CompTIA Server+ Exam Questions

Page 5 of 25

81.

To optimize performance in Windows, what tool can you use to schedule monitoring and set alerts for performance, event, and configuration?

  • Windows Data Collector Sets

  • Windows Task Manager

  • Windows Resource Monitor

  • Windows Performance Monitor

Correct answer: Windows Data Collector Sets

Windows Data Collector Sets organize data collection points, such as performance counters and event trace data, into a single collection. Data Collector Sets enable administrators to schedule data collection so that the results can be analyzed and reports can be viewed later.

Windows Performance Monitor is also focused on performance but lacks the scheduling and reporting functionality. Windows Task Manager and Windows Resource Monitor are used to monitor processes on a system.

82.

From a security perspective, what device is needed to enable communication between VLANs?

  • Router

  • Splitter

  • Bridge

  • TACACS server

Correct answer: Router

A virtual LAN (VLAN) is a network that maps devices on a basis other than geographic location. For example, it can contain devices from different departments or by types of user or application. Traffic that flows between different VLANs must go through a router, just as if the VLANs are on two separate LANs.

83.

Your organization is undertaking a study to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster. What is that study called?

  • BIA

  • BID

  • RTO

  • RPO

Correct answer: BIA

Business Impact Analysis (BIA) is the process of understanding business functions and analyzing the impact of an interruption upon them. The BIA identifies recovery time objectives and recovery point objectives for systems. These metrics are used to build a disaster recovery plan.

84.

What type of mail protocol enables users to synchronize emails between their multiple devices?

  • IMAP

  • POP

  • SMP

  • SMTP

Correct answer: IMAP

IMAP enables users to use different email clients running on different devices to access their email. IMAP synchronizes the email inboxes between devices.

85.

Which of the following command-line tools uses cmdlet to manage Active Directory?

  • Windows PowerShell

  • Server Manager

  • adconfig

  • domconfig

Correct answer: Windows PowerShell

The Active Directory module for Windows PowerShell has a collection of commands called cmdlets. Cmdlets are used to manage Active Directory domains from a single server. Server Manager is a GUI-based tool that can also manage AD.

adconfig and domconfig are fabricated terms.

86.

What feature of the unified extensible firmware interface (UEFI) can prevent the injection of malware into the environment before the OS starts up?

  • Secure Boot

  • Firmware Security

  • Code Signing

  • Embedded Security

Correct answer: Secure Boot

Secure Boot establishes a trust relationship between the UEFI BIOS and the software it eventually launches, such as operating systems, drivers, and utilities. After Secure Boot is enabled and configured, only software or firmware signed with approved keys is allowed to execute.

87.

Telephony and network communications involve both hardware and software components. What is the industry standard model that maps and explains these components?

  • OSI

  • TCP

  • IP

  • DNS

Correct answer: OSI

The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system. The purpose of the OSI model is to provide guidelines to technology vendors and organizations, so the network and communications products and systems they create are interoperable.

88.

Who or what organization allocates public unique IP addresses to companies and other institutions?

  • Internet service provider

  • DARPA

  • Federal Communications Commission

  • Google

Correct answer: Internet service provider

IP addresses are managed by the Internet Assigned Numbers Authority (IANA), which has overall responsibility for the Internet Protocol (IP) address pool, and by the Regional Internet Registries (RIRs) to which IANA distributes large blocks of addresses. The RIRs manage and distribute IP addresses to internet service providers (ISPs) who in turn allocate them to their customers.

89.

What tool is provided by a server manufacturer to help you determine if your firmware version is current after you download it but before installing it?

  • MD5 hash value

  • Multifactor authentication

  • Key value store

  • Auto download

Correct answer: MD5 hash value

MD5 values were originally used to compare the contents of a sent file to the received file to ensure data integrity. MD5 hash techniques are also used to compare one code base to another. In this scenario, the MD5 hash value would be used to determine if the blade server firmware was the most current version.

90.

As part of its disaster recovery plan, your organization has set up a secondary data center that has operational systems and replicated data from the primary data center. What is that secondary data center called?

  • Alternate site

  • Mitigation center

  • Backup site

  • Fail proof site

Correct answer: Alternate site

Alternate sites enable business operations to continue when a primary site experiences disruption. Alternate sites can be hot, which means they are continuously operational. Alternate sites can be cold, which means they have hardware available but are in standby mode only.

91.

All the following are possible solutions to address the scenario that logs cannot be written to EXCEPT:

  • Stop logging

  • Archive old log messages

  • Store logs in alternate location with more free disk space

  • Free up disk space

Correct answer: Stop logging

The purpose of logging is to track activity, errors, and other events. This allows the organization to take timely and appropriate measures to address any issues that arise.

92.

Which layer of the OSI model is responsible for end-to-end data transmission?

  • Transport

  • Communication

  • Networking

  • Application

Correct answer: Transport

The transport layer provides transfer of data between end users. It controls the reliability of a given link through flow control, segmentation and desegmentation, and error control. The transport layer can keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors have occurred.

93.

What is the minimum number of integrated network interface cards (NICs) physical servers have?

  • Two

  • One

  • Four

  • Three

Correct answer: Two

Servers in a data center are connected to a network router. Routers always have dual paths configured, so by default, two network interface cards are required. More powerful servers running multiple workloads or hosting multiple virtual machines can have four or more NICs.

94.

Which layer of the OSI model is responsible for software that involves user interaction?

  • Application

  • Module

  • Presentation

  • Session

Correct answer: Application

The application layer is the highest layer of the OSI model. It provides the interfaces and protocols needed by the users and facilitates the user to use the services of the network.

95.

Clients in your network environment only need to connect to their systems for short periods of time. What DHCP scope option should be used for this scenario?

  • Lease duration

  • DHCP reservation

  • Address exclusion

  • Dynamic addressing

Correct answer: Lease duration

The lease duration option indicates how long DHCP clients can keep their IP address settings. Establishing short lease durations will maximize IP address reuse.

96.

What type of server has an undefined form factor?

  • Virtual

  • Blade

  • Tower

  • Rack-mounted

Correct answer: Virtual

A virtual server is a simulated server environment built on an actual physical server, running as a guest using hypervisor software. The underlying physical server has a form factor, but not the virtual server.

97.

What address translation scheme is used to map public IP addresses to private IP addresses?

  • NAT

  • PAT

  • Subnetting

  • VLAN

Correct answer: NAT

Network address translation (NAT) connects two networks and maps the private (inside local) addresses into public (global) addresses. NAT came about to slow down the rate of depletion of available IP address space by enabling many private IP addresses to be represented by some smaller number of public IP addresses.

98.

You have a large department of over 500 users who need to share seven printers. What type of server role can you use to manage the print requests from the users?

  • Print server

  • Application server

  • Database server

  • Spooling server

Correct answer: Print server

Print servers manage the printers on the network. Print servers spool print jobs from clients on to the print server disk space and act as an intermediary between the clients and the physical print devices.

99.

Which of the following activities are managed at the session layer of the OSI model?

  • Establishing, maintaining, and terminating connections between devices

  • Encryption and encoding

  • Routing of network packets

  • Ensuring that data is transferred reliably and efficiently

Correct answer: Establishing, maintaining, and terminating connections between devices

The session layer creates communication channels, called sessions, between devices. It is responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends.

Encryption and encoding is managed at the presentation layer. Ensuring that data is transferred reliably and efficiently is handled at the transport layer. Network packet routing is the network layer.

100.

What component do expansion cards need to move data in and out of the card?

  • Bus

  • DRAM

  • Slot

  • SRAM

Correct answer: Bus

A bus is a high-speed internal connection. Buses are used to send control signals and data between the processor and other components.