Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Comptia Server+ SK0-005 Questions with Answers 2024, Exams of Computer Science

Comptia Server+ SK0-005 Questions with Answers 2024

Typology: Exams

2023/2024

Available from 06/12/2024

maryann001
maryann001 ๐Ÿ‡บ๐Ÿ‡ธ

3

(2)

1.4K documents

1 / 21

Toggle sidebar

Related documents


Partial preview of the text

Download Comptia Server+ SK0-005 Questions with Answers 2024 and more Exams Computer Science in PDF only on Docsity! Comptia Server+ SK0-005 Questions with Answers 2024 Which of the following is typical of software licensing in the cloud? โœ” Subscription-Based A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring?(Choose two.) โœ” Memory and CPU After configuring IP networking on a newly commissioned server, a server administrator installs a straight-through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below: The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity? โœ” A misconfigured NIC on the server Most Voted Hide Solution A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue? โœ” df -h Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.) โœ” The server requires OS updates The time synchronization service is disabled on the servers Hide Solution A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method? โœ” Implement port security on the switches Hide Solution A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard? โœ” 172.16.19.241 An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server's console? โœ” RDP A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible? โœ” Take a snapshot of the original VM A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann's home directory permissions and discovers the following: dr-xr-xr-- /home/AnnWhich of the following commands should the administrator use to resolve the issue without granting unnecessary permissions? โœ” chmod 754 /home/Ann Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption? โœ” Business impact analysis A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using ActiveDirectory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue? โœ” The server is not joined to the domain A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue? โœ” Increased PDU capacity Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits? โœ” Bollards A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack? โœ” Install the heaviest server at the bottom of the rack A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use? gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup? โœ” 255.255.255.254 A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume? โœ” Rebuild the volume A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.) โœ” Audit all group privileges and permissions Initialize a port scan on the server to identify open ports A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action? โœ” Patch the server OS A technician runs top on a dual-core server and notes the following conditions: top `"- 14:32:27, 364 days, 14 users load average 60.5 12.4 13.6Which of the following actions should the administrator take? โœ” Request that users log off the server A technician needs to set up a server backup method for some systems. The company's management team wants to have quick restores but minimize the amount of backup media required. Which of the following are the BEST backup methods to use to support the management's priorities? (Choose two.) โœ” Differential Synthetic full Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task? โœ” Failback Which of the following policies would be BEST to deter a brute-force login attack? โœ” Password Complexity A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS.On which of the following drive types should the technician install the hypervisor? โœ” SATA Drive A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1Which of the following BEST describes what is happening? โœ” The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array? โœ” RAID 6 Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation? โœ” SCP Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future? โœ” Connect the server to a UPS Which of the following describes the installation of an OS contained entirely within another OS installation? โœ” Hypervisor A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the: โœ” hardware is UEFI compliant An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose? โœ” SATA SSD Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting? โœ” Live Failover When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address? โœ” NAT A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network.Which of the following should the technician do FIRST to return the server to service as soon as possible? โœ” Downgrade the NIC firmware A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation? โœ” Disk quotas A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution? โœ” Create a snapshot of the fileshare Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage? โœ” RTO Which of the following actions should a server administrator take once a new backup scheme has been configured? โœ” Check the media integrity A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.) โœ” Remote Desktop IP KVM A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully? โœ” setenforce 0 Which of the following backup types only records changes to the data blocks on a virtual machine? โœ” Incremental A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally. Which of the following is the reason for this issue? โœ” A S.M.A.R.T. error is simply a bad sector. The drive has marked the sector as bad and will continue to function properly A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements? โœ” Template Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.) โœ” Perform a root cause analysis Document the findings A snapshot is a feature that can be used in hypervisors to: โœ” perform a backup restore. A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task? โœ” Use a VM template A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country? โœ” Configure a firewall The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.) โœ” RFID Proximity readers A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows: The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 - Default gateway: 192.168.10.1 - A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server? โœ” IP address: 192.168.1.2/24 Default gateway: 192.168.10.1 A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install? โœ” Database Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking? โœ” Install a DLP solution A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task? โœ” Create a group that includes all users and assign the proper permissions A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting? โœ” CPU overheating Which of the following would a systems administrator implement to ensure all web traffic is secure? โœ” SSL An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration. Which of the following technologies is the new connection using? โœ” FCoE A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements: 1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected. 