Comptia (SK0-004) Exam Questions And Answers page 25
A system administrator is tasked to set up a file server. The file server must be able to support access control lists and logging for auditing purposes. To meet these requirements, with which of the following file system types should the administrator format the file system?
NTFS
VMFS
CIFS
Server Administration
Security
A system administrator needs to directly control a server that has no network connectivity. Which of the following should be used to accomplish this?
SSH
KVM
RDP
iLO/iDRAC
Server Administration
Security
A system administrator notices that a server is consistently getting slower and less responsive the longer it has been since the last reboot. Once the server is rebooted, the system performs at the expected baseline, but starts slowing down again until the system is unresponsive. Which of the following is the MOST likely cause of this problem?
OS performance misconfiguration
Service/application memory leak
Incorrect server resource specifications
Corrupted application files
Server Administration
Security
A system administrator notices that there is a low level of available storage space on a file server. Which of the following should be implemented to limit the amount of storage space users can utilize on the file server?
Disk shadowing
Disk compression
Disk quota
Disk indexing
Storage
Security
A systems administrator backs up company data to the public cloud as part of a disaster recovery plan. Which of the following BEST describes this replication method?
Disk-to-disk
Server-to-client
Site-to-site
Peer-to-peer
Server Administration
Security
A systems administrator creates a new file server. Before the users can access the server, which of the following must be done FIRST?
Set up an iSCSI target
Configure WWN on the SAN
Join domain/directory
Disable the firewall
Server Administration
Storage
A systems administrator has been directed to implement three-factor authentication for a new secure system. Which of the following authentication methods are redundant and only count as one factor? (Choose two.)
Password
Keypad code
RFID chip
Imitating a gesture
Fingerprint
Security
A systems administrator has created a guest VM on a hypervisor host. The guest VM would need to have a dynamic IP address assignment on the same subnet as the hypervisor. Which of the following network connectivity types should the administrator configure?
Bridging
NAT
VLAN
Spoofing
Networking
A systems administrator has determined that there are several users experiencing problems within two offices that have recently merged into one OU. Users within one of these offices are not having these issues. Which of the following is MOST likely misconfigured?
Group policies
Firewall policies
File permissions
Port permissions
Server Administration
Security
A systems administrator is attempting to connect via RDP to a server that is running Windows. However, the systems administrator cannot connect to the machine via RDP to reboot it and apply updates. Which of the following methods should be used to access the machine and perform a reboot if the server is not physically accessible?
ILO/iDRAC
TCP/IP
SSH/SCP
VNC/VPN
Server Administration
Security
Comments