CompTIA Server+ Practice Exam - 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,404
| Attempts: 7,592 | Questions: 87
Please wait...
Question 1 / 87
0 %
0/100
Score 0/100
1. Which of the following would make an ideal administrator password?

Explanation

Administrator passwords are most secure when they are a combination of numeric, alpha numeric and special characters.

Submit
Please wait...
About This Quiz
CompTIA Server+ Practice Exam - 1 - Quiz

Full length Comptia Server+ Practice Exam. Take this exam like the real exam (towards the end of your preparation) to see if you are completly prepared for the real exam. This FREE online Server+ practice test will help you pass by familiarizing you with the material and the ensuring that... see moreyou know the structure of the Server+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Sally cannot access App1 but can access App2 on a server. Whereas John can access both applications. Which of the following needs to be checked first?

Explanation

Since sally is able to access App1, there is no other problem other than permissions.

Submit
3. You have installed the Server hardware on a clients place recently. The client complains that the Server is functioning intermittently. Upon reaching the clients place and observing the symptoms you suspect the problem is related to RAM. How will you isolate this problem?

Explanation

Removing all memory modules and restarting the server will give the same error beeps that it would have given when you started the server with faulty modules. Just replacing all memory modules will definitely put the server in functional state but will not help you isolate the problem. Removing and replacing one RAM module at a time will help you isolate the exact faulty module.

Submit
4. You are investigating a server crash at the client site. Which of the following critical questions would your client need to answer in order for you to troubleshoot the problem?

Explanation

Understanding the events leading up to the server crash is essential for root cause analysis. These events help isolate triggers such as configuration changes, software updates, user actions, or security breaches. By identifying what occurred immediately before the failure—like spikes in traffic, hardware alerts, or log errors—a technician can recreate the scenario, check logs or system snapshots, and pinpoint the fault. Without this context, troubleshooting becomes guesswork rather than a structured diagnostic process grounded in observable system behavior.

Submit
5. When a Windows 2000 server goes down, the best and the surest way to bring it up is to format the hard disk and re-install the system software. T/F ?

Explanation

Although the formatting option helps to reduce server down time and will surely bring up the server, it does not help to recover transactions or lost data. It is always best to try and recover the system.

Submit
6. DNS, FTP, SNMP, SMTP, and TELNET are all IP based services that cannot be supported on Windows 2000. T/F?

Explanation

All IP based services mentioned above can be hosted on the Windows 2000 server.

Submit
7. Your manager has just asked you to set filtering only on interesting packets for your FTP server. You choose the FTP server and select port 20 and complete the configuration successfully. Is your FTP connection fully safe now?

Explanation

To fully secure your FTP service, you need to set filtering on port numbers 20 as well as 21. Leaving any one port out would mean a server that is not secure at all.

Submit
8. It is mandatory to have a Primary DNS server as well as Secondary DNS server on a network, if you wish to have fault tolerance for DNS resolution. T/F ?

Explanation

A Secondary DNS server is meant to take over DNS resolution for requesting clients, whenever the Primary DNS server is unable to do so. Hence this is a basic necessity for ensuring fault tolerance for DNS resolution on a network.

Submit
9. Which of the following services is responsible for resolving IP to hostname and vice versa?

Explanation

Host name resolution can be implemented by host files or by DNS.

Submit
10. An IDE based RAID system is more fault tolerant than a SCSI based RAID. T/F ?

Explanation

IDE supports maximum of 4 devices where as SCSI supports 7 devices. As for fault tolerance SCSI is more reliable than IDE.

Submit
11. Which of the following is not hazardous for the Server configuration machines?

Explanation

Server configuration machines need to be maintained in low temperature environment. Failing which the heavy duty fans within the machine can add a load on the system, and the high temperature and humidity can cause devices to fail.

Submit
12. SCSI controller supports bus mastering. T/F ?

Explanation

Bus Mastering is a feature supported by some bus architectures that enables a controller connected to the bus to communicate directly with other devices on the bus without going through the CPU. Most modern bus architectures, including PCI, support bus mastering because it improves performance.

Submit
13. If you were a administering a Windows 2000 system, where would you look for errors relating to access permissions?

Explanation

The event viewer is an interface application that allows reading of log files relating to the Operating system. The resource access and user permission related error messages and status messages is always logged into the security log.

Submit
14. Which of the following cannot be used as a fault tolerant measure?

Explanation

RAID 0 is not a fault tolerant measure in the software level RAID.

Submit
15. Windows 2000 cannot function without DNS. T/F?

Explanation

DNS Server is mandatory only when using ADS infrastructure, which is not specified in the question statement. For any other scenario. Windows 2000 can still make use of broadcast or WINS for name resolution.

Submit
16. Hardware RAID is expensive where as Software RAID is poor in performance. T/F ?

Explanation

Hardware level RAID gives far better performance than a software level RAID. Hardware level RAID is far more expensive than software level RAID.

Submit
17. If you were hosting an application on your web server that allows internet users to communicate with it and also ensures that the data transfer between the client end and the server end is very reliable, which of the following protocols would you choose for transport layer communication?

Explanation

IP and ICMP are not transport layer protocols. UDP is not a protocol that can be used for reliable communication unless reliability is inbuilt to the application itself. TCP is the protocol for the said application.

Submit
18. Your client has been installing an application on a Windows 2000 resource server. After a restart it crashes. Which of the following would you first try to recover the server?

Explanation

The last known good configuration option in Windows based servers, helps to restore the registry settings that existed before you installed the application that caused the server to crash. This could be the easiest and the quickest way to recover the server. Recovery console could be tried for more complex scenarios of server recovery. Re-installing the OS or replacing the hard drive are not valid options here.

Submit
19. The Ultra2 Wide SCSI can provide 80 MB/sec transfer rate. T/F ?

Explanation

The combination of Ultra2 Wide controller and drive is meant for situations that demand improved performance and excellent transfer rate. 80 MB/sec is definitely within the support capability of Ultra2 Wide SCSI.

Submit
20. Which of the following protocols is required by an email Server?

Explanation

Mail servers need SMTP and mail clients need POP. FTP and SNMP are not related email services

Submit
21. What is the best strategy for implementing a continuous power supply for computers?

Explanation

Unlimited Power Supply (UPS) is the only solution here. Inverters cannot be used for computers. Generators are not automatic and need manual intervention.

Submit
22. A RAS service and VPN service cannot be configured on the same resource server. T/F?

Explanation

So long as the server hardware supports the services with requisite resources, there is no other restriction as to housing the RAS and the VPN service on the same resource server.

Submit
23. Which of the following configurations is mandatory when communicating with a host in the remote network?

Explanation

The default gateway provides access to resources outside the local subnet.

Submit
24. VPN cannot be used be used by a server for security in communication. It is only meant for clients. T/F ?

Explanation

Any service that is set up to maintain security in a network must be understood by both the server as well as the clients. Otherwise there is no security at all.

Submit
25. You suspect that the network server could not be receiving updates as per schedule. Which of the following would you check to confirm your doubts?

Explanation

The system registry is incorrect as the operating system has not been mentioned. The configuration files will only hold the configuration information and the boot log file will only contain the status messages logged during boot up. The correct answer is error log files.

Submit
26. What should you use to inhibit the spread of viruses on your peer-to-peer network?

Explanation

It is mandatory to use a antivirus software on each workstation.
Incorrect Answers
A. A firewall stops traffic at port and protocol level.
B. The scandisk utility is used to diagnose and fix hard disk problems.
C. An antivirus suite is more relevant to huge client/server networks.

Submit
27. If you were planning to host a web server on a Windows based resource server for intranet purpose, which of the following would be a more appropriate choice?

Explanation

IIS (Internet Information Service) is the most appropriate choice to host a Web server on a Windows based resource server. IAS (Internet Authentication Service) is not meant for Web Services. Apache is a good choice if the Operating System platform was Unix based.

Submit
28. When using a 1-bit wide SCSI drive, which of the following drives will be a bootable drive?

Explanation

When using 16-bit wide SCSI there will be 16 devices that can be connected possibly. 0-15. There is no device that will have Id 16. The bootable drive will be the one with Id 0.

Submit
29. You have just configured a server to be a print server and are trying to configure the client on one of the workstation sin the network. You are unable to connect to the print server. When you check the service status on the server, you notice that it has not started at all. Which of the following would provide you with the information to proceed further with your troubleshooting?

Explanation

The log files contain alerts and errors regarding network services. Registry contains information of installed devices and software, and not the status of a service. It is a complicated process and can lead to system failure if dealt in a wrong way. If the server or the workstation has no other problem other than the print service connection, then there is nothing wrong with network settings. The print service is usually purely IP based and should not be in need of name resolution.

Submit
30. Which of the following statements about clustering is true? Choose two.

Explanation

Implementation of cluster service improves network availability and allows for scalability. It does not relate to troubleshooting procedures in any way.

Submit
31. You wish to improve the performance of data transaction on the network without bothering about data redundancy. Which of the following RAID levels is apt for this situation?

Explanation

RAID 0 is the software level RAID that enhance Read/Write performance without providing fault tolerance.

Submit
32. It is sufficient to install antivirus on a network, on servers and systems exposed to internet. T/F?

Explanation

Installing antivirus software on network-exposed systems, servers, and endpoints is important, but it is not sufficient as a standalone defense. Modern cyber threats often bypass traditional antivirus through phishing, zero-day exploits, insider threats, and encrypted traffic. A multi-layered security approach is essential, combining antivirus with firewalls, intrusion detection systems (IDS), endpoint detection and response (EDR), network segmentation, regular patching, user education, and strong access controls. Relying only on antivirus creates a false sense of security and leaves critical gaps in protection.

Submit
33. What protocol is used between E-Mail servers?

Explanation

Simple Mail Transport Protocol (SMTP) defines message format and the methods to store and forward mail throughout the Internet to servers that provide message storage for incoming mail.

Submit
34. You have just upgraded you Server computers motherboard by adding an additional CPU as per instructions. You power On the server and observe that the second CPU is not recognized at all. What could be the possible cause for this?

Explanation

The CPU that has been added may not function if faulty but it will detected for during POST. The only reason why it would not be detected is that the BIOS may not be supporting it. It is also necessary to ensure that the BIOS be upgraded if necessary.

Submit
35. You have decided to provide for AFT (Adapter Fault Tolerance) on your network. Your router has just one port free where as you have hundreds of clients on your network. Will it be possible to implement the said fault tolerance in your network?

Explanation

AFT requires additional network adapter card and one additional port on the router/switch on whose network you wish to implement the said fault tolerant measure. Since the question statement iterates that the router has one port free. It will be possible to implement the fault tolerance on this network.

Submit
36. If a Web Server was also configured with a FTP services, how will the server differentiate between incoming packets intended for each respective service?

Explanation

Every service is designed to respond to a communication port number. The incoming packet will contain destination port number field which will indicate which service it is intending to communicate with. All connection oriented services will contain TCP as their protocol. Host headers are used to distinguish between different virtual sites. Transport layer protocols do not have any address.

Submit
37. Which of the following describes differential backup?

Explanation

As the name suggests the differential backup will backup the difference since last backup. Its reference will be the last full backup.

Submit
38. Which of the following platforms can host a NetWare print server? (Choose three.)

Explanation

Linux, NetWare 5 and Windows NT can all be used for NetWare printers.

Submit
39. You are setting up a Windows 2000 network. Your network is split between the different training departments on a campus. Each training department prefers to be on a separate subnet. There are three such departments. You have a single domain controller catering to these departments, although, there will be resource servers placed independently in each. Your finance department has rejected your request for purchase of a router. Which of the following will allow you to go ahead with implementing this LAN?

