No products in the cart.
CompTIA Server+ Exam Questions
Page 6 of 25
101.
What is the maximum transmission distance of copper network cables in meters?
-
100
-
1000
-
10
-
500
Correct answer: 100
Copley network cables generally have a maximum transmission distance of 100 m. After that point, the signal degrades significantly and requires repeaters to extend the distance of the network.
102.
Establishing and following a cable labeling standard is a data center best practice. Why is using an IP address or host name for labeling not a good idea?
-
They are both easily changed.
-
Cables are never associated with an IP address.
-
Cables do not have an associated host.
-
Cables are fragile and can break.
Correct answer: They are both easily changed.
Network architectures and configurations are dynamic due to the elasticity of networks. This means that IP addresses do not remain the same. Similarly, posts are refreshed or repurposed and change names. An example of a better labeling scheme would be location-based.
103.
Which type of copper cable could an administrator use to connect their computer directly to a router's console port?
-
Rollover
-
Crosstalk
-
Crossover
-
Straight-through
Correct answer: Rollover
Rollover cables have opposite pin assignments on each end of the cable. Rollover cables are most commonly used to connect to a device's console port to make programming changes to the device. Rollover cables are not intended to carry data but, instead, create an interface with the device.
104.
What type of server listens for HTTP/HTTPS connections and responds to them?
-
Web server
-
Domain server
-
Email server
-
File server
Correct answer: Web server
The basic objective of a web server is to store, process, and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP).
105.
One of the disks in a RAID group configuration failed, and it was replaced with an active hot spare while the system was still operational. What was that process called?
-
Hot swapping
-
Live replacement
-
Live swapping
-
Hot failover
Correct answer: Hot swapping
Hot swapping is the replacement or addition of components to a computer system without stopping, shutting down, or rebooting the system.
106.
Forwarding logs to a third party or SIEM tools is part of the troubleshooting process. What command does Linux use to support log forwarding?
-
syslog-ng
-
syslog
-
logger
-
export
Correct answer: syslog-ng
Syslog-ng is a log management utility that is used to collect logs from multiple platforms. It forwards the logs to detailed troubleshooting and diagnostics platforms.
107.
Accurate documentation can help speed up troubleshooting and problem remediation. What type of documentation explains the normal and stable operating conditions of the technology environment?
-
Baseline documentation
-
Network diagram
-
Data flow diagram
-
Architecture diagram
Correct answer: Baseline documentation
Baseline documentation describes the attributes and configuration of a system during normal operations. It provides a frame of reference for technicians to use when comparing the current environment to the expected configuration when they are problem-solving.
108.
You are creating a "gold image" for a virtual machine that can be used for configuring new VMs or reverting old ones in the case of a malware attack. Which of the following types of backup should you use to accomplish this once the VM is configured appropriately?
-
Snapshot
-
Incremental
-
Differential
-
Virtual copy
Correct answer: Snapshot
Snapshots, also called checkpoints, are taken for virtual machines. Snapshots capture a virtual machine's setting, as well as the data stored in the virtual hard disk files.
109.
Which of the following is NOT a host-based firewall?
-
Unix Firewall
-
Windows Firewall
-
iptables
-
ufw
Correct answer: Unix Firewall
Windows Firewall is a security application created by Microsoft and built into Windows operating systems. It is designed to filter network data transmissions to and from the Windows system and block harmful communications and/or the programs that are initiating them. iptables and Uncomplicated Firewall (ufw) are common host-based firewalls on the Linux OS.
Unix firewall is a fabricated term.
110.
Automatic Private IP Addressing (APIPA) has a very specific range of IP addresses it can use. What is that range?
-
169.254.0.1 to 169.254.255.254
-
10.0. 0.0 to 10.255. 255.254
-
172.16. 0.0 to 172.31. 255.254
-
192.168. 0.0 to 192.168. 255.254
Correct answer: 169.254.0.1 to 169.254.255.254
The IP address range for APIPA is 169.254.0.1 to 169.254.255.254, which allocates 65, 534 usable IP addresses.
The other address ranges are those set aside for private IPv4 addresses.
111.
All the following are possible solutions to address memory failure issues, EXCEPT:
-
Have hot spare disks in place
-
Run memory diagnostics
-
Replace failed chips
-
Check for power
Correct answer: Have hot spare disks in place
Memory is on a chip, which is an integrated circuit made out of capacitors and transistors that can store data or can be used to process code. Memory allows the computer to load applications, store data, and switch quickly between tasks. Some methods for managing memory failures include:
- Running memory diagnostics
- Replacing failed chips
- Checking for power
Having hot spare disks in place is a solution to storage failures, not memory failures.
112.
Many organizations have their user accounts configured on premise using Microsoft Active Directory. What solution would these organizations use to synchronize Windows-based user accounts with cloud providers?
-
ADFS
-
DNS
-
HTTPS
-
TLS/SSL
Correct answer: ADFS
Active Directory Federation Services (ADFS) is a software component developed by Microsoft. It runs on the Windows server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries.
113.
Forward proxy servers fetch web pages from the internet on behalf of a client request. What type of proxy server listens for incoming traffic and forwards the requests to an internal protected network?
-
Reverse
-
Backward
-
Listener
-
Internal
Correct answer: Reverse
A reverse proxy server is a type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server. Reverse proxies control access to a server on private networks. A reverse proxy can perform authentication tasks as well as cache or decrypt data.
114.
All the following are possible causes of LAN connectivity only EXCEPT:
-
Busy CPUs
-
An IPv4 address is assigned by default when DHCP is not reachable
-
The subnet mask is routing to a non-specified router
-
The user experiences "resource not available messages"
Correct answer: Busy CPUs
If a user is only able to connect to the LAN and not the internet, this means that the servers and resources associated with internet connectivity are not configured properly. The main server involved in this type of transmission is the DHCP server.
115.
You recently moved several users from one group to another group in Microsoft Active Directory. What is the immediate next step they need to take to access the new group's resources?
-
Log out and log back in again
-
Clear their local caches
-
Attempt to access a resource in the new group
-
Approve the profile update
Correct answer: Log out and log back in again
The access token that contains group memberships is updated only upon user login. To be associated with the new group, all the users need to re-authenticate.
116.
When documenting the solution to a problem, what should you document so that if the problem occurs again, the technician can quickly address the problem?
-
Steps taken along the way
-
Problem statement
-
Theory of probable cause
-
User functionality test
Correct answer: Steps taken along the way
Documentation includes describing the problem and the end result. However, by listing the steps taken along the way, the next time the problem occurs the technician can quickly bring the users back up.
117.
You are upgrading CPUs and RAM on several servers in the data center.
What component's form factor should you compare and match up to the server chassis form factor to ensure stable operations after the upgrades are implemented?
-
PSU
-
PCI
-
USB
-
KVM
Correct answer: PSU
Power supply units (PSUs) provide the required wattage to all components inside a server simultaneously. The PSU form factor is calculated by multiplying the total amps of all components by the total volts of all components. The result is the total watts or PSU form factor required.
118.
Several devices in the organization recently became infected with malware. What statement BEST describes the root cause?
-
User personal USB devices were not blocked
-
Block personal USB device use
-
Scan personal USB devices
-
Limit approved USB device make and models
Correct answer: User personal USB devices were not blocked
A root cause is an initiating cause of either a condition or a chain of events that leads to an outcome. In this instance, the fact that users can install their personal devices is an initiating cause.
119.
Your organization is testing the effectiveness of using end-user typing patterns as a form of authentication. What category of authentication factor does this fall under?
-
Something you are
-
Somewhere you are
-
Something you have
-
Something you know
Correct answer: Something you are
The authentication factor category of biometrics consists of physiological as well as behavioral characteristics. Everybody has a different typing style. The speed at which users type, the length of time it takes to go from one letter to another, and the degree of impact on the keyboard are biometrical physiological and behavioral traits.
120.
When troubleshooting server and network issues, what device is used to test the power supply?
-
Multimeter
-
ESD strap
-
PSU
-
Crash cart
Correct answer: Multimeter
Multimeters are electronic devices that measure voltage, current, and resistance. They are one of the most common troubleshooting tools used in data centers.
An ESD strap protects against damaging components due to electrostatic discharge (ESD). A power supply unit (PSU) provides power to a server. A crash cart is used to store and transport common tools, such as multimeters and compressed air.