No products in the cart.
CompTIA Server+ Exam Questions
Page 1 of 25
1.
You are reproducing a security incident with a Windows server and want to view the list of connections that are permitted, which requests are getting approved, and what traffic is being dropped. What option should you enable to start logging this information?
-
Windows Firewall
-
Windows Advanced Security
-
Windows DNS
-
Windows IPSec
Correct answer: Windows Firewall
Microsoft Windows has a built-in firewall. The firewall log has to be turned on and when it is, it logs the activity, which can then be found in the pfirewall.log file under the system file directory structure.
2.
Most switches work directly with MAC addresses. Using the OSI model reference, at what layer do those switches operate?
-
Data link
-
Transport
-
Session
-
Physical
Correct answer: Data link
The data link layer establishes and terminates a connection between two physically connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts:
- Logical Link Control (LLC), which identifies network protocols, performs error checking, and synchronizes frames
- Media Access Control (MAC), which uses MAC addresses to connect devices and define permissions to transmit and receive data
3.
All the following are possible causes of service failures EXCEPT:
-
The user needs training on service accounts
-
The service account password has expired
-
The service account has insufficient permissions
-
Dependency services failed to start
Correct answer: The user needs training on service accounts
Service accounts are a special type of non-human privileged account used to execute applications and run automated services, virtual machine instances, and other processes. Service accounts do not require human interaction.
4.
What type of memory is used in the main server systems?
-
DRAM
-
SRAM
-
CRAM
-
VRAM
Correct answer: DRAM
Dynamic random access memory (DRAM) is a type of semiconductor memory that is used for the data or program code needed by a computer processor to function. DRAM is the type of random access memory (RAM) that is used in PCs, workstations, and servers.
5.
What category of firewall does a host-based firewall fall into?
-
Software-based
-
Hardware-based
-
Firmware-based
-
Appliance-based
Correct answer: Software-based
A host-based firewall is a piece of firewall software that runs on an individual computer or device connected to a network. These types of firewalls are a granular way to protect the individual hosts from viruses and malware and to control the spread of these harmful infections throughout the network.
6.
An organization is attempting to balance the cost and availability of its recovery site. Which of the following is the BEST option?
-
Warm
-
Hot
-
Cold
-
Passive
Correct answer: Warm
A warm disaster recovery site has power and communication links, as well as infrastructure in place and ready. In the event of a disaster, software must be installed and data populated into the systems. Warm sites are a middle ground between expensive hot sites and less available cold sites.
Passive is not a type of recovery site.
7.
All the following are possible solutions to address unmountable disk drive issues EXCEPT:
-
Archive the disk log files
-
Reboot
-
Run a disk scan to correct file system errors
-
Format the drive with the file system that is supported by the local OS
Correct answer: Archive the disk log files
An unmountable disk drive can be caused by physical damage, file corruption, or a mismatch in the driver software. In any of these cases, it renders the system unusable because applications need data.
8.
You have purchased 42U-sized server racks. Not all the racks are filled yet. You would like to cover the empty spaces and also ensure that the vents are not blocked. What component can you use to meet these requirements?
-
Rack filler
-
Rail screen
-
Tower filler
-
Blank blade
Correct answer: Rack filler
Rack fillers serve multiple important purposes:
- Reduce access for dust and contaminants
- Add stability to the rack
- Redirect hot exhaust air away from equipment
- Help to optimize the flow of cool air
9.
What category of authentication does biometrics fall into?
-
Something you are
-
Somewhere you are
-
Something you do
-
Something you have
Correct answer: Something you are
Authentication based on something you are uses physiological characteristics. Examples of this are fingerprints, voice recognition, and facial recognition.
10.
All the following are possible solutions to address the Blue Screen of Death (BSoD) issues EXCEPT:
-
Defragment the disk
-
Run memory diagnostics
-
Update, replace, or rollback the driver
-
Reboot using the last known good configuration
Correct answer: Defragment the disk
Blue screens are caused by problems with the hardware or issues with its hardware driver software. Sometimes, they can be caused by issues with low-level software running in the operating system kernel. Storage hardware does not cause blue screens.
11.
