No products in the cart.
CompTIA Server+ Exam Questions
Page 7 of 25
121.
What type of port is used for human interface devices?
-
USB
-
SCSI
-
SATA
-
PXE
Correct answer: USB
USB is the most common type of computer port used with computers. It is used to connect human interface devices, such as keyboards, mice, and game controllers, as well as printers, scanners, digital cameras, and removable media drives.
122.
What is the process of identifying who and what is affected by the incident or problem called?
-
Problem scope
-
Incident assignment
-
Problem ownership
-
Incident elimination
Correct answer: Problem scope
Problem scope identifies and narrows down the impacted devices, users, and even specific components. The quicker problem scope can be identified, the faster the appropriate resources with the correct skill sets can be assigned to work on the problem.
123.
What is a common mitigation technique for distributed denial of service attacks?
-
Black hole filtering
-
DDos re-routing
-
Select DDos filtering
-
Deep packet inspection
Correct answer: Black hole filtering
Black hole filtering or routing is a countermeasure to mitigate a DDoS attack in which network traffic is routed into a “black hole” and lost. If black hole filtering is implemented without specific restriction criteria, however, both legitimate and malicious network traffic is routed to a null route or black hole and dropped from the network.
124.
Over the last few years, organizations have begun trusting public cloud providers to store their backups. Previously, what was the biggest showstopper for cloud backup adoption?
-
Security
-
Cost
-
Scalability
-
On-demand
Correct answer: Security
Malware, botnets, and other threats can compromise both on-premises and cloud data. This could potentially put organizational data, services, and finances at risk. However, public cloud providers have significantly improved and hardened their security capabilities.
125.
You are concerned about possible data corruption if the servers in the data center experience an outage. What device should you use to ensure that devices shut down gracefully in the event of a power outage?
-
UPS
-
PSU
-
KVM
-
Surge protector
Correct answer: UPS
An uninterruptible power supply (UPS) is a battery-powered power supply that provides emergency power to a data center when the input power source or main power fails. UPSs are standard in data centers.
The power supply unit (PSU) provides power to a server, and a surge protector prevents power surges from frying a device. A KVM enables the same keyboard, display, and mouse to be used by multiple computers.
126.
Which command would you use on a Windows computer to see its DHCP details?
-
ipconfig /all
-
ifconfig /all
-
ipconfig /lease
-
ifconfig /lease
Correct answer: ipconfig /all
The ipconfig /all command shows network configuration details, including whether DHCP is being used and, if so, the IP address of the DHCP server. ifconfig is a Linux command, and neither uses a /lease flag.
127.
What type of firewall filtering blocks traffic based upon the actual content of the incoming packets, not just the IP address or port number?
-
DPI
-
Reverse
-
Forward
-
RADIUS
Correct answer: DPI
Deep packet inspection (DPI) evaluates the contents of a packet that is going through a firewall checkpoint. It evaluates the content using rules that are assigned by a network or security administrator and determines what to do with these packets in real time.
128.
Due to legal and compliance reasons, many organizations have turned to document management systems to manage their files. What is the Microsoft document management system called?
-
SharePoint
-
Hummingbird
-
Apache
-
Network File Storage
Correct answer: SharePoint
SharePoint is a web-based collaborative platform that is a document management and storage system. It integrates with Microsoft Office and allows users to work with multiple file versions and other document actions.
129.
If server startup problems occur immediately after you have made a change to a Windows server, what is the recommended restart action before troubleshooting?
-
Last Known Good Configuration
-
Last Known Good Registry
-
Safety Mode Restart
-
Register Bypass
Correct answer: Last Known Good Configuration
When the Last Known Good Configuration is used, the server is started by using the most recent settings that worked. This feature restores registry information and driver settings that were in effect the last time that the server started successfully.
130.
You would like to set up user authentication in such a way that users only have to remember one user ID and password to log into multiple systems. What authentication scheme accomplishes this requirement?
-
SSO
-
MFA
-
IAM
-
PKI
Correct answer: SSO
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID and password to several related, yet independent, software systems. Single sign-on allows the user to log in once and access services without re-entering authentication factors.
Multi-factor authentication (MFA) improves account security by requiring two different types of authentication factors (something you know, have, are, etc.). Identity and access management (IAM) is the practice of managing user authentication and authorization. Public key infrastructure (PKI) creates a hierarchy of digital signatures and public keys used to encrypt or digitally sign data.
