Do you know that you can access more real exam questions via Premium Access? ()
A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:
Which of the following drive selections should the technician utilize to best accomplish this goal?
Answer : C
RAID 5 configuration:Using five of the available drives in a RAID 5 configuration meets the requirements for:
Storage capacity:Four 600GB drives (2, 5, and 6) provide a total usable capacity of 2.4TB (4 * 600 * 0.8), exceeding the minimum requirement of 2TB. RAID 5 introduces parity data for fault tolerance, sacrificing some usable space (one drive's worth).
Performance:The combination of multiple drives in a RAID 5 array improves read performance compared to a single drive setup.
Fault tolerance:Even with a single drive failure (any of the five drives used in the RAID 5), the remaining drives can reconstruct the lost data, allowing the server to continue operating.
A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-
essential ports be disabled on the firewall. Which of the following ports must remain open?
Answer : C
HTTPS (Secure Web Traffic):Port 443 is the standard port for HTTPS, which is essential for encrypting communication between web browsers and a secure website. (CompTIA Server+ Objectives SK0-004: 4.1)
Why other options are not essential:
25 (SMTP):Used for email transmission
53 (DNS):Used for domain name resolution
**3389 (RDP): ** Used for remote desktop connections
**8080 (Alternate HTTP): ** Sometimes used for web servers, but not the standard secure port
A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?
Answer : B
Why other options are less ideal:
VM Template (A):Templates are useful for replicating the OS & some software, but might not capture all configurations.
Manual Configuration (C):Time-consuming and prone to errors when replicating across many servers.
Copy/Paste via SSH (D):Tedious, error-prone, and requires servers to be online before configuration.
Cloning (E):Can work but has version compatibility risks if the OS of the cloned server isn't identical to the new ones.
An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?
Answer : A
Robocopy (Robust File Copy) is a command-line tool in Windows that is designed for reliable copy or mirroring of files, and it can handle a broader range of file names and paths, including those that do not conform to traditional Windows file-naming standards. It's specifically designed to handle complex file copy demands and offers a wide range of options that can be tailored for different scenarios, which makes it suitable for the task mentioned. SCP (Secure Copy Protocol), Drag and Drop, and FTP (File Transfer Protocol) are all methods that can be used to copy files, but they might not handle non-standard Windows file names as well as Robocopy.
An administrator received an alert that a backup job has been unsuccessful in the previous three attempts. The administrator discovers the issue occurred while backing up a user's data on a network share. Which of the following actions would be best to allow the job to complete successfully?
Answer : A
Enabling open file backups allows the backup software to copy files that are currently open or in use by applications. This ensures that even if a file is actively being modified during the backup process, it will still be included in the backup.
Advantages:
Ensures consistency of backed-up data, especially for files that are frequently accessed or modified.
Prevents data loss due to files being skipped during backup.
CompTIA Server+ Guide, Chapter 6: Storage, Section 6.3.2 (Backup Types)
Microsoft Docs: Volume Shadow Copy Service (VSS)