A system administrator needs to rebuild a server by booting to the OS DVD. The server powers up but attempts to boot from the network. Which of the following is the MOST likely source of the problem?
A. Incorrect media type
B. Driver failure
C. Incorrect mount point
D. Memory failure
A network administrator is tasked to set up zoning for a SAN infrastructure that requires redundancy. Which of the following types of hardware should the administrator implement?
A. Multiple VLANs
B. Multiple host nodes
C. Multiple HBAs
D. Multiple routers
Which of the following power plug types would MOST likely be found in a medical facility?
A. Tip/Ring/Sleeve
B. Speed lock
C. Tip/Ring
D. Twist lock
A server administrator is installing a new OS on a server using an image from the network. The server administrator successfully connects to the network and applies the image. Upon reboot, the system displays the following message: Operating system not found. Which of the following is the MOST likely issue?
A. An incompatible hard drive was installed.
B. An incorrect boot sequence was set in the BIOS.
C. Incorrect patches were applied to the system.
D. An incompatible OS was used.
A user is unable to log in to a database-driven application that is hosted on a server. The server is also configured to be a file server. Which of the following should the technician perform FIRST when troubleshooting the issue?
A. Establish a theory of why the server is malfunctioning.
B. Question the administrators about any recent changes.
C. Perform a full backup on the server and the user's workstation.
D. Perform a database backup on the server.
A systems administrator needs to ensure data cannot be recovered from old media. Which of the following is the MOST effective method for the administrator to use?
A. Zeroize all sectors
B. Format the media
C. Empty the recycle bin
D. Change the media format
A user was set up with a new computer and is now unable to access a file share on the server. The user was previously able to access the file share from the old computer. The administrator knows the user can access other network resources, and the user's security permissions remain the same. Which of the following is the NEXT logical step for the administrator to troubleshoot this issue?
A. Ping the server from this computer to see if there is a response
B. Log in to another computer as this user and attempt to browse to the share
C. Log in to this computer as a different user and attempt to browse to the share
D. Check security permissions on the file share for this user
After applying a new driver to a NIC, the server reboots and fails to restart. Which of the following is the BEST way to resolve the problem?
A. Boot using recovery console and restore the previous driver.
B. Boot the server, press F8 and access last known good configuration.
C. Restore the server using last backup tape.
D. Boot the server with ASR option.
Which of the following is an SLA?
A. A document stating the impact analysis of a nonfunctional server.
B. A contract that details the device replacement time frames.
C. A contract that details the correct equipment disposal laws.
D. A statement of compliance with local laws and regulations.
Which of the following concepts is described as multiple logical subnets traversing the same physical network?
A. DHCP
B. VLANs
C. DMZ
D. VPNs
A server has a single, half height, PCI-X 3.3v slot available. Which of the following cards can fit in this slot? (Select THREE).
A. Half Height, Universally Keyed PCI card
B. Full Height, 3.3v PCI-X card
C. Half Height, x16 PCI Express Card
D. Half Height, 3.3v PCI card
E. Half Height, Universally Keyed PCI-X card
F. Full Height, Universally Keyed PCI card
G. Half Height, x8 PCI Express Card
A technician receives errors that a server's internal temperarture is approaching an unsafe limit. After opening up the chassis, all fans are operational. Which of the following should be checked NEXT ?
A. Blockage of the cooling system
B. Fire suppression system
C. Uninterruptible power supply load
D. Location of the server
A datacenter administrator is reallocating CPU and memory resources for a guest VM. The guest VM runs on a hypervisor that has direct access to the hardware resources being allocated. Which of the following BEST describes this scenario?
A. The guest is using a Type I hypervisor
B. The hypervisor is running on a virtual hardware
C. The host is using a Type II hypervisor
D. The guest is using a hybrid hypervisor
When disposing of computer equipment, which of the following can present an environmental hazard?
A. Bezel
B. SATA cable
C. Cat5 cable
D. CRT monitor
Which of the following is designed to guarantee that once data is written it cannot be modified? (Select TWO).
A. Flash
B. DLT4 tapes
C. CD-R
D. SDLT tapes
E. WORM