?
A. Directory encryption
B. Whole disk encryption
C. File encryption
D. Partition encryption
Answer: B
Q10. Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to:
A. uninstall each server application and reinstall the two new applications.
B. install another application to see if this improves the server response time.
C. install antivirus and malware software.
D. uninstall the newly installed applications one at a time.
Answer: D
Q11. Which of the following describes a rack mounted server that is 2 rack units (2U) in height?
A. 2.5 inches (6.35 cm)
B. 3.0 inches (7.62 cm)
C. 3.5 inches (8.89 cm)
D. 4.0 inches (10.16 cm)
Answer: C
Q12. Which of the following is the MOST secure method of storing critical and sensitive system information (e.g. administrative passwords, trusted signing keys)?
A. Store the information encrypted and offline in a storage safe.
B. Encrypt the information using a zip file with a password.
C. Utilize a drive with full disk encryption enabled.
D. Create an encrypted virtual disk for storage.
Answer: A
Q13. A technician is tasked with creating a test system containing non-critical data. The technician has limited hardware, but needs maximum performance. Which of the following RAID levels should the technician use?
A. 0
B. 1
C. 5
D. 10
Answer: A
Q14. A company is planning to replace old hardware and needs to budget accordingly. Which of the following is likely to contain a list of end of life servers?
A. The server's warranty information.
B. The server's life cycle schedule.
C. The asset management database.
D. The software licensing agreement.
Answer: C
Q15. A system administrator wants to assure that a server is responsive. Which of the following networking tools should the administrator use to verify network connectivity?
A. arp
B. netstat
C. ipconfig
D. ping
Answer: D