2. Application data IOPS performance is a must. 3. Data availability is a high priority, even in the case of multiple hard drive failures. Which of the following are the BEST options to comply with the user requirements? (Choose three.) โœ” Install the OS on a RAID 1 array. Configure RAID 5 for the application data. Use SSD hard drives for the data application array. A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands: Which of the following caused the issue? โœ” Duplicate IP address A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST? โœ” Shut down the server A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the: โœ” SLA Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster? โœ” RTO A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps. Which of the following testing methods is the administrator MOST likely performing? โœ” Tabletop A technician wants to limit disk usage on a server. Which of the following should the technician implement? โœ” Disk quotas A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished? โœ” Swap the drive and initialize the disk A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network? โœ” 255.255.255.224 A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to A technician is checking a server rack. Upon entering the room, the technician notices the fans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed? โœ” A fan failure has occurred, and the other fans have increased speed to compensate. A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following installation methods is BEST suited to meet the company policy? โœ” Core Which of the following licenses would MOST likely include vendor assistance? โœ” Subscription A company wants to deploy software to all users, but very few of them will be using the software at any one point in time. Which of the following licensing models would be BEST for the company? โœ” Per concurrent user A technician is setting up a physical server that will be used to store sensitive data. The technician plans to set up the internal hard drives in a RAID 5 array for redundancy. Which of the following would be the BEST type of interface for the technician to use? โœ” SAS A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/fstab file has the following entry: nfsserver:/home /home nfs defaults 0 0 However, a df -h /home command returns the following information: /dev/sda2 10G 1G 9G 10% /home Which of the following should the technician attempt FIRST to resolve the issue? โœ” mount /home A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non- company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals? โœ” A hot site Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen? โœ” Encryption at rest A company stores extremely sensitive data on an air-gapped system. Which of the following can be implemented to increase security against a potential insider threat? โœ” Two-person integrity Which of the following can be used to map a network drive to a user profile? โœ” Login script A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue? โœ” The power supply is faulty and is shutting down the system. A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue? โœ” The backplane has failed. Which of the following techniques can be configured on a server for network redundancy? โœ” Teaming A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Choose two.) โœ” The power supply The hard drive An administrator is configuring a host-based firewall for a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Choose three.) โœ” 21 22 389 A technician needs to configure a server's RAID array for maximum capacity. Which of the following RAID levels BEST meets this requirement? โœ” RAID 0 A user is unable to modify files on a Windows fileshare. A technician examines the system and determines the user is a member of Group A. Group A was granted full control over the files. Which of the following is MOST likely causing the access issues? โœ” Share permissions Users are experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with white letters appears. Which of the following troubleshooting steps should the administrator perform FIRST? โœ” Review the log files Joe, a technician, wants to configure a server's networking information so he will no longer need to maintain a list of names and IP addresses in a file on the server. Which of the following will work BEST to accomplish this task? โœ” DHCP A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available? โœ” Configure the drive as dynamic. Which of the following are measures that should be taken when a data breach occurs? (Choose two.) โœ” Disable unnecessary ports. Identify the exploited vulnerability. A technician is building a lab to learn storage redundancy techniques. Which of the following is the MOST cost-effective method the technician can deploy? โœ” JBOD A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received the following output when trying to execute the script: hash: ./startUp.sh: Permission deniedWhich of the following commands would BEST resolve the error message? โœ” chmod +x startUp.sh Due to a recent application migration, a company's current storage solution does not meet the necessary requirements for hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this issue? โœ” Deploy a new Fibre Channel SAN solution. Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Choose two.) โœ” Bootloader password BIOS/UEFI password โœ” Warm An administrator is investigating a physical server that will not boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passesPOST, but the OS does not load. The administrator verifies the CPU and RAM are both seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue? โœ” There are multiple failed hard drives. Which of the following load-balancing methods would be BEST described as each connection selecting the next path? โœ” Round robin Which of the following should be configured in pairs on a server to provide network redundancy? โœ” DLP Which of the following BEST describes a security control that requires validating the user's physical characteristics? โœ” Biometrics An administrator has set up a GPO to disable USB drive access on a company's servers. The GPO is set up as a computer configuration policy and does not use security groups filtering. The administrator is testing to ensure the policy is working correctly. A server in the accounting OU works as expected, but a server in the sales OU is still allowing access to USB drives. The administrator runs the gpupdate /force command and tries again; however, the server still allows access to the USB drive. Which of the following is the MOST likely cause? โœ” Item-level targeting is not configured properly. A technician recently applied a patch to a working server. After rebooting, the technician notices the server is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity? โœ” Change the service account permissions. Users report they are unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended, it has now been recalled and removed from the website, as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Choose two.) โœ” Reimage the server with a different OS. Run a port scan to verify open ports. An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured? โœ” DNS