131.
You need to set up security access for your users to have single access to multiple web servers across different enterprises, in addition to within your organization. What security strategy accomplishes this requirement?
-
Identity federation
-
Identity replication
-
Enterprise authentication
-
Inter-enterprise login
Correct answer: Identity federation
Identity federation is the process where the authentication responsibility of a user is delegated to an external partner. The identity provider authenticates the identity of the user on behalf of the service providers.
132.
Within a data center, many types of devices use installed power distribution units (PDUs). What metric should you monitor and track utilization against to ensure that the equipment is not stressing the PDU rating?
-
Load capacity
-
Circuit capacity
-
Server utilization
-
Rack density
Correct answer: Load capacity
Power distribution units are designed to support a specific number of amps or amount of electrical currents. The maximum amount is called load capacity. Building and operations codes mandate that the PDU published load capacity cannot be exceeded.
133.
Your organization's workload is increasing, and you need to add capacity. The architecture for all the applications is single server and monolithic. What is your technology option for adding more horsepower to the applications?
-
Scaling up
-
Scaling out
-
Scaling across
-
Scaling down
Correct answer: Scaling up
Scaling up means making a component larger or faster to handle a greater load. In this scenario, all the application code is running on a single server. Therefore, the only way to increase capacity is to make the components of the server more powerful.
134.
An effective disaster recovery strategy is to implement clusters of devices. If one service fails, the remaining devices in the cluster can take over the workload. When a cluster service is running on one node and the others are only in standby mode in case of a failure, what type of cluster configuration is that?
-
Active/passive
-
Active/active
-
Passive/passive
-
Active/standby
Correct answer: Active/passive
An active-passive cluster consists of at least two nodes. However, not all nodes are active. At least one is active, but the others are passive or on standby. This is a lower cost solution and is for organizations that do not have stringent RTO and RPO requirements.
135.
All the following are possible causes of unreachable network resources, EXCEPT:
-
Assigned 169.254 address
-
Incorrect subnet mask
-
IP misconfiguration
-
Name resolution problems
Correct answer: Assigned 169.254 address
To access network resources, the following configuration items must be set up properly: IP configuration, VLAN membership, subnet mask, and route table entry.
A computer assigned a 169.254 IP address will be able to access resources on the corporate LAN, but not the Internet.
136.
What is the term for the small amount of memory on a server motherboard that stores the basic input/output system (BIOS) settings?
-
CMOS
-
MBR
-
UEFI
-
GPT
Correct answer: CMOS
CMOS is an onboard, battery powered semiconductor memory chip inside servers that stores information about the server hardware configuration. This information ranges from the system time and date to system hardware settings for the server.
MBR and GUID Partition Table (GPT) are two initialization options for disks. The unified extensible firmware interface (UEFI) is the modern version of the BIOS.
137.
Which of the following is a valid form of multi-factor authentication (MFA)?
-
Smartcard and PIN
-
Password and security question
-
Authenticator app and hardware token
-
Fingerprint and facial recognition
Correct answer: Smartcard and PIN
Multi-factor authentication (MFA) requires factors from two or more of:
- Something you know
- Something you have
- Something you are
Of these options, only smartcard (something you have) and PIN (something you know) includes two different types of factors.
138.
Printers store queued jobs that could have sensitive data potentially exposed to a hacker. What protocol should be enabled for administrative access to prevent this?
-
HTTPS
-
HTTP
-
TLS
-
SSL
Correct answer: HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network and can be used to lock down printers.
HTTP shouldn't be used because it is insecure. TLS and SSL are protocols for securing other protocols (such as turning HTTP into HTTPS), so they're not a logical choice for administrator access.
139.
You are viewing a secured website (HTTPS) using a web browser. When you enter a URL into the address line of a web browser, which OSI layer is involved?
-
Application
-
Presentation
-
Session
-
Transport
Correct answer: Application
The application layer is used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users.
140.
Tower servers are widely used because of the following: small computing environments as they have low entry-level pricing, all components housed within a single cabinet, and room for expansion.
What is a disadvantage of tower servers?
-
They do not have redundant power supplies.
-
They cannot connect to a network.
-
They do not have built-in storage capacity.
-
Their pricing is very expensive.
Correct answer: They do not have redundant power supplies.
Tower computers do not have redundant power supplies because they are intended to cloud into regular power grids in a small office environment and manage a small number of users. They are not fault-tolerant servers.