Your organization has its user accounts configured on premises. You plan to implement a multi-cloud strategy and do not want to use any proprietary vendor-specific identity federation tools. What open source solution addresses this requirement?
-
Shibboleth
-
Active Directory Federation Services
-
Google Anywhere SSO
-
HTTPS Federation
Correct answer: Shibboleth
Shibboleth is a single sign-on log-in system for computer networks and the internet. It allows people to sign in using just one identity to various systems run by federations of different organizations or institutions.
12.
Which chipset in the CPU architecture handles USB and PCI expansion card slots?
-
Southbridge
-
Northbridge
-
Westbridge
-
Eastbridge
Correct answer: Southbridge
The Southbridge connects to lower-speed peripheral buses such as PCI and USB. The Southbridge is slower than the Northbridge, and information from the CPU has to go through the Northbridge before reaching the Southbridge.
13.
Which chipset in the CPU architecture includes RAM (system memory)?
-
Northbridge
-
Southbridge
-
Westbridge
-
Eastbridge
Correct: Northbridge
The Northbridge is one of the two chips in the core chipset architecture on a motherboard. The Northbridge is connected directly to the CPU via the front-side bus (FSB), and it is responsible for tasks that require the highest performance.
14.
What type of memory chips can detect and fix memory corruption?
-
ECC
-
DRAM
-
SRAM
-
AMDM
Correct answer: ECC
Error correction code (ECC) memory is a type of RAM memory found in workstations and servers. It is built to automatically detect and correct memory errors, which prevents data corruption.
15.
A technician is troubleshooting an issue in a Linux environment and wants to review the logs for a third-party application. In what file group are these logs stored?
-
/var/opt
-
/var/mail
-
/var/cache
-
/var/lib
Correct answer: /var/opt
In the Linux environment, most third-party programs are installed by default to the /var/opt directory. The log files associated with those applications are also placed in this directory structure. These log files provide a wealth of information to understand application behavior.
16.
Routers are used on networks as firewalls to enforce an organization's security policies. What configuration item is used in a router to control inbound and outbound traffic?
-
ACL
-
IDS
-
IAM
-
DPI
Correct answer: ACL
A router examines traffic passing through a network and makes decisions about what to let through and what to block. It uses Access Control List (ACL) tables to determine which access rights each user has to a particular system object, such as a file directory or individual file.
An intrusion detection system (IDS) identifies and alerts on malicious traffic entering a network or computer. Identity and access management (IAM) involves user authentication and authorization. Deep packet inspection (DPI) looks in packet payloads for malware, exfiltrated data, and other threats.
17.
All the following are possible causes of memory leaks EXCEPT:
-
The disk is full
-
Poorly written software
-
Malware
-
Runaway processes that keep consuming resources
Correct answer: The disk is full
Memory leaks happen when a program fails to release memory it has used. Memory leaks can lead to serious system stability issues.
18.
You have several servers installed in a rack and would like to organize and consolidate the cables from those servers together at the back of the rack. What component can you use to meet this requirement?
-
Cable management arm
-
Cable tray
-
Cable conduit
-
Cable run
Correct answer: Cable management arm
A cable management arm is a component that is attached to the back of a rack-mounted device. Cables from the devices are fitted into the arm and can be labeled to maintain data center organization and facilitate troubleshooting.
19.
What is the best way to mitigate potential malware threats from removable storage devices?
-
Disable USB ports
-
Install anti-malware software
-
Scan the hard drive
-
Spot check the RAM
Correct answer: Disable USB ports
A common entry point for malware is through storage media that connects to computers via USB ports. The best way to enforce this centrally is to deny all access to removable storage devices by disabling USB ports altogether.
20.
What type of hardware bus is used to connect peripheral devices such as video, storage, and network cards?
-
PCI
-
SATA
-
NAS
-
NIC
Correct answer: PCI
Peripheral Component Interconnect (PCI) is the most common way to attach add-on controller cards and other devices to a motherboard. Common types of PCI cards are network cards, sound cards, modems, and extra ports, such as Universal Serial Bus (USB).
The Serial Advanced Technology Attachment (SATA) interface is used to connect hard drives to a computer. Network attached storage (NAS) provides access to storage space over the network. The network interface card (NIC) allows a server to be connected to a switch.