Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A set of practice questions for the comptia server+ sk0-005 exam, covering various aspects of server administration, including networking, security, troubleshooting, and hardware. The questions are designed to test your understanding of key concepts and best practices in server management.
Typology: Exams
1 / 35
Which of the following is typical of software licensing in the cloud? - AnswerSubscription-Based A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring?(Choose two.) - AnswerMemory and CPU After configuring IP networking on a newly commissioned server, a server administrator installs a straight-through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below: The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity? - AnswerA misconfigured NIC on the server Most Voted Hide Solution A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue? - Answerdf -h
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.) - AnswerThe server requires OS updates The time synchronization service is disabled on the servers Hide Solution A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method? - AnswerImplement port security on the switches Hide Solution A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard? - Answer172.16.19. An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server's console? - AnswerRDP
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible? - AnswerTake a snapshot of the original VM A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann's home directory permissions and discovers the following: dr-xr- xr-- /home/AnnWhich of the following commands should the administrator use to resolve the issue without granting unnecessary permissions? - Answerchmod 754 /home/Ann Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption? - AnswerBusiness impact analysis A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using ActiveDirectory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue? - AnswerThe server is not joined to the domain A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue? - AnswerIncreased PDU capacity
Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits? - AnswerBollards A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack? - AnswerInstall the heaviest server at the bottom of the rack A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use? - Answer A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST? - AnswerYUM dependencies Which of the following is an example of load balancing? - AnswerRound robin Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box? - AnswerVBS Which of the following tools will analyze network logs in real time to report on suspicious log events? - AnswerSIEM
Which of the following will correctly map a script to a home directory for a user based on username? - Answer\server%username% A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue?(Choose two.) - AnswerFault Memory Incorrectly seated Memory A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted? - AnswerPKI A technician is attempting to update a server's firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into theOS. Which of the following should the technician do NEXT to install the firmware? - AnswerBoot from the media A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters? - Answermount ג€"o remount, rw /newdisk Which of the following BEST describes the concept of right to downgrade? - AnswerIt allows a server to run on fewer resources than
what is outlined in the minimum requirements document without purchasing a license A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open: 443 636 Which of the following open ports should be closed to secure the server properly? (Choose two.) - Answer 53 A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task? - Answernetstat -a Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked? - AnswerEncrypt the data at rest A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server usingPuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is suׁ cessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.localThe IP address in the command output is different on each
machine. Which of the following is the MOST likely reason for the connection failure? - AnswerA misconfigured hosts.allow file A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability? - AnswerInsider Threat A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running? - AnswerUser account Control A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue? (Choose two.) - AnswerAdware is installed on the users' devices The server is infected with a virus A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup? - Answer255.255.255.
A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume? - AnswerRebuild the volume A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.) - AnswerAudit all group privileges and permissions Initialize a port scan on the server to identify open ports A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action? - AnswerPatch the server OS A technician runs top on a dual-core server and notes the following conditions: top `"- 14:32:27, 364 days, 14 users load average 60.5 12. 13.6Which of the following actions should the administrator take? - AnswerRequest that users log off the server A technician needs to set up a server backup method for some systems. The company's management team wants to have quick restores but minimize the amount of backup media required. Which of the following
are the BEST backup methods to use to support the management's priorities? (Choose two.) - AnswerDifferential Synthetic full Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task? - AnswerFailback Which of the following policies would be BEST to deter a brute-force login attack? - AnswerPassword Complexity A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS.On which of the following drive types should the technician install the hypervisor? - AnswerSATA Drive A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1Which of the following BEST describes what is happening? - AnswerThe server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array? - AnswerRAID 6 Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation? - AnswerSCP Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future? - AnswerConnect the server to a UPS Which of the following describes the installation of an OS contained entirely within another OS installation? - AnswerHypervisor A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the: - Answerhardware is UEFI compliant An administrator is configuring a server that will host a high- performance financial application. Which of the following disk types will serve this purpose? - AnswerSATA SSD
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting? - AnswerLive Failover When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address? - AnswerNAT A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network.Which of the following should the technician do FIRST to return the server to service as soon as possible? - AnswerDowngrade the NIC firmware A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation? - AnswerDisk quotas A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution? - AnswerCreate a snapshot of the fileshare
Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage? - AnswerRTO Which of the following actions should a server administrator take once a new backup scheme has been configured? - AnswerCheck the media integrity A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
Enforcing
Which of the following commands should the administrator issue to configure MySQL successfully? - Answersetenforce 0 Which of the following backup types only records changes to the data blocks on a virtual machine? - AnswerIncremental
Which of the following server types would benefit MOST from the use of a load balancer? - AnswerWeb Server A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required? - AnswerIncremental A technician is unable to access a server's package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.) - AnswerThe server has an architecture mismatch they system time is not synchronized A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose? - AnswerRAID 0 A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement? - AnswerCore A company's IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company's SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request? - AnswerMove traffic from port 389 to port 637
Which of the following would be BEST to help protect an organization against social engineering? - AnswerAn updated code of conduct to enforce social media A technician is connecting a server's secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician performNEXT? - AnswerEnable the port on the server Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications? - AnswerSSO A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use? - AnswerA port scanner A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations? - AnswerInstall bollards A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable? - AnswerReplace the disk
Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future? - AnswerCable management Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform? - AnswerRole-Based A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes.After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue? - AnswerReinstalling the heat sink with new thermal paste A server administrator is exporting Windows system files before patching and saving them to the following location: \server1\ITDept
Which of the following is a storage protocol that the administrator is MOST likely using to save this data? - AnswerCIFS A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the
technician should FIRST ensure: - AnswerNTP is running on the database system A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task? - AnswerNFS A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure? - AnswerA Secure Shell connection A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue? - AnswerA S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements? - AnswerTemplate Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.) - AnswerPerform a root cause analysis
Document the findings A snapshot is a feature that can be used in hypervisors to: - Answerperform a backup restore. A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task? - AnswerUse a VM template A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country? - AnswerConfigure a firewall The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.) - AnswerRFID Proximity readers A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:
The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 - Default gateway: 192.168.10.1 - A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server? - AnswerIP address: 192.168.1.2/24 Default gateway: 192.168.10. A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install? - AnswerDatabase Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking? - AnswerInstall a DLP solution A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task? - AnswerCreate a group that includes all users and assign the proper permissions A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans
that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting? - AnswerCPU overheating Which of the following would a systems administrator implement to ensure all web traffic is secure? - AnswerSSL An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration. Which of the following technologies is the new connection using? - AnswerFCoE A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end- user specifications, the new solution needs to adhere to the following basic requirements:
Use SSD hard drives for the data application array. A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands: Which of the following caused the issue? - AnswerDuplicate IP address A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST? - AnswerShut down the server A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the: - AnswerSLA Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster? - AnswerRTO A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps. Which of the following testing methods is the administrator MOST likely performing? - AnswerTabletop A technician wants to limit disk usage on a server. Which of the following should the technician implement? - AnswerDisk quotas
A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished? - AnswerSwap the drive and initialize the disk A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network? - Answer255.255.255.224 A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server? - AnswerOut-of-band management A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be installed on the server? - AnswerDatabase A server administrator is deploying a UPS at a datacenter and notices the device is making an audible beep every few seconds. Which of the following is theMOST likely cause? - AnswerThe battery is faulty A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to
ensure the OS will work as intended? - AnswerConsult the HCL to ensure everything is supported An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution? - AnswerOpen-source Which of the following commands should a systems administrator use to create a batch script to map multiple shares? - Answernet use An administrator is troubleshooting a failure in the datacenter in which a server shut down/powered off when utility power was lost. The server had redundant power supplies. Which of the following is the MOST likely cause of this failure? - AnswerBoth power supplies were connected to the same power feed Which of the following refers to the requirements that dictate when to delete data backups? - AnswerRetention policies A server administrator has a system requirement to install the virtual OS on bare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Choose two.) - AnswerType 1 Guest
A technician is troubleshooting a server issue. Which of the following should the technician do to ensure the solution can be duplicated in the future? - AnswerDocument the findings, actions, and outcomes throughout the process Which of the following ensures a secondary network path is available if the primary connection fails? - AnswerLink aggregation A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application? - AnswerRound Robin Which of the following is the MOST secure method to access servers located in remote branch offices? - AnswerUse an MFA out-of-band solution A server administrator is installing a new server that uses 40Gb network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use? - AnswerQSFP+ A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it? - AnswerLVM
Which of the following should be placed at the top of a Bash script to ensure it can be executed? - Answer#! A systems administrator has several different types of hard drives. The administrator is setting up a NAS that will allow end users to see all the drives within theNAS. Which of the following storage types should the administrator use? - AnswerJust a bunch of disks Which of the following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster? - AnswerFallback cluster services A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS? - AnswerRAID 1 A systems administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability? - AnswerEnabling a NIDS A technician is checking a server rack. Upon entering the room, the technician notices the fans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans
in that server are operating at full speed? - AnswerA fan failure has occurred, and the other fans have increased speed to compensate. A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following installation methods is BEST suited to meet the company policy? - AnswerCore Which of the following licenses would MOST likely include vendor assistance? - AnswerSubscription A company wants to deploy software to all users, but very few of them will be using the software at any one point in time. Which of the following licensing models would be BEST for the company? - AnswerPer concurrent user A technician is setting up a physical server that will be used to store sensitive data. The technician plans to set up the internal hard drives in a RAID 5 array for redundancy. Which of the following would be the BEST type of interface for the technician to use? - AnswerSAS A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/fstab file has the following entry: nfsserver:/home /home nfs defaults 0 0 However, a df -h /home command returns the following information: /dev/sda2 10G 1G 9G 10% /home