Answers to Assessment Test

  1. D. Form factor refers to the physical appearance and dimensions of the server.
  2. B. Rail kits, when implemented, allow for the server to be slid out of the rack for maintenance.
  3. C. Each U is 1.75 inches (4.445 cm) high.
  4. D. RAID 1 is also known as disk mirroring. This is a method of producing fault tolerance by writing all data simultaneously to two separate drives.
  5. A. The Preboot Execution Environment (PXE) is an industry standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.
  6. B. There are three ways the allocation of the use of the physical CPU(s) can be controlled. These methods are as follows:
    • Shares: Using values such as Low, Normal, High, and Custom (in VMWare, for example), these values are compared to the sum of all shares of all virtual machines on the server. Therefore, they define the relative percentage each VM can use.
    • Reservation: Guaranteed CPU allocation for a VM.
    • Limit: Upper limit for a VM’s CPU allocation.
  7. D. In a classic SAN, devices communicate using the Fibre Channel protocol over a fiber network of storage devices typically connected to a Fibre Channel switch.
  8. D. Implementing a NAS is inexpensive when compared to implementing a SAN.
  9. A. A logical unit number (LUN) identifies a device addressed by the SCSI protocol or protocols that encapsulate SCSI, such as Fibre Channel or iSCSI.
  10. A. DHCP servers are used to automate the process of providing an IP configuration to devices in the network. These servers respond to broadcast-based requests for a configuration by offering an IP address, subnet mask, and default gateway to the DHCP client.
  11. B. IOPS (Input/Output Operations per Second, pronounced eye-ops) is a common disk metric that describes how fast the disk subsystem is able to read and write to the drive. Therefore, the higher this value, the better.
  12. D. Print servers need lots of memory to hold the print jobs waiting in the print queue. The exact amount will depend on the number of users assigned to the printers being managed by this print server.
  13. A. Managing log files can be done at the command line using the following command, inserting the name of log file and the maximum size in bytes:
    wevtutil sl <LogName> /ms:<MaxSizeInBytes>
  14. A. Manually performing a disk cleanup will allow you to get rid of these files (and many other useless files as well), but if you would like to create a batch file, you can automate the process.
  15. C. A minimum of three drives is required for RAID 5.
  16. A. With respect to fire, no safe is fireproof. Many are fire resistant and will protect a document from being destroyed, which occurs at a much higher temperature than many of the other items (such as backup tapes and CDs) can tolerate without damage. For these reasons, items such as backup tapes should be stored offsite.
  17. D. A host-based system is installed on the device (for purposes of our discussion, a server) and the system focuses solely on identifying attacks on that device only.
  18. B. For your Windows servers, an excellent tool is the Microsoft Baseline Security Analyzer (MBSA). This tool can identify missing security patches, weak passwords, and other security issues that are specific to installed products.
  19. A. Since Sally will use Joe’s public key to verify the signature, he must sign it with his private key.
  20. D. While passwords and usernames are examples of something you know and a smartcard is an example of something you possess, a retina scan provides something you are.
  21. A. On Linux-based systems a common host-based firewall is iptables, which replaces a previous package called ipchains. It has the ability to accept or drop packets.
  22. D. It is possible to specify a maximum number of MAC addresses allowed on a port.
  23. A. The user’s computer is the supplicant, the access device (WAP, Dial in the server or VPN server) is the authenticator, and the RADIUS or TACACs + server is the authentication server.
  24. B. CAT5 transmits data at speed up to 100 Mbps and specifies cable lengths up to 100 meters.
  25. D. HTTPS is a secure form of HTTP that uses port 443.
  26. A. Combining physical links can be done using proprietary methods, and there is also an IEEE standard for the process called 802.3ad, later replaced by 802.1ax-2008.
  27. A. Each part of this address communicates information. The left half of the address is called the Organizationally Unique Identifier (OUI). It identifies the vendor who made the interface. The right half is called the Universally Administered Address (UAA). It will be unique for each interface made by the vendor. Together they make a globally unique MAC address.
  28. B. In the Grandfather-Father-Son (GFS) backup scheme, three sets of backups are defined. Most often these three definitions are daily, weekly, and monthly.
  29. A. If you create the backup using checksums (which is an option with many utilities), it will allow you to check that the data has not changed since it was made or that it has been corrupted or damaged.
  30. B. You will need the last full backup tape and the last differential tape. Each differential tape contains all changes that occurred since the last full backup.
  31. C. With a multimeter you can measure voltage, current, and resistance.
  32. A. It is a balancing act to keep humidity at the right level since low humidity causes ESD and high humidity causes moisture condensation.
  33. B. Backplanes are advantageous in that they provide data and control signal connectors for the hard drives. They also provide the interconnection for the front I/O board, power and locator buttons, and system/component status LEDs. Unfortunately, this creates a serious single point of failure because if the backplane fails, we lose communication with the servers to which it is connected.
  34. C. The steps in order are
    • Identify the problem and determine the scope.
    • Establish a theory of probable cause.
    • Test the theory to determine the cause.
    • Establish a plan of action to resolve the problem and notify impacted users.
    • Implement the solution or escalate as appropriate.
    • Verify full system functionality and, if applicable, implement preventive measures.
    • Perform a root cause analysis.
    • Document findings, actions, and outcomes throughout the process.
  35. B. The tracert command (traceroute in Linux and Unix) is used to trace the path of a packet through the network on routers.
  36. B. Some of the things you can specify using this feature are the only MAC address or addresses allowed to send traffic in the port, the total number of MAC addresses that can transmit on the port, and an action to be taken when a violation occurs (either shut the port down or prevent transmissions by the guilty MAC address).
  37. A. If the message comes with no source IP address, that means the message is coming from the local router (the default gateway of the sender). If it has a source IP address of the sender, then it is another router in the path.
  38. D. The sudo fdisk -l command lists the partitions on a Linux system.
  39. A. fstab (File System Table) is a file used by Linux operating systems to mount partitions on boot.
  40. B. In Linux this handled by GRUB.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset