A video card in an application server was recently replaced. The server administrator is now able to log in locally and view the screen with no issues; however, the administrator notices other performance issues, including the server's slow response time. The administrator reboots the server, but the issues persist. The server's cooling fans are running as normal, and the BIOS shows the dual power supplies are each working at 30%. Which of the following is most likely causing the performance issues?
Answer : B
Replacing hardware components, such as a video card, can sometimes lead to compatibility issues, especially if the system's firmware (BIOS/UEFI) does not support the new hardware. In this scenario, the server operates, and the display functions correctly, but there are performance issues like slow response times. This suggests that while the basic functionality is intact, there may be underlying compatibility problems affecting overall system performance.
A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?
Answer : B
Data Loss Prevention (DLP) systems are designed to monitor and protect sensitive data from unauthorized access, use, or transmission. By enabling DLP on a fileshare, the system administrator can track how data is accessed and used over time.
After allowing the DLP system to run for a week, the administrator can audit the permissions of the fileshare. This involves reviewing which users and groups have access to the fileshare and determining if their permissions align with their roles and responsibilities. Auditing permissions helps identify any discrepancies or excessive privileges that could lead to potential data breaches or unauthorized data exposure.
Other Options:
A . Manage the fileshare from an RDP session: Remote Desktop Protocol (RDP) allows administrators to remotely manage servers and their resources. While this is a method to access the server, it doesn't directly relate to auditing or managing fileshare permissions.
C . Audit the access to the physical fileshare: Auditing physical access involves reviewing who has physical entry to the hardware where the fileshare resides. While important, enabling DLP focuses on monitoring digital access and data movement rather than physical security.
D . Manage the permissions from the fileshare: Managing permissions involves setting or modifying user access rights. However, before making changes, it's crucial to audit existing permissions to understand the current access control structure.
Therefore, after running DLP for a week, the appropriate action is to audit the permissions of the fileshare to ensure that access controls are properly configured and align with the principle of least privilege.
CompTIA Server+ Certification Exam Objectives (SK0-005): Security and Disaster Recovery -- Explain data security risks and mitigation strategies
A security team must ensure that unauthorized individuals are unable to tailgate through the data center's entrance. Which of the following should be implemented to stop this type of breach from happening?
Answer : A
Tailgating is a security breach where an unauthorized person follows an authorized individual into a secured area without proper credentials. To prevent tailgating, implementing an access control vestibule, also known as a mantrap, is highly effective.
An access control vestibule is a small room with two interlocking doors, where the first door must close and lock before the second door can be opened. This setup ensures that only one person can enter the secured area at a time, effectively preventing unauthorized individuals from gaining access by following someone else.
Other Options:
B . Cameras: While surveillance cameras can monitor and record entrances, they do not physically prevent tailgating. They serve as a deterrent and provide evidence after an incident has occurred but do not stop unauthorized entry in real-time.
C . Bollards: Bollards are physical barriers used to prevent vehicular access to certain areas. They are not effective in preventing unauthorized individuals from tailgating into a building or secured area.
D . Biometrics: Biometric systems (e.g., fingerprint or retina scanners) verify the identity of individuals but do not address the issue of someone following an authorized person through an open door. Without physical barriers like an access control vestibule, tailgating can still occur even with biometric systems in place.
Therefore, the most effective measure to prevent tailgating is the implementation of an access control vestibule.
CompTIA Server+ Certification Exam Objectives (SK0-005): Security and Disaster Recovery -- Physical Security Concepts
Which of the following backup types only backs up files that have changed since the last full backup?
Answer : A
Understanding different backup types is crucial for effective data protection strategies. Here's a breakdown of the relevant backup methods:
Full Backup: Captures all data, regardless of previous backups.
Differential Backup: Backs up data that has changed since the last full backup.
Incremental Backup: Backs up data that has changed since the last backup, whether it was full or incremental.
Snapshot: Captures the state of a system at a specific point in time.
A Differential Backup starts with a full backup. Subsequent differential backups save copies of all files that have been modified since that full backup. This means each differential backup includes all changes made since the last full backup, leading to larger backup sizes over time but faster restoration, as only the last full backup and the latest differential backup are needed.
In contrast, an Incremental Backup also begins with a full backup, but each subsequent backup only includes data that has changed since the most recent backup (whether full or incremental). This approach results in smaller backup sizes and quicker backup processes. However, restoration can be slower and more complex, as it requires the last full backup and all subsequent incremental backups to fully restore data.
Therefore, the correct answer is A. Differential, as it specifically refers to backing up files that have changed since the last full backup.
CompTIA Server+ Certification Exam Objectives (SK0-005): Backup Methods
CompTIA Server+ (SK0-005) Study Guide: Chapter on Security and Disaster Recovery
A certain application initially uses 1TB of drive space, but this is expected to double each year for the next two years. Which of the following is the minimum number of 1TB drives that are needed in a RAID 5 configuration?
Answer : C
RAID 5 is a storage configuration that uses striping with parity, providing both improved performance and fault tolerance. It requires a minimum of three disks, where data and parity information are distributed across all drives. The storage capacity of a RAID 5 array is calculated as (N - 1) * S, where N is the number of drives, and S is the size of each drive.
Storage Requirements:
Initial Storage: 1TB
After 1 Year: Doubles to 2TB
After 2 Years: Doubles again to 4TB
To accommodate 4TB of data in a RAID 5 setup, we use the formula:
(N - 1) * 1TB 4TB
Solving for N:
N - 1 4
N 5
Therefore, a minimum of 5 drives, each 1TB in size, is required to meet the projected storage needs. This configuration will provide a total usable capacity of 4TB, with 1TB allocated for parity to ensure fault tolerance.
CompTIA Server+ Certification Exam Objectives (SK0-005): RAID Levels and Types
CompTIA Server+ (SK0-005) Study Guide: Chapter on Storage Solutions
A systems administrator is setting up a second VLAN for end users. Which of the following should be provisioned for a DHCP server to be able to receive client requests from a different subnet?
Answer : D
A technician is investigating a server's configuration to secure it from physical threats. The technician checks the BIOS and sees the following boot order:
USB Drive CDROM Drive Network Adapter RAID Controller
Additionally, the server's host OS is stored on mirrored drives. Which of the following should the technician do to secure the server?
Answer : B