No products in the cart.
CompTIA Server+ Exam Questions
Page 10 of 25
181.
Racks use a standard increment to express the height of a piece of computer or networking equipment installed in the rack. This is abbreviated as “U.”
What is the height in inches of a 4U rack-mounted device?
-
Seven
-
Six
-
Eight
-
Four
Correct answer: Seven
The standard U increment used to express the height of a piece of computer or networking equipment installed in a rack is equal to 1.75 inches. 4U equals seven inches.
182.
What device built into a server motherboard ensures that the server CPU only gets the voltage at the level it needs for normal operations?
-
VRM
-
HDI
-
KVM
-
VDH
Correct answer: VRM
CPUs use voltage regulator modules (VRMs) to control and lower the voltage to avoid exceeding their maximum voltage capabilities. VRMs ensure that the power supplied to components is consistent and steady.
183.
You have identified that your company has some Windows XP computers in active use. Which of the following stages of the server asset life cycle should these be in?
-
Decommissioning
-
Provisioning
-
Configuring
-
Monitoring
Correct answer: Decommissioning
The asset life cycle consists of the following phases: provisioning, configuring, managing, monitoring, and decommissioning. Decommissioning is the phase where assets are retired, data and media are wiped, and the physical asset is disposed of. Windows XP computers are outdated and should be decommissioned.
184.
DHCP listens for client connections and ensures that devices are able to join the network and are configured correctly.
What firewall port is utilized by the DHCP listeners?
-
67
-
88
-
101
-
172
Correct answer: 67
Port numbers in computer networking represent communication endpoints. In this scenario, DHCP listens for client connections on port 67.
185.
You are worried about losing data that has not yet been written to the physical disk if a disk array stopped and started, and the power cycled off.
What feature can you use for this scenario?
-
Battery backed write caching
-
Redundant write caching
-
Redundant array of disks
-
Backup write caching
Correct answer: Battery backed write caching
Battery backed write caching is a technology feature used in disk storage to improve performance and data integrity. It uses batteries to continue providing power to the volatile memory after the device has lost power. This protects data not yet written to a physical disk.
186.
What type of hypervisor is an application that runs on top of an existing operating system?
-
Type 2
-
Type 1
-
Type 3
-
Type 4
Correct answer: Type 2
A Type 2 hypervisor is installed on top of an existing operating system. It relies on the host machine's preexisting operating system to manage calls to CPU, memory, storage, and network resources.
187.
In the general troubleshooting methodology, what is the phase after implementing a solution?
-
Verify functionality
-
Document the solution
-
Perform root cause analysis
-
Test theory
Correct answer: Verify functionality
After implementing the solution, it is important to test to ensure that the system works as intended. A best practice is to engage an end user to test functionality.
188.
What is the IEEE worldwide standard for port-based security?
-
802.1X
-
802.1a
-
801.2x
-
803.8b
Correct answer: 802.1X
802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. The user's identity is determined based on their credentials or certificate.
189.
Storage area networks house data that is typically used in business-critical workloads. What type of disk interface is used to achieve the required level of performance?
-
FC
-
SAS
-
SCSI
-
SATA
Correct answer: FC
A fibre channel (FC) is a data transfer protocol providing high-speed delivery of block data to applications. Fibre channels are used to connect storage to servers in storage area networks, which are found in commercial data centers.
Serial-attached SCSI (SAS), Small Computer System Interface (SCSI), and Serial ATA (SATA) are other disk interface standards.
190.
What transmission protocol has low overhead and is used for data transmission where timing is crucial?
-
UDP
-
TCP
-
FTP
-
SSH
Correct answer: UDP
User data protocol (UDP) is commonly used for applications that are lossy, which means they can handle some packet loss, such as streaming audio and video. UDP does not use handshake or send out acknowledgments. It basically sends out packets and doesn't acknowledge that the packets being sent have been received.
191.
File server response time was brought to a crawl. What statement BEST describes the root cause?
-
A disk failed in the RAID group and data was being rebuilt on-demand
-
Disk was configured in RAID groups
-
A RAID group lost one of its disks
-
The file server was accessing data in a RAID group
Correct answer: A disk failed in the RAID group and data was being rebuilt on-demand
A root cause is an initiating cause of either a condition or a chain of events that leads to an outcome. In this instance, server cycles were being utilized by the RAID group rebuild, which resulted in user performance slowing down.
192.
If a disaster occurs, all of the following services or capabilities must be initiated at the alternate site EXCEPT:
-
Employee seating
-
Domain name service
-
Hosted websites
-
Line of business applications
Correct answer: Employee seating
The primary purpose of an alternate site is to provide a computing environment for the organization in the event of a disaster. Buildings and facilities where employees reside are usually separate from the data centers.
193.
What storage speed factor refers to the time it takes for a hard disk controller to locate a specific piece of stored data?
-
Seek time
-
Seek latency
-
Seek revolutions
-
Seek rate
Correct answer: Seek time
When anything is read or written to a disk drive, the read/write head of the disk needs to move to the right position. The amount of time that it takes the read/write head of the disk to move from one part of the disk to another is called "seek time."
194.
A user calls the help desk to report a problem. During the first call, the technician asks a series of questions about the system behavior, when the problem started occurring, how the system is currently behaving and how it is different from before. The technician also asks the user to check several settings in the system configuration files.
What is the technician trying to accomplish at this stage?
-
Identify the problem
-
Reproduce the problem
-
Identify probable cause
-
Quarantine the incident
Correct answer: Identify the problem
The technician is identifying the problem by asking focused questions about the "before" and "after" system behavior and user experience. Furthermore, by checking configuration settings, the technician can verify the user feedback as well as their own hypothesis about what the problem is.
195.
Your organization's internet service provider provides the company with a single network address of 200.200.1.0/24. What does "/24" signify?
-
24-bit subnet mask
-
24-byte subnet mask
-
24-bit network extension
-
24 address IP range
Correct answer: 24-bit subnet mask
A subnet mask is like an IP address but only for internal usage within a network. The subnet mask is applied to the full network address using a binary AND operation. This results in the subnet address.
196.
What is the maximum amount of time that an organization can tolerate services being down due to a disaster before it has an impact on a business?
-
RTO
-
RPO
-
BIA
-
RTP
Correct answer: RTO
The Recovery Time Objective (RTO) is the duration of time within which a business process must be restored after a disaster to avoid business consequences associated with a break in continuity. RTO is the answer to the question: “How much time did it take to recover after notification of business process disruption?“
197.
Which DHCP scope specifies the IP addresses that can be acquired by clients?
-
IP address ranges
-
IP address exclusions
-
IP address leases
-
IP address expirations
Correct answer: IP address ranges
A scope is a consecutive range of IP addresses that a DHCP server can draw on to fulfill an IP address request from a DHCP client. The IP address range scope lists the specific beginning and ending IP addresses that can be acquired by clients.
198.
All the following are possible solutions to address the scenario where a user only has LAN connectivity, EXCEPT:
-
Switch UDP port from 67 to 99
-
Ensure that the DHCP server is running
-
Ensure that UDP port 67 is not blocked
-
Check the user's IP configuration
Correct answer: Switch UDP port from 67 to 99
If a user is only able to connect to the LAN and not the internet, it suggests that there might be an issue with DHCP server configuration or network settings. The DHCP server is responsible for assigning IP addresses to devices on the network, and it typically uses UDP port 67 for this purpose. Ensuring the DHCP server is running, verifying that UDP port 67 is not blocked, and checking the user's IP configuration are all valid steps.
Switching the UDP port from 67 to 99, however, would disrupt the DHCP process and is not a viable solution.
199.
Your smartphone has a virtual private network (VPN) app installed to access your company's applications. What type of security certificate will you also need to sign into the VPN server?
-
PKI
-
Authenticated
-
Attested
-
RFID
Correct answer: PKI
Public key infrastructure (PKI) helps authenticate the people systems talk to and keeps the data exchange secret. PKI certificates are documents that act as digital passports. They are assigned to entities that want to participate in a PKI-secured exchange.
200.
What cables are not susceptible at all to electromagnetic interference (EMI)?
-
Fiber-optic
-
Unshielded copper wire
-
Shielded copper wire
-
Twisted optic
Correct answer: Fiber-optic
Fibre optic cables are non-metallic. They transmit signals using pulses of light in glass threads. As a result, they are immune to EMI.