CompTIA Server+ Exam Questions

Page 2 of 25

21.

A remote server is experiencing difficulty and you need to login to troubleshoot. What Windows powershell command would you use to open an interactive session with the remote host?

  • Enter-PSSession

  • Invoke-Troubleshoot

  • WinRS

  • HTTPS

Correct answer: Enter-PSSession

The Enter-PSSession command connects to a remote computer and gives the operator a command-line prompt on that computer. The operator can run whatever commands are on that computer, provided they have permission to perform those tasks.

22.

What is the first step in creating role-based security groups?

  • Create a group name using company naming conventions

  • Grant resource permissions

  • Assign group userids

  • Add devices to the group

Correct answer: Create a group name using company naming conventions

Naming standards are important as they drive the logical access control hierarchy. Best practice is to choose a naming convention that has context, association, and longevity for future growth.

23.

When planning to install several server devices in a rack, where should the associated power supplies be installed?

  • In the same rack

  • In a separate rack

  • On the data center floor

  • Under the data center floor

Correct answer: In the same rack

Power supplies and other auxiliary components should be installed in the same rack as the server. This will prevent safety or fire hazards and will also facilitate troubleshooting.

24.

Mobile and consumer devices have less power, heating, and cooling capabilities. What type of instruction set processors do they tend to use?

  • RISC

  • CISC

  • ISAC

  • AMDC

Correct answer: RISC

Reduced instruction set computing (RISC) is used by microprocessor architectures that need a small, highly-optimized set of instructions rather than a more specialized set of instructions.

25.

What storage architecture and implementation are used to connect network storage to servers using highly performant storage protocols such as Fiber Channel?

  • SAN

  • NFP

  • NAS

  • iSCSI

Correct answer: SAN

Storage area network (SAN) is a dedicated network for data storage. It provides access to consolidated, block-level data storage. SANs are primarily used to access high-end data storage devices, such as disk arrays and tape libraries from servers, so that the devices appear to the operating system as direct-attached storage.

26.

You are a server security administrator. You want to avoid a VLAN attack that fills the servers' MAC table and causes isolated traffic to be visible on other LANs. What type of VLAN attack is this?

  • MAC flooding

  • VLAN hopping

  • Phishing

  • Firewall ghosting

Correct answer: MAC flooding

MAC flooding is an attacking method intended to compromise the security of the network switches. The intention of the attacker is to consume the memory of the switch that is used to store the MAC address table. The MAC addresses of legitimate users will be pushed out of the MAC table and unauthorized users are let in.

27.

Your team of technicians are installing server operating systems across multiple departments using PXE instead of physically carrying around media that contains OS installation files and images. Several of the servers are not booting. In your troubleshooting steps, you will need to check all of the following settings for PXE compatibility EXCEPT:

  • MAC

  • BIOS

  • UEFI

  • NIC

Correct answer: MAC

PXE must be supported by the physical or virtual server's BIOS and UEFI settings. The physical machine Network Inferface Card (NIC) must also be PXE-compatible.

28.

Your organization is attempting to optimize its backup strategy to minimize the time that it takes to make backups of its physical servers while accepting that restoration might be slower as a result. 

Which type of backup is the BEST for this?

  • Incremental

  • Differential

  • Full

  • Snapshot

Correct answer: Incremental

An incremental backup only backs up the files that have been modified since the previous (full or incremental) backup. By minimizing the amount of data included in the backup, incremental backups are the fastest to run but require more time for recovery.

Differential backups back up everything modified since the last full backup, making them slower to create than incremental backups but faster to restore from. Full backups create a backup of everything on the system, making them the slowest to create but the fastest to restore from. A snapshot is a backup image taken of a virtual machine (VM) that can be used to restore it to the state it was in at the time of backup.

29.

One of your users is unable to access resources on the network. All the following are possible causes of this failure EXCEPT:

  • Service account is not set up

  • Insufficient permissions

  • Encryption is enabled

  • The account control configuration is too restrictive

Correct answer: Service account is not set up

Service accounts are a special type of non-human account used to execute applications and run automated services, virtual machine instances, and other processes. Service accounts are not used directly by human users.

30.

What protocol is used by Windows servers to make shared folders available to users over the network?

  • SMB

  • NGINX

  • CUPS

  • HTTP

Correct answer: SMB

The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files. SMB is also used to request services from server programs in a computer network.

31.

If a DHCP client cannot reach a DHCP server, how can they configure the connection?

