CompTIA Server+ Exam Questions

Page 3 of 25

41.

It is difficult to troubleshoot and optimize an organization's hardware environment without an accurate and up-to-date inventory of components. What is the Microsoft administration tool that enables organizations to manage and safeguard devices within their environments?

  • SCCM

  • SSD

  • MCM

  • UEDI

Correct answer: SCCM

System Center Configuration Manager (SCCM) is a software management suite provided by Microsoft that allows users to manage a large number of Windows-based computers. SCCM allows administrators to remote control, patch management, operating system deployment, network protection, and automation.

42.

All the following are resource types that can belong to a user resource group EXCEPT:

  • Firewalls

  • Websites

  • Databases

  • Files

Correct answer: Firewalls

Firewalls are network resources. They are configured to support user traffic coming into and leaving the network based upon security permissions. They are not user group resources.

43.

A technician has been notified about a potential security issue on a web server. She notices a high number of unauthorized logins coming from a series of unknown IP addresses. What logs can she investigate to learn more?

  • IDS logs

  • Credential logs

  • Least privilege logs

  • DNS logs

Correct answer: IDS logs

Intrusion detection systems (IDS) watch a network on a real-time 24x7 basis, identifying possible incidents and logging information about them. Based upon the configured rules, the IDS stops incidents and reports them to security administrators.

44.

All the following are possible causes of login failure, EXCEPT:

  • Insufficient permissions

  • Incorrect credentials

  • Corrupt user profile

  • Cannot locate authentication server

Correct answer: Insufficient permissions

Logins involve submitting credentials that are accepted by a network server and authenticated against the user profile. The profile contains information about permissions that have been granted. Having insufficient permissions would cause the user to fail to access resources, not for the login to fail.

45.

Servers are deployed in an organization to offer services that provide business value. What type of server provides a name to IP address look up?

  • DNS

  • DHCP

  • NTP

  • VPN

Correct answer: DNS

DNS servers provide a directory service to transform domain names into numeric IP addresses. When users type domain names into the URL bar in their browser, DNS servers are responsible for translating those domain names to numeric IP addresses, leading them to the correct website.

A DHCP server provides temporary IP addresses to a computer. An NTP server helps to synchronize network time within a network. A VPN server terminates VPN connections for secure connectivity to a corporate network.

46.

You are doing a data center hardware refresh and will be replacing rack-mounted servers with blade servers. As you evaluate different manufacturers, what feature should you look for that provides fault tolerance and high availability?

  • Redundancy

  • Customer support

  • Durability

  • Extended warranty

Correct answer: Redundancy

Many blade server manufacturers provide backplane and midplane redundant components. This reduces potential single points of failure and increases the overall availability of devices.

47.

Firewalls can be hardware-based or software-based. Which type of firewall can handle more traffic?

  • Hardware-based

  • Software-based

  • Both can equally handle increased traffic

  • Only firmware-based software firewalls

Correct answer: Hardware-based

A hardware firewall is an appliance that connects to the internet. A hardware firewall runs on its own processing power, so it does not affect a computer's performance. It is also able to scale independently of other computers, thus enabling it to handle increased traffic.

48.

What is the term for program code stored in a chip?

  • Firmware

  • Hardware

  • Software

  • Vaporware

Correct answer: Firmware

Firmware is a software program or set of instructions programmed on a hardware device. It provides the necessary instructions for how the device's software communicates with the other computer hardware components.

Vaporware is software that doesn't actually exist

49.

What type of copper cable has the same pin positions on both ends and is used to connect two devices of different types, such as patch panel connections to switch ports and network infrastructure equipment to switches?

  • Straight-through

  • Crossover

  • Rollover

  • Shielded

Correct answer: Straight-through

Straight-through refers to cables that have the pin assignments on each end of the cable. They are used to connect computers, printers, and other network client devices to the router switch or hub.

50.

What is the hierarchy of digital security certificates that are issued to users, devices, or services called?

  • PKI

  • IAM

  • SSO

  • MFA

Correct answer: PKI

A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates, which are used to verify that a particular public key belongs to a certain entity. PKI components include the hardware, software, policies, procedures, and entities needed to safely distribute, verify, and revoke certificates.