Explanation

Windows 2000 Server has a RRAS service that is a combination of a router and a RAS. This service can be made use of to make each resource server to behave as a router.

Submit
40. If you were to implement Cluster service between two servers, at least one of the server can still be accessed even if the Data Center lost complete power. T/F?

Explanation

This question cannot be analyzed unless we know that he Data Center has fault tolerance for power failure too. If the answer is No, then the moment the Data Center loses power, both the servers in the 2-node cluster will be inaccessible.

Submit
41. You notice that the domains file servers are all fast using up the available disk space. You are sure that the network usage for disk space is not very high. You wish to use the defragment option manually to be sure that the Defragmentation is satisfactory. Which of the following must you choose?

Explanation

The correct answer is "Right click My Computer, click Properties, and then, on the Tools tab, click Defragment Now." This option allows the user to manually initiate the defragmentation process on the file servers to ensure that the defragmentation is satisfactory.

Submit
42. Which of the following are two startup files required by the Novell Netware server? Choose two.

Explanation

Autoexec.Bat and Config.sys are two startup files for the MS DOS environment. The startup files for Novell Netware environment are Autoexec.Ncf and Startup.Ncf

Submit
43. Intel Xeon processor can access physical memory of maximum 64 MB. T/F?

Explanation

Intel Xeon processor can access maximum of 64 GB of physical memory.

Submit
44. You are implementing a network boot on your domain. The image for boot up should ideally be loaded from which of the following sources?

Explanation

Workstations are not ideal resources to house the OS image for network boot up no matter how reliable they are. Simply because they cannot run server related services on them. Authenticating servers should not ideally be engaged in any service other than catering to user authentication unless the domain size is very small. Ideal resource for housing the OS image for network boot for the clients would be a resource server.

Submit
45. When server crashes, which of the following would you investigate first?

Explanation

The best area to investigate, which will help in recovering the server is �What changes have been applied on to the server in the recent past?� Who was using the server or what application was being used is not of any consequence.

Submit
46. The server loadable modules of Novell Netware have which of the following file extensions?

Explanation

The Novell Netware server loadable modules have file extensions as NLM. VLMs are for clients. There is no extension such as SLM. VLSM relates to subnet mask and not Novell Netware.

Submit
47. If you have configured a mail server on one of your resource servers, which of the following protocol is mandatory for your mail server to push mails through the mail gateway?

Explanation

SMTP (Simple Mail Transfer Protocol) is responsible for enabling a mail server to push the mails through the mail gateway, to enable them reach the destinations they were intended for.

Submit
48. The DNS server uses broadcast method first to determine IP to Host resolution. T/F?

Explanation

The DNS service will first refer its cache, then the database and so on to perform resolution. Broadcast is employed only when the DNS service fails to fulfill the resolution.

Submit
49. With a Fabric switched fiber channel network, where the F-Port is located?

Explanation

In a Fabric switched fiber channel network, the F-Port is usually located at the Fabric Switch side. This means that the F-Port is typically found on the switch itself, rather than at the termination end or at the hub of an arbitrated loop. The F-Port is responsible for connecting the switch to other devices in the network, allowing for communication and data transfer between them.

Submit
50. If while upgrading a Windows based server, it crashes because of one of the system files belong to the previous version, which of the following utilities would you use to replace that one single file on the server?

Explanation

The Recovery console utility can be used to access the entire system area or for replacing critical files, which is very important while troubleshooting a server machine. Last known good configuration can be used to recover a system after problematic application installation or driver configuration. Safe mode is meant for display drivers only. Management Console is merely a shell or an interface for administrative utilitites.

Submit
51. Which of the following modes would you use to test the display driver of a Windows based server?

Explanation

The Windows based systems use a mode called the �Safe mode� to test and re-apply display drivers. This mode can also be used to install display drivers from a network resource.

Submit
52. You have installed the Server hardware on a clients place recently. The client complains that the Server is receiving intermittent supply. Upon reaching the clients place and observing the symptoms you suspect the problem is related to SCSI. How will you isolate this problem?

