ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Users at a company work with highly sensitive dat

The security department implemented an administrative and technical control to enforce leastprivilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
The security department implemented an administrative and technical control to enforce leastprivilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
Utilize privacy screens.
Utilize privacy screens.
Implement disk quotas.
Implement disk quotas.
Install a DLP solution.
Install a DLP solution.
Enforce the lock-screen feature.
Enforce the lock-screen feature.
Suggested answer: C
Explanation:

Components of a Data Loss Solution

Reference: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ The best way to protect the data from leaking is to install a DLP solution. A DLP (Data Loss Prevention) solution is a software that helps businesses prevent confidential data from being leaked or stolen by unauthorized parties. A DLP solution can identify, monitor, and protect data as it moves across networks and devices, such as endpoints, email, web, cloud applications, or removable media. A DLP solution can also enforce security policies based on content and context for data in use, in motion, and at rest. A DLP solution can detect and prevent data breaches by using various techniques, such as content inspection, contextual analysis, encryption, blocking, alerting, warning, quarantining, or other remediation actions.

asked 02/10/2024
Jesserey Joseph
43 questions

Question 92

Report Export Collapse

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Create a group that includes all users and assign it to an ACL.
Create a group that includes all users and assign it to an ACL.
Assign individual permissions on the folder to each user.
Assign individual permissions on the folder to each user.
Create a group that includes all users and assign the proper permissions.
Create a group that includes all users and assign the proper permissions.
Assign ownership on the folder for each user.
Assign ownership on the folder for each user.
Suggested answer: C
Explanation:

The top portion of the dialog box lists the users and/or groups that have access to the file or folder.

Reference: https://www.uwec.edu/kb/article/drives-establishing-windows-file-and-folder-levelpermissions/

asked 02/10/2024
Danilo Paolucci
46 questions

Question 93

Report Export Collapse

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

Firmware incompatibility
Firmware incompatibility
CPU overheating
CPU overheating
LED indicators
LED indicators
ESD issues
ESD issues
Suggested answer: B
Explanation:

Unexpected shutdowns. If the system is randomly shutting down or rebooting, the most likely cause is a heat problem.

Reference: https://www.microsoftpressstore.com/articles/article.aspx?p=2224043&seqNum=3

asked 02/10/2024
Ilia Voronkov
46 questions

Question 94

Report Export Collapse

Which of the following would a systems administrator implement to ensure all web traffic is secure?

SSH
SSH
SSL
SSL
SMTP
SMTP
PGP
PGP
Suggested answer: B
Explanation:

Secure Sockets Layer (SSL): SSL and its successor Transport Layer Security (TLS) enable client and server computers to establish a secure connection session and manage encryption and decryption activities.

Reference: https://paginas.fe.up.pt/~als/mis10e/ch8/chpt8-4bullettext.htm

asked 02/10/2024
Jonno Sweeney
47 questions

Question 95

Report Export Collapse

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

iSCSI
iSCSI
eSATA
eSATA
NFS
NFS
FcoE
FcoE
Suggested answer: A
Explanation:

Reference: https://docs.oracle.com/cd/E26996_01/E18549/html/BABHBFHA.html

asked 02/10/2024
Marcin Piotrowski
43 questions

Question 96

Report Export Collapse

HOTSPOT

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

CompTIA SK0-005 image Question 96 97767 10022024175342000000

CompTIA SK0-005 image Question 96 97767 10022024175342000000


CompTIA SK0-005 image Question 96 97767 10022024055342000
Correct answer: CompTIA SK0-005 image answer Question 96 97767 10022024055342000
asked 02/10/2024
Steven Owens
49 questions

Question 97

Report Export Collapse

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.
The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.
Application data IOPS performance is a must.
Application data IOPS performance is a must.
Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
Install the OS on a RAID 0 array.
Install the OS on a RAID 0 array.
Install the OS on a RAID 1 array.
Install the OS on a RAID 1 array.
Configure RAID 1 for the application data.
Configure RAID 1 for the application data.
Configure RAID 5 for the application data.
Configure RAID 5 for the application data.
Use SSD hard drives for the data application array.
Use SSD hard drives for the data application array.
Use SATA hard drives for the data application array.
Use SATA hard drives for the data application array.
Use a