Identity and access management (IAM) is the practice of managing user authentication and authorization. Single sign-on (SSO) uses identity federation to allow users to authenticate to multiple systems with a single username and password. Multi-factor authentication (MFA) requires multiple types of authentication factors to log into an account, improving its security.

51.

All the following are possible solutions to address memory leak issues EXCEPT:

  • Roll back all patches

  • Find functionally equivalent software that does not result in memory leaks

  • Run anti-malware scan

  • Reboot the server to reclaim memory

Correct answer: Roll back all patches

Memory leaks happen when a program fails to release memory it has used. Memory leaks can lead to serious system stability issues. Therefore, it is important to have strong configuration management and current software levels at all times.

52.

What type of processors and associated instruction set are found in mobile devices?

  • RISC

  • CISC

  • MISC

  • WISC

Correct answer: RISC

Reduced instruction set computing (RISC) is a type of microprocessor architecture that utilizes a small, highly-optimized set of instructions rather than a more specialized set of instructions often found in other types of architectures.

53.

In Microsoft environments, what is the term for the degree of access to a resource?

  • Permission

  • Right

  • Grant

  • Access

Correct answer: Permission

Permissions refer to predefined capabilities granted to access or operate objects. Permissions are typically related to or associated with objects such as file shares, shared folders, and printer permissions.

54.

What is the disaster recovery metric that refers to the amount of data that can be lost after a disruption of service?

  • RPO

  • RTO

  • RTP

  • BIA

Correct answer: RPO

Recovery point objectives (RPOs) refer to the amount of data that can be lost before significant harm to business occurs. RPO is expressed as a time measurement from the loss event to how far back the data must be restored to.

55.

Which layer of the OSI model is responsible for defining the means of transmitting raw bits over a physical data link connecting network nodes?

  • Physical

  • Device

  • Network

  • Session

Correct answer: Physical

The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of the raw data.

56.

A new 4 TB drive is added to a server. Only 2TB is being used by the operating system. The remaining 2 TB is unutilized. What is the most likely cause of this problem? 

  • The drive was initialized as MBR.

  • The drive was initialized as GPT.

  • The drive was initialized as GUID.

  • Compressio is enabled.

Correct answer: The drive was initialized as MBR.

When adding a new HDD or SSD to a computer, the administrator is always asked to initialize the disk.  There are two options: MBR and GPT. MIBR is an older partitioning scheme, and a MBR-initiatilized disk only supports 2TB total of partitions.

57.

What is the metric that expresses, on average, how long it takes to get field components back up and running in the event of a disaster?

  • MTTR

  • MTBF

  • MTTF

  • MTBR

Correct answer: MTTR

Mean time to repair (MTTR) is the average time it takes to repair a system. It includes both the repair time and any testing time. The clock doesn’t stop on this metric until the system is fully functional again.

Mean time between failures (MTBF) expresses the average time between failures, while mean time to failure (MTTF) is the average time until a non-repairable device fails.

MTBR is a fabricated term.

58.

RADIUS is designed for authentication at the beginning of a session. What protocol is used to handle frequent authorization requests within a session?

  • TACACS

  • SSL

  • HTTP

  • HTTPS

Correct answer: TACACS

In a session, there may be multiple requests for authorization. The TACACS protocol allows for separation of authentication from authorization and is used within a session.

59.

Windows folders can be shared over the network. Which of the following is not a shared folder permission?

  • Update

  • Full Control

  • Change

  • Read

Correct answer: Update

The available shared folder permissions are Full Control, Change, and Read.

60.

Which of the following is a solution designed to improve the reliability of storage disks?

  • RAID

  • DAS

  • SAN

  • SSD

Correct answer: RAID

Redundant array of independent disks (RAID) is a way of storing the same data in different places on multiple hard disk drives to improve performance and to protect data in the case of a drive failure.

Direct-attached storage (DAS) is when disks are physically located in a server, while storage area networks (SAN) provide access to storage over the network. A solid-state drive (SSD) is a faster, quieter, and less power-hungry form of storage drive.