  • APIPA

  • Real-time DHCP

  • FQDN

  • DNS

Correct answer: APIPA

Automatic Private IP Addressing (AIPIA) is a feature in operating systems that enables computers to self-configure an IP address and subnet mask automatically when their DHCP server isn't reachable. If APIPA detects a DHCP server on the network configuration area, it stops and lets the DHCP server replace the dynamically allocated addresses.

32.

All the following could prevent a user from accessing ANY network resources, EXCEPT:

  • Assigned 169.254 IP address

  • Incorrect subnet mask

  • Incorrect default gateway router

  • Incorrect DNS server

Correct answer: Assigned 169.254 IP address

Connecting to the internet requires the appropriate configurations on the DNS server and gateway router. The correct mask must be applied to access the required subnet. 

A 169.254 (assigned when DHCP is unavailable) would restrict the user's connectivity to the local area network (LAN) but would permit them to access some network resources.

33.

Your organization needs to implement two-factor authentication to protect sensitive data. What solution addresses this requirement?

  • Password and fingerprint

  • Password and answer secret question

  • Fingerprint and retinal scan

  • Hardware token and key fob

Correct answer: Password and fingerprint

Passwords belong to the factor category of something you know. Fingerprints belong to the factor category of something you are. Using one from each category makes it a two-factor authentication solution.

34.

During a device's power up, the device does not boot and displays the following error: "Default Boot Device Missing or boot failed. Insert recovery media and hit any key." All of the following are potential causes EXCEPT:

  • Overheating

  • The boot sequence or order is incorrect

  • BIOS settings are incorrect

  • The hard drive may have failed

Correct answer: Overheating

The message displayed indicates that there is a problem with the boot process. If an environmental issue were the cause, this specific message would not be displayed.

35.

Several of the routers on the network are not able to automatically assign device IP addresses to join the network, and users cannot connect to the internet. What is the logical place to start when troubleshooting this scenario?

  • DHCP server

  • DNS server

  • VLAN configuration

  • MAC configuration

Correct answer: DHCP server

A setup or configuration error on a DHCP server can cause the inability to assign an Internet Protocol address for devices. Because the DHCP setting can break the internet connection, the error can appear in many forms, but the end result is that users can't access the internet.

36.

Managing individual user access to resources is not scalable on a large network. What is the MOST common mechanism for role-based logical access control in today's networks?

  • Groups

  • ACLs

  • SSO

  • PKI

Correct answer: Groups

Logical access control limits connections to computer networks, system files, and data. A group is a collection of users. Groups can represent an organizational structure, such as department, job profile, skill, or title.

Access control lists (ACLs) specify who can and can't access a resource. Single sign-on (SSO) enables users to access multiple accounts with a single username and password. Public key infrastructure (PKI) is the hierarchy of digital certificates that enable public key encryption and digital signatures.

37.

You are examining the hierarchy in a DNS server. You see domains, such as .com, .org, .net, and .edu. Where in the DNS hierarchy are you?

  • Root domain

  • Top level domain

  • Master domain

  • Translation domain

Correct answer: Root domain

The DNS tree has a single domain at the top of the structure called the root domain. The root name servers are the first step in translating (resolving) human readable host names into IP addresses that are used in communication between internet hosts.

38.

Many organizations have turned to third party providers for IT troubleshooting and remediation. What metric in the Service-Level Agreement (SLA) defines the expected availability for IT services?

  • Uptime

  • Response time

  • Production time

  • Operational time

Correct answer: Uptime

Uptime is a metric that represents the percentage of time that hardware, an IT system, or device is successfully operational. It refers to when a system is working, versus downtime, which refers to when a system is not working.

39.

In the general troubleshooting methodology, what is the phase after establishing the theory of cause?

  • Test the theory

  • Establish a plan of action

  • Implement a solution

  • Document the problem

Correct answer: Test the theory

The theory of cause is similar to a hypothesis. Once a hypothesis has been developed, the researcher (or in this case, the technician) executes tests to validate if the theory (hypothesis) is correct.

40.

You are a storage administrator and need to establish a policy that determines which type of data will be stored on which specific storage media. What is this policy called?

  • HSM

  • HDD

  • SSD

  • DSM

Correct answer: HSM

Hierarchical storage management (HSM) is a policy that sets the organizational standard for storage device usage from fastest and most expensive to slower, more economical tiers. The intent is to ensure that the organization is optimizing its storage budget and delivering against its service levels.