Question #1
Which of the following is typical of software licensing in the cloud?
A. Per socket
B. Perpetual
C. Subscription-based
D. Site-based
Correct Answer: C
Question 2
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. 11.251.196.241
B. 171.245.198.241
C. 172.16.19.241
D. 193.168.145.241
Correct Answer: C
Question 3
A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?
A. Separate circuits
B. An uninterruptible power supply
C. Increased PDU capacity
D. Redundant power supplies
Correct Answer: A
Question 4
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
Correct Answer: B
Question 5
A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the
OS. Which of the following should the technician do NEXT to install the firmware?
A. Press F8 to enter safe mode
B. Boot from the media
C. Enable HIDS on the server
D. Log in with an administrative account
Correct Answer: B
Question 6
A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?
A. nslookup
B. nbtstat
C. telnet
D. netstat -a
Correct Answer: D
Question 7
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
A. User account control
B. Anti-malware
C. A sniffer
D. A port scanner
Correct Answer: D
Question 8
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?
A. Upgrade the application package
B. Tighten the rules on the firewall
C. Install antivirus software
D. Patch the server OS
Correct Answer: A
Question 9
Which of the following policies would be BEST to deter a brute-force login attack?
A. Password complexity
B. Password reuse
C. Account age threshold
D. Account lockout threshold
Correct Answer: D
Question 10
A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?
A. RAID 0
B. RAID 5
C. RAID 6
D. RAID 10
Correct Answer: C
Question 11
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?
A. Bridged
B. NAT
C. Host only
D. vSwitch
Correct Answer: B
Question 12
Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?
A. SLA
B. MTBF
C. RTO
D. MTTR
Correct Answer: C
Question 13
A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons?
(Choose two.)
A. The server has an architecture mismatch
B. The system time is not synchronized
C. The technician does not have sufficient privileges
D. The external firewall is blocking access
E. The default gateway is incorrect
F. The local system log file is full
Correct Answer: AB
Question 14
Which of the following would be BEST to help protect an organization against social engineering?
A. More complex passwords
B. Recurring training and support
C. Single sign-on
D. An updated code of conduct to enforce social media
Correct Answer: D
Question 15
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?
A. Stop sharing the volume
B. Replace the disk
C. Shut down the SAN
D. Stop all connections to the volume
Correct Answer: B
Question 16
A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?
A. CIFS
B. FTP
C. SFTP
D. NFS
Correct Answer: A
Question 17
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)
A. Perform a root cause analysis
B. Develop a plan of action
C. Document the findings
D. Escalate the issue
E. Scope the issue
F. Notify the users
Correct Answer: CF
Question 18
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:
The administrator configures the IP address for the new server as follows:
IP address: 192.168.1.1/24 –
Default gateway: 192.168.10.1 –
A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A. IP address: 192.168.10.2/24 Default gateway: 192.168.10.1
B. IP address: 192.168.1.2/24 Default gateway: 192.168.10.1
C. IP address: 192.168.10.3/24 Default gateway: 192.168.20.1
D. IP address: 192.168.10.24/24 Default gateway: 192.168.30.1
Correct Answer: B
Question 19
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?
A. iSCSI
B. eSATA
C. NFS
D. FCoE
Correct Answer: A
Question 20
HOTSPOT –
A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an
internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to
access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the
Internet connectivity issues.
INSTRUCTIONS –
Perform the following steps:
1. Click on the proxy server to display its routing table.
2. Modify the appropriate route entries to resolve the Internet connectivity issue.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:
Correct Answer: