No products in the cart.
CompTIA Server+ Exam Questions
Page 9 of 25
161.
All the following are possible problems when a RAM failure occurs, EXCEPT:
-
Intermittent connectivity
-
System freezes
-
Random reboots
-
Blue screen
Correct answer: Intermittent connectivity
Random access memory (RAM) gives applications a place to store and access data on a short-term basis. It stores the information the computer is actively using so that it can be accessed quickly. The speed and performance of a system directly correlates to the operations of RAM.
Network connectivity is not related to RAM.
162.
What is the external public-facing network called where organizations place services that are accessible from the internet?
-
Perimeter network
-
VLAN
-
Public proxy
-
External zone
Correct answer: Perimeter network
A perimeter network is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the internet. The goal of a perimeter network is to add an extra layer of security to an organization's local area network. A protected and monitored network node outside the internal network can access what is exposed in the perimeter network while the rest of the organization's network is safe behind a firewall.
163.
To optimize performance in Windows, what tool can you use to view currently running processes and their resource consumption, view system resources, and forcibly stop over-running processes?
-
Resource Monitor
-
ps
-
top
-
Performance Monitor
Correct answer: Resource Monitor
Windows Task Manager and Resource Monitor are part of the Windows operating system. They provide information about running applications, processes, and services, as well as computer performance, network activity, and memory usage.
Performance Monitor is also a Windows utility, but it is used to track various performance metrics. ps and top are Linux utilities for process management.
164.
In the field of security, what is the process of proving one's identity when logging into a website, computer, or application called?
-
Authentication
-
Authorization
-
Verification
-
Validation
Correct answer: Authentication
Authentication is the process of recognizing a user's identity. Different systems may require different types of credentials to ascertain a user's identity.
Authorization is the process of determining whether an authenticated user should be allowed to perform some action. Identity verification and validation are related to authentication but are often part of account creation rather than logging into a system.
165.
What organizational policy allows employees to use their personal mobile devices for work?
-
Bring your own device
-
Work from home
-
Bring your own mobile
-
Acceptable use
Correct answer: Bring your own device
Bring your own device (BYOD) is an IT policy that allows employees to use personal devices to connect to their organizational networks and access work-related systems.
166.
Which DHCP scope specifies how long clients can keep their address settings?
-
IP address lease duration
-
IP address range
-
IP address lease expiry
-
IP address lease renewal
Correct answer: IP address lease duration
A scope is a consecutive range of IP addresses that a DHCP server can draw on to fulfill an IP address request from a DHCP client. IP address lease duration is the amount of time in minutes or seconds a network device can use an IP address in a network. The IP address is reserved for that device until the reservation expires.
167.
Your organization has tens of thousands of servers, and it is not physically possible to manually configure IP settings on each and every device. What technology solution is appropriate for this requirement?
-
DHCP
-
DNS
-
Baseline configurations
-
SNMP
Correct answer: DHCP
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used for automatically assigning IP addresses and other communication parameters to devices connected to the network.
The Domain Name System (DNS) is used to translate domain names into IP addresses. Baseline configurations define the default settings for a system. The Simple Network Management Protocol (SNMP) is used to monitor and manage devices over the network.
168.
What tape backup strategy is the most complex and archives data for an extended period of time in an economical manner?
-
Tower of Hanoi
-
GFS
-
Incremental rotation
-
Long-term archival
Correct answer: Tower of Hanoi
Tower of Hanoi is a complex tape backup strategy that's useful for archiving data for an extended period of time in an economical manner. The strategy is based on a mathematical algorithm, and it uses a cycle of exponential retention periods instead of a large number of tapes.
169.
What component of a blade enclosure is a printed circuit board with server blades on one side connected to other components such as networking interfaces on the other side?
-
Midplane
-
Frontplane
-
Backplane
-
Hybrid plane
Correct answer: Midplane
Midplanes are often used in blade servers, where the server blades reside on one side and the peripheral components such as power, networking, and other I/O reside on the other. Midplanes are also used in networking and telecommunications equipment, where one side of the blade connects system processing components and the other side of the blade connects network interface cards.
170.
TCP is a connection oriented protocol. A TCP session is established and confirmed between two communicating devices before transmitting data by completing a 3-step handshake. What is the second step in the handshake?
