Comptia (SK0-004) Exam Questions And Answers page 2
A company has hired a consultant to review the production storage infrastructure and provide suggestions on improving performance. The consultant has identified a bottleneck in the production switching fabric and successfully tested the solution in a lab environment. Which of the following should the consultant perform NEXT, according to best practices?
Establish a plan of action to implement the solution in production.
Perform a root cause analysis of what caused the bottleneck.
Establish a theory describing the possible issue in the production network.
Storage
Security
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
Disable any unused physical ports until needed
Implement a BIOS password on all the servers
Install chassis locks on all the servers
Restrict usage of flash drives in company policy
Security
Networking
A company has recently upgraded all backup hardware and media from DLT IV to LTO3 tapes and tape drives. Several weeks after the upgrade, the development team discovers a corruption in one of the application servers and must restore from one of the DLT IV tapes.
Which of the following steps are necessary for the server administrator to use these tapes?
Which of the following steps are necessary for the server administrator to use these tapes?
Reformat the DLT IV tape in LTO3 format. Load the tape.
Install the DLT IV driver on the LTO3 drive. Load the tape.
Load the DLT IV tape into the LTO3 drive.
Replace the LTO3 drive with a DLT IV tape drive. Load the tape.
Server Administration
Storage
A company hires a third-party vendor to perform a vulnerability scan of the network from outside the network. Which of the following pieces of information will be included in the scan results? (Choose two.)
List of open ports
List of OS patches to install
Date of installed virus definitions
List of server BIOS passwords
List of firmware versions
Security
Networking
A company implements a cold site for disaster recovery purposes due to a risk of hurricanes at its headquarters location. Which of the following BEST describes why the company chose to use a cold site?
Cold sites have fewer hurricanes than warm or hot sites.
A hot or warm site would have a higher MTTR than a cold site
Cold sites are the easiest to implement in the event of a disaster
A hot or warm site would have higher setup and ongoing costs
Storage
Security
A company is being audited by its operating system vendor. The company needs to report the number of operating systems in use, the versions of the operating systems, and the product keys. Which of the following will be MOST helpful in passing the audit?
Asset management documentation
Change management logs
Service manuals
Server baselines
Server Administration
Security
A company is building an online archival system with a low IOPS requirement. Which of the following technologies will meet the IOPS requirement and reduce costs?
SAS SSD
5400rpm HDD
Fibre Channel
Flash memory
Storage
Storage Technologies
A company is designing its first DRP and has identified a disaster recovery site for use in resuming operations. The company, however, will be unable to place any equipment in the site until the need arises. Which of the following BEST describes this site type?
Hot site
Cold site
Warm site
Hybrid site
Server Administration
Security
A company is planning to replace old hardware and needs to budget accordingly. Which of the following is likely to contain a list of end of life servers?
The server's warranty information.
The server's life cycle schedule.
The asset management database.
The software licensing agreement.
Storage
A company's computer policy dictates that all users workstations must use the company's corporate web page as their default home page. Which of the following methods should an administrator use to BEST comply with this policy?
Configure a logon script to set the homepage at logon.
Set the default homepage to the corporate website in Group Policy.
Manually configure the homepage on all workstations and setup trace logs to ensure compliance.
Set the default homepage to the corporate website on the base computer image.
Server Administration
Security
Comments