Q1. An administrator sees a message in the system console that a drive is bad in the single- volume JBOD storage array. A few minutes later, a user calls the help deskto report an inability to read a file from amapped drive.Which of the following should theadministratordo?
A. Swap out the failed drive and let the array rebuild.
B. Allow the array rebuild automatically using the hotspare.
C. Replace the failed drive and restore the data from the last backup.
D. Reseat the failed drive and restore the array using the parity drive.
Answer: C
Q2. Which of the following involves finding and correcting the MOST important reason for performance issues?
A. Root cause analysis
B. Replicating the problem
C. Defining preventative action
D. Theory of probable cause
Answer: A
Q3. A server's runtime during power outages is too short to shut down properly. A system technician is asked to remediate the problem. Which of the following would be the result of adding additional batteries to the UPS?
A. Increased load balancing
B. Extended uptime
C. Greater efficiency
D. Increased power output
Answer: B
Q4. When using multifactor authentication, which of the following represents “something you have”?
A. A password
B. A PIN
C. A fingerprint
D. An ID card
Answer: D
Q5. A technician is troubleshooting a Linux server and wants to inspect the free disk space on the /dev/sda partition of the system. Which of the following command line tools should the administrator run to view available disk space on the partition?
A. dd
B. du
C. ls
D. df
Answer: D
Q6. An administrator receives multiple reports that users cannot access a secure website hosted on a server the administrator manages. The administrator investigates and discovers that the reason users cannot access the secure site is because:
A. port 22 is closed.
B. port 80 is closed.
C. port 443 is closed.
D. port 3389 is closed.
Answer: C
Q7. Which of the following allows virtual machines to share the NIC of the host?
A. Virtual LANs
B. NAT
C. Bridging
D. Virtual NICs
Answer: C
Q8. Which of the following is the MOST secure to erase data before disposal of server hard drives?
A. Hard wipe
B. Reformat
C. Degaussing
D. Delete partitions
Answer: C
Q9. An administrator is updating theserver infrastructure atacompany's disaster recovery site. Currently, an enormous amount of effortisrequired by theadministratorto replicate operations. Which of the followingtypes of siteis the administrator currently using?
A. Cold site
B. Hot site
C. Warm site
D. Replication site
Answer: A
Q10. A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access. Which of the following could validate this hypothesis?
A. Port scanner
B. Cipher tools
C. Checksum analyzer
D. TDR
Answer: A