-
SYN ACK
-
ACK
-
SYN
-
SYN NACK
Correct answer: SYN ACK
When the server receives the SYN packet from the first step in the handshake, it responds and returns a SYN ACK confirmation receipt, which has two sequence numbers. The sequence numbers indicate that the server correctly acknowledged the client’s packet, and that it is sending its own to be acknowledged as well.
171.
What storage speed factor refers to how often a disk can perform input/output operations?
-
IOPS
-
IOPM
-
IOPH
-
IOPO
Correct answer: IOPS
Input/output operations per second (IOPS) is used to measure the performance of a storage device. IOPS indicates how many input or output operations a device can perform in one second.
Input/output operations per minute, hour, and operation (IOPM, IOPH, and IOPO) are fabricated terms.
172.
Which Windows administrator command is used most frequently for troubleshooting DHCP server issues?
-
ipconfig /all
-
arp -a
-
iplookup /all
-
ipconfig /resolve
Correct answer: ipconfig /all
The ipconfig (short for IP Configuration) is a basic and informative Windows network command-line command. It is used to display the TCP/IP network configuration of a computer, which assists in troubleshooting network connectivity and IP address resolution issues.
173.
What is the name of the assigned router on a LAN through which hosts send traffic leaving the LAN to the internet?
-
Default gateway
-
Primary router
-
Edge gateway
-
Primary gateway
Correct answer: Default gateway
A default gateway makes it possible for devices in one network to communicate with devices in another network. If a computer requests a web page, the request goes through the default gateway before exiting the local network to reach the internet. A default gateway is an intermediate device between the local network and the internet.
An edge gateway typically connects IoT devices to the cloud.
Primary router and gateway are fabricated terms.
174.
Accurate documentation can help speed up troubleshooting and problem remediation. What type of documentation illustrates the physical location of servers and how they connect to each other?
-
Network diagram
-
Data flow diagram
-
Workflow diagram
-
Application architecture diagram
Correct answer: Network diagram
A network diagram is a visual representation of a computer network. It shows the components that make up a network and how they interact. This includes servers, routers, and communication links.
Workflow, dataflow, and application architecture diagrams show how data moves, is processed, and is stored on servers.
175.
What UNIX protocol is used to implement network attached storage?
-
NFS
-
SAN
-
HDD
-
SSD
Correct answer: NFS
A network file system (NFS) is a distributed file system protocol developed by Sun Microsystems that allows users to view, store, update, or share files on a remote computer as though it was a local computer.
176.
What type of server increases the potential for density in a server room or data center?
-
Rack-mounted
-
Blade-centered
-
Tower
-
Standalone
Correct answer: Rack-mounted
A rack-mounted server is a computer designed to be installed in a frame called a rack. The rack contains multiple mounting slots called bays, and each bay holds a hardware unit secured in place with screws. Rack-mounted servers are smaller and more space-efficient than standalone or tower servers.
Blade-centered is a fabricated term that seems like what blade servers might be called.
177.
Edge devices are the first point of contact for users and could be compromised. What type of central authentication authority is used to forward edge device authentication requests?
-
RADIUS
-
HTTPS
-
NAC
-
DHCP
Correct answer: RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a protocol and software that enables edge devices to communicate with a central server to authenticate users and authorize their access to the requested system or service. RADIUS maintains user profiles in a central database that all remote servers can share. This provides better security because policies are applied at a single administered network point.
178.
Which layer of the OSI model is responsible for managing bridges, switches, and network interface cards?
-
Data link
-
Session
-
Transport
-
Physical
Correct answer: Data link
The data link layer is responsible for the node-to-node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another over the physical layer. When a packet arrives in a network, it is the responsibility of the data link layer to transmit it to the destination host using its MAC address.
179.
What feature in the Microsoft operating system looks at user and device attributes in Active Directory to determine the level of access granted to resources?
-
DAC
-
NTP
-
DNS
-
AD
Correct answer: DAC
Dynamic Access Control (DAC) enables administrators to apply access-control permissions and restrictions based on well-defined rules that can include the sensitivity of the resources, the job or role of the user, and the configuration of the device that is used to access these resources.
180.
A technician is troubleshooting a security credentials issue in a Linux environment and wants to review the failed login attempts. In which directory should they look for information on failed login attempts?
-
/var/log
-
/etc/log
-
/usr/var/log
-
/usr/etc/log
Correct answer: /var/log
/var/log/btmp contains a log of the failed login attempts. It shows the user credentials, where the login attempt came from, and the date and timestamp. This log is useful for troubleshooting many types of security incidents, such as attacker reconnaissance.