Q1. A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access. Which of the following could validate this hypothesis?
A. Port scanner
B. Cipher tools
C. Checksum analyzer
D. TDR
Answer: A
Q2. A system administrator is tasked to set up a file server. The file server must be able to support access control lists and logging for auditing purposes. To meet these requirements, with which of the followingfile system typesshould theadministratorformat the file system?
A. SMB
B. NTFS
C. VMFS
D. CIFS
Answer: B
Q3. Swap space or page file is reserved on the:
A. motherboard.
B. memory.
C. hard disk.
D. CPU.
Answer: C
Q4. A technician would like to restrict when internal hardware components on the server are accessed. Which of the following server hardening techniques should the technician implement?
A. Intrusion detection
B. BIOS password
C. Chassis lock
D. Disable WOL
Answer: C
Q5. A technician is installing a 2U rack mount server. The necessary rack space height to accommodate the server is:
A. 2.5 inches (.064 meter).
B. 3.0 inches (.076 meter).
C. 3.5 inches (.089 meter).
D. 4.0 inches (.10 meter).
Answer: C
Q6. A system administrator has determined thatmore storageis needed for company data. The storage requires thehighest speed data transfer rate with maximum performance. Which of the following solutions MUSTbe implemented to meet the business requirements?
A. FC SAN
B. FCoE
C. iSCSI
D. JBOD
Answer: A
Q7. A systemadministrator is tasked with dividing the network so that each department is separate from the other. Which of the following should be used to accomplish this task?
A. VLAN
B. VPN
C. VNC
D. VM
Answer: A
Q8. An administrator needs to control servers locally via a console. The administrator wants a rack mounted solution for easy access. Which of the following should be installed?
A. iDRAC
B. KVM
C. ILO
D. RDP
Answer: B
Q9. Which of the following server types translates FQDNs to IP addresses?
A. DHCP
B. SMTP
C. DNS
D. FTP
Answer: C
Q10. A server administrator wants to upgrade the memory of the server using two memory modules. The server has two banks of memorywith the followingslotsavailable: A2, A3, A4, B2, B3, and B4. In whichof the following two slotsshould theadministrator install the additional RAM?
A. Slots A2 and A3
B. Slots A2 and B2
C. Slots A2 and B4
D. Slots B2 and B3
Answer: B
Q11. Employees working for a company were harmed by toxic fumes during a fire. To prevent this from reoccurring, which of the following cable typesisSAFEST to use?
A. CAT6 cables
B. Plenum cables
C. Fiber cables
D. Coaxial cables
Answer: B
Q12. A technician is asked to install an additional NIC in a server. Which of the following hardware considerations would be BEST for the technician to make?
A. Power consumption
B. Bus type and speed
C. CPU stepping
D. CAS latency
Answer: B
Q13. A network administrator is installing additional devices on the network. Currently, the network segment is utilizing all allocated IP addresses. If there are additional addresses available, which of the following would be BEST for the network administrator to perform to accommodate the new network devices?
A. Create a new DHCP scope for the network segment in question.
B. Configure the DHCP server for IPv6.
C. Configure the network to use NAT for the network segment in question.
D. Increase the size of the DHCP scope for the network segment in question.
Answer: D
Q14. A datacenter technician encounters a power receptacle labeled NEMA L5-30. Which of the following powers is this socket rated for?
A. 115v 30 amp
B. 208v 30 amp
C. 220v 1 phase
D. 440v 3 phase
Answer: A
Q15. A server administrator is setting up a new set of hosts for an application that requires communication between all the hosts on a dedicated private subnet. Initially, the configuration consists of four hosts and is expected to grow to 48 total as the application is implemented for the entire company. When configuring the private subnet, which of the following CIDR netmasks would allow for the full number of hosts once the application is fully in production with the least number of unused addresses allocated?
A. /25
B. /26
C. /27
D. /28
Answer: B