Explanation

By shutting off power to SCSI panel, you can be sure if the problem is related to SCSI as any shorting that was occurring will now be done away with. By shutting of power to the server, you will not be able to troubleshoot the problem at all. Stopping to use the SCSI devices is not a solution at all since the devices are powered ON and running irrespective of whether they are being used or not.

Submit
53. You have just connected your workstation to a Netware Server environment. Your configuration is complete as per your administrator. When you connect to the network, you are able to see the server and a few other workstations but not the whole network resources. What could the problem be?

Explanation

Your computer�s NIC is not configured with a frame type that matched the whole network. The server is usually bound with all frame types on the network. Hence you are able to see only computer�s with matching Ethernet frame type.

Submit
54. How can a client on a Windows based TCP/IP network see which is the remote server he is currently connected using NBT?

Explanation

NetBIOS over TCP/IP can be referred to as NBT. NBTSTAT is the diagnostic tool that reports statistics and connections for NetBIOS over TCP/IP.

Submit
55. You are introducing a Netware server to an existing Microsoft environment. Which of the following must you configure on all the systems of the network, all servers and clients included, if all the systems on the network must communicate with the Netware servers and vice-versa? Choose two relevant options.

Explanation

Protocols and frame types for all the systems must match if there has to be communication between the Netware servers and the rest of the network. Drivers are essential even if Netware servers were not introduced. Service packs are used only on Windows platform and not on all OS platforms.

Submit
56. A DHCP server never assigns a permanent lease to any of the clients. T/F?

Explanation

All critical and permanent resources on the network are configured to take permanent lease for a given IP address. These resources require a permanent address as their Identification on the network has to be permanent and cannot keep varying.

Submit
57. Which of the following commands can shut down a Novell NetWare Server?

Explanation

Typing the �down� command at the console will shut down the Netware server.

Submit
58. You have just cleaned and serviced your DAT drive as a part of preventive maintenance plan. You assign it to the backup operator for the daily backup process. The backup operator complains that the backup is not happening as usual. What would you suggest to him?

Explanation

Since the backup device has just been serviced, the only logical reason for backup to fail could be the backup tape itself.

Submit
59. Which of the following directories on the UNIX Servers will hold the password files?

Explanation

/ is the root directory. /bin hold binary files. /etc holds configuration related and password files. /dev holds files required to communicate with peripherals and drives.

Submit
60. Which of the following network classes is reserved for multicast addresses only?

Explanation

Class D networks are reserved for multicast addresses. Class A, B, and C networks contain assignable addresses, and Class E networks are reserved for future and experimental use as well as for
broadcasts.

Submit
61. Which of the following protocols can enable communication between servers and workstations that are a part of a heterogeneous network that have Windows as well as Netware? (Choose two)

Explanation

Both Microsoft and Netware support IP, whereas Microsoft has its own version of IPX that helps communication with Netware systems.
Incorrect Answers
C. NetBEUI is proprietary to Microsoft.
D. DLC is used only with legacy devices.

Submit
62. You have configured a UNIX server for a client which has been functional for sometime now. Recently the client has called saying a PCI card she tried to install on the server is not functional. She says that the card has passed the diagnostics. What do you suspect? Choose three.

Explanation

The PCI card will have to be installed in to the AIX server in three ways, either by using an appropriate driver, or by enabling the right software on the server by using the AIX installation CD, or by using the installation software that came along with the PCI card. Since the client says the card has passed the diagnostic tests, the card cannot be faulty

Submit
63. Which of the following is considered a Network Attached Storage device?

Explanation

Since the file server would have it's own IP address, and it is attached at a separate location from the department it serves and has the correct software installed, it does qualify as a NAS. While DAT tape drives are traditional backup devices, they are not Network Attached Storage devices because they do not have a separate IP address.

Submit
64. Which of the following is a basic requirement for configuring a Windows-based RAS service?

Explanation

The basic requirement can be met using Windows NT 4.0 Server itself. Although, the RAS service, does not get shipped along with the Operating System CD, as it does with the higher versions.

Submit
65. Disk mirroring is an ideal fault tolerance for a system partition. T/F?

Explanation

A system partition on the server should not be mirrored as it will slow down the performance on the server.

Submit
66. What is the bus width of EISA bus?

Explanation

The Extended Industry Standard Architecture (EISA) bus has a 32-bit data bus width, allowing it to transfer 32 bits of data simultaneously, which is an improvement over the earlier 16-bit ISA bus.

Submit
67. Which of the following is a fault tolerant measure for a server?

Explanation

FDDI is a fault tolerant measure for a network segment. RAID is an online fault tolerance for data storage device. Cluster service helps to host a group of servers on the network. If one of the servers in the cluster fails, another will be taking over to ensure that the network users remain transparent and unaffected by the failure of the server to which they were connected.

Submit
68. If you are setting up RAS (Remote Access Service) for a multi-platform network and do not know the data communication protocols in use, which of the following protocols would be a suitable choice?

Explanation

PPP is capable of building end-to-end connections for each specific protocol that can be encapsulated for that session.

Submit
69. You are installing a UNIX server. You are using original OEM media to do so and get the error message Invalid boot image. Install system software. You have already installed the said system software. What could the problem be? Choose 3

Explanation

The possible main reason for this could be RAM being less than 16 MB. Also less probable reasons could be that the system software is corrupt or the hard disk partition is corrupt, although these two problems may be indicated with much more specific error messages. Virus is not a considered problem here as the installation is being done through original OEM media.

Submit
70. Ultra Wide SCSI supports 32-bit bus. T/F?

Explanation

SCSI Type Transfer speed Bus
SCSI-1 5MBPS 8 bit bus
Fast Wide SCSI 2 20MBPS 16 bit bus
Ultra Wide SCSI 3 40MBPS 16 bit bus

Submit
71. Which of the following would be criteria to configure RAS service on a network? Choose 3

Explanation

When configuring RAS other than using a resource server on which the RAS service would be running, you also need DHCP and DNS to be a part of your network infrastructure. Static IP addresses are not at all a feasible option for RAS use. As theses addresses are assigned and relinquished dynamically.

Submit
72. You are configuring VPN on your server. You will need to test this configuration from the client end. Which of the following is a best way to verify if authentication is coming through? Choose two.

Explanation

Since you are just testing the setup yet, it is best to approach it in simple steps and avoid adding complexity which will lead to unnecessary troubleshooting. It is better to go in for clear text authentication using simple passwords

Submit
73. Which of the following tape backup methods alter the archive attribute? (Choose two.)

Explanation

A full backup backs up as well as an incremental backup backs up can affect the archive attribute.
Incorrect Answers
A, B
Differential backup as well as the sequential backup does not affect the archive attribute.

Submit
74. Which of the following is an appropriate requirement for a Server that is intended to be a DNS server?

Explanation

All critical Network Service must be running on Servers that are assigned Static IP address to avoid confusion. The DNS service must be running for a resource server to be recognized as a DNS server. Only one IP address is required.

Submit
75. You plan to install a new Hardware level RAID. You have updated the system BIOS accordingly. The said RAID is the current state of art configuration. After installation on your server, it still fails to get recognized. What do you need to verify now?

Explanation

Since the question states that the firmware is on the system is updated and the RAID itself is of the current state of art technology, the driver installation is not a problem. It must be recognized automatically. Available memory and service pack are irrelevant options here. The problem evidently is with the IRQ assignment itself.

Submit
76. Which of the following protocols follows a naming convention, which allows the hardware address of the NIC to be a part of the name?

Explanation

Netware workstations usually have two parts to the name, the first part is common to all nodes and is the network ID, the second part is the unique MAC address of that respective machine.

Submit
77. On a cross platform environment, between Microsoft and Netware based systems, which of the following would be essential for resource access? Choose two relevant options.

Explanation

Protocols and communications help in establishing communication on the said platform. For enabling resource access, you require Gateway service for Netware on the servers and client service for Netware on the clients.

Submit
78. Which of the following would be verified during the installation planning phase?

Explanation

User access permissions are a part of resource availability planning and not installation planning.

Submit
79. Which of the following is not the correct way of terminating SCSI devices?

Explanation

The SCSI device needs to be terminated on both ends for proper functioning. If terminated on one end, it will lead to intermittent problems. SCSI devices should never be terminated on any of the in between devices.

Submit
80. You have configured a resource server RouteServ as a router and it will be connecting two networks Network A and Network B. Which of the following will be applicable to it?

Explanation

A resource server that is configured as a router, and connects two networks, will require two interfaces and one default gateway for each interface. Otherwise it will be unable to route packets between the two networks. It is mandatory to assign static IP addresses in this case.

Submit
81. You have purchased application software that is meant to run on Windows Server 2003. You have 2 servers of Windows Server 2003 running in your network. After installing the said software on the first server as per instructions, it crashes. Which of the following steps have you skipped in the process of installation?

Explanation

After every installation and configuration on a network operating system, it is very essential to re-apply the service pack or upgrade it according to requirements. Since the question statements is already saying that the installation has been carried out �as per instructions�, choices A and B are incorrect. If the hardware requirement is not met, you will be notified by the software during the process of installation itself. Hence choice C is also incorrect.

Submit
82. Based on which of the following would a truly Enterprise Server perform any operation on the network?

Explanation

For a truly Enterprise Server, the basis for performing any operation on the network would be the time stamp as it maintains the time of the operation for any updating requires on the network across the globe.

Submit
83. Which of the following connectors can be used with external SCSI interfaces?(Choose three.)

Explanation

The DB-25 Female connector can be used with external SCSI interfaces. It is a common connector used for SCSI devices. Centronics-50 is another connector that can be used with external SCSI interfaces. It is a smaller version of the Centronics-36 connector and is commonly used for connecting SCSI devices. The High density 68-pin connector is also compatible with external SCSI interfaces. It is a high-speed connector used for connecting SCSI devices such as hard drives and tape drives.

Submit
84. Of the following protocols would be more appropriate to secure communication on an IP based network?

Explanation

Both IPSec as well as SSL can be used for this purpose, depending on the specific scenario. L2TP is a tunneling protocol and is not relevant here. Kerberos cannot be used for IP based network.

Submit
85. You are configuring an adapter on your server, what information must you know to avoid resource conflicts?

Explanation

Configurable options that often must be set are the IRQ, the base I/O address, the base memory address, and transceiver settings.

Submit
86. Which of the following RAID levels provides both redundancy and improved performance, but requires at least four drives and uses a combination of striping and mirroring?

Explanation

RAID 10 (also known as RAID 1+0) combines the features of RAID 1 (mirroring) and RAID 0 (striping). It provides both redundancy (data is mirrored) and improved performance (data is striped across multiple drives). RAID 10 requires at least four drives to implement: two pairs of mirrored drives, with data striped across those pairs. This makes it more resilient than RAID 0, which offers no redundancy, and typically faster than RAID 5, which provides redundancy through parity but with a performance trade-off.

Submit
87. Which of the following would you use to secure communication between a Windows 2000 client and a Windows 2000 server on your network?

Explanation

You may use either IPSec or Kerberos here. Although, IPSec would be more flexible when expanding your network rather than Kerberos.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 25, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 25, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (87)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following would make an ideal administrator password?
Sally cannot access App1 but can access App2 on a server. Whereas John...
You have installed the Server hardware on a clients place recently....
You are investigating a server crash at the client site. Which of the...
When a Windows 2000 server goes down, the best and the surest way to...
DNS, FTP, SNMP, SMTP, and TELNET are all IP based services that cannot...
Your manager has just asked you to set filtering only on interesting...
It is mandatory to have a Primary DNS server as well as Secondary DNS...
Which of the following services is responsible for resolving IP to...
An IDE based RAID system is more fault tolerant than a SCSI based...
Which of the following is not hazardous for the Server configuration...
SCSI controller supports bus mastering. T/F ?
If you were a administering a Windows 2000 system, where would you...
Which of the following cannot be used as a fault tolerant measure?
Windows 2000 cannot function without DNS. T/F?
Hardware RAID is expensive where as Software RAID is poor in...
If you were hosting an application on your web server that allows...
Your client has been installing an application on a Windows 2000...
The Ultra2 Wide SCSI can provide 80 MB/sec transfer rate. T/F ?
Which of the following protocols is required by an email Server?
What is the best strategy for implementing a continuous power supply...
A RAS service and VPN service cannot be configured on the same...
Which of the following configurations is mandatory when communicating...
VPN cannot be used be used by a server for security in communication....
You suspect that the network server could not be receiving updates as...
What should you use to inhibit the spread of viruses on your...
If you were planning to host a web server on a Windows based resource...
When using a 1-bit wide SCSI drive, which of the following drives will...
You have just configured a server to be a print server and are trying...
Which of the following statements about clustering is true? Choose...
You wish to improve the performance of data transaction on the network...
It is sufficient to install antivirus on a network, on servers and...
What protocol is used between E-Mail servers?
You have just upgraded you Server computers motherboard by adding an...
You have decided to provide for AFT (Adapter Fault Tolerance) on your...
If a Web Server was also configured with a FTP services, how will the...
Which of the following describes differential backup?
Which of the following platforms can host a NetWare print server?...
You are setting up a Windows 2000 network. Your network is split...
If you were to implement Cluster service between two servers, at least...
You notice that the domains file servers are all fast using up the...
Which of the following are two startup files required by the Novell...
Intel Xeon processor can access physical memory of maximum 64 MB. T/F?
You are implementing a network boot on your domain. The image for boot...
When server crashes, which of the following would you investigate...
The server loadable modules of Novell Netware have which of the...
If you have configured a mail server on one of your resource servers,...
The DNS server uses broadcast method first to determine IP to Host...
With a Fabric switched fiber channel network, where the F-Port is...
If while upgrading a Windows based server, it crashes because of one...
Which of the following modes would you use to test the display driver...
You have installed the Server hardware on a clients place recently....
You have just connected your workstation to a Netware Server...
How can a client on a Windows based TCP/IP network see which is the...
You are introducing a Netware server to an existing Microsoft...
A DHCP server never assigns a permanent lease to any of the clients....
Which of the following commands can shut down a Novell NetWare Server?
You have just cleaned and serviced your DAT drive as a part of...
Which of the following directories on the UNIX Servers will hold the...
Which of the following network classes is reserved for multicast...
Which of the following protocols can enable communication between...
You have configured a UNIX server for a client which has been...
Which of the following is considered a Network Attached Storage...
Which of the following is a basic requirement for configuring a...
Disk mirroring is an ideal fault tolerance for a system partition....
What is the bus width of EISA bus?
Which of the following is a fault tolerant measure for a server?
If you are setting up RAS (Remote Access Service) for a multi-platform...
You are installing a UNIX server. You are using original OEM media to...
Ultra Wide SCSI supports 32-bit bus. T/F?
Which of the following would be criteria to configure RAS service on a...
You are configuring VPN on your server. You will need to test this...
Which of the following tape backup methods alter the archive...
Which of the following is an appropriate requirement for a Server that...
You plan to install a new Hardware level RAID. You have updated the...
Which of the following protocols follows a naming convention, which...
On a cross platform environment, between Microsoft and Netware based...
Which of the following would be verified during the installation...
Which of the following is not the correct way of terminating SCSI...
You have configured a resource server RouteServ as a router and it...
You have purchased application software that is meant to run on...
Based on which of the following would a truly Enterprise Server...
Which of the following connectors can be used with external SCSI...
Of the following protocols would be more appropriate to secure...
You are configuring an adapter on your server, what information must...
Which of the following RAID levels provides both redundancy and...
Which of the following would you use to secure communication between a...
Alert!

Advertisement