Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CompTIA Server+ / Part VIII with Answers. A user accidentally deleted a critical file. A technician tries to restore it from tape backup but receives an error that the file does not exist on the tape. Which of the following should the technician do FIRST? - ✔ Verify that the correct tape is in the tape drive. An administrator is validating disaster recovery mechanisms and wants to ensure backup data is usable and accurate. Which of the following should the administrator do? - ✔ Backup verifi
Typology: Exams
1 / 3
A user accidentally deleted a critical file. A technician tries to restore it from tape backup but receives an error that the file does not exist on the tape. Which of the following should the technician do FIRST? - ✔ Verify that the correct tape is in the tape drive. An administrator is validating disaster recovery mechanisms and wants to ensure backup data is usable and accurate. Which of the following should the administrator do?
A user in the accounting department reports that print jobs are not printing. A user in the software development department also cannot print to the same printer, but can print to two other printers on different print servers. Which of the following should be the administrator's FIRST step? - ✔ Check whether the print spooler service has started. An administrator receives multiple reports that users cannot access a secure website hosted on a server the administrator manages. The administrator investigates and discovers that the reason users cannot access the secure site is because: - ✔ port 443 is closed. Users on multiple network segments report that they are unable to retrieve email from a server. Which of the following commands will allow a server technician to ensure that the email service is running on the server? - ✔ netstat A technician has completed the installation and configuration of a third email server. The technician has configured the firewall to permit email traffic, but the mail is only being received by the two older servers. Which of the following should the technician configure to ensure incoming email will be processed by all three servers? - ✔ Update the MX record in DNS. A technician has connected a previously formatted ext4 eSATA drive to a Linux server. Given the following output: Disk /dev/sdb: 1000.2 GB, 1000204886016 bytes 255 heads, 63 sectors/track, 382818 cylinders, total 1953525168 sectors Units = sectors of 1 * 512 - 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x0009f31a Device Boot Start End Blocks Id System /dev/sdb1 * 20481 953525168 976761560 83 Linux Which of the following commands should the technician use to make the partition available under /data/drive0? - ✔ mount /dev/sdbl /data/drive An administrator sees a message in the system console that a drive is bad in the single- volume JBOD storage array. A few minutes later, a user calls the help desk to report an
inability to read a file from a mapped drive. Which of the following should the administrator do? - ✔ Replace the failed drive and restore the data from the last backup. A server has recently been configured as a network firewall. After the firewall was configured, users could no longer access a remote server. Which of the following, if properly configured on the firewall, will allow users to have secure access to the remote server? - ✔ Allow TCP port 22 Allow TCP port 3389 Multiple users report that an application attempting to open a file retrieved from a server reports that the file is corrupted. Which of the following applications can be used on the server to verify file integrity? - ✔ Checksum A new version of the primary operating system used by a company has been released. Due to some significant changes in the OS, a system administrator wants to see which remotely accessible services are enabled by default to assess the security risk prior to upgrading to the new version. Which of the following utilities should the administrator use? - ✔ Port scanner