01. A technician is troubleshooting a server issue. Which of the following should the technician do to ensure the solution can be duplicated in the future?
a) Notify the impacted users before implementing any changes.
b) Document the findings, actions, and outcomes throughout the process.
c) Verify system functionality and implement preventive measures.
d) Determine if there is a common element or symptom.
02. An administrator is unable to access a Linux host running virtual servers. Upon further investigation, the administrator views the console of the server and determines the server has crashed. Which of the following is the color of the screen?
a) White
b) Black
c) Green
d) Blue
e) Purple
03. Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
a) Scope-based
b) Role-based
c) Location-based
d) Rule-based
04. A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?
a) Consult the HCL to ensure everything is supported.
b) Migrate the physical server to a virtual server.
c) Low-level format the hard drives to ensure there is no old data remaining.
d) Make sure the case and the fans are free from dust to ensure proper cooling.
05. When grid power goes out, all servers in a rack lose power immediately. The server administrator confirms the servers have dual power supplies, which are connected to separate PDUs. Each of the PDUs is connected to a different UPS. Which of the following is the MOST likely cause of the problem?
a) The server power supplies failed during the outage.
b) Both of the UPS devices were set for the wrong voltage.
c) The UPS batteries were discharged.
d) The power circuit was tripped on both PDUs.
06. Which of the following BEST describes a security control that requires validating the user's physical characteristics?
a) Biometrics
b) OTP
c) RFID
d) Security cameras
07. Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off.
Which of the following should the administrator do to prevent this situation in the future?
a) Connect the server to a KVM
b) Use cable management
c) Connect the server to a UPS
d) Connect the server to a redundant network
08. A technician is trying to reach marketing.intranet.com but is unable to do so by name. The technician is able to reach it by IP address, though. Which of the following is MOST likely misconfigured?
a) The VLAN
b) The default gateway
c) The subnet mask
d) The DNS
09. Which of the following is typical of software licensing in the cloud?
a) Per socket
b) Perpetual
c) Subscription-based
d) Site-based
10. A server technician is installing a new server that has four network ports. Two of the network ports have been configured for the current IP addresses of the servers.
Which of the following should the technician perform to ensure security best practices?
a) Connect the unused network ports to each other to create an unusable loop.
b) Disable the unused network ports on the server side.
c) Connect the unused network ports to the switch for future expansion.
d) Insert loopback adapters into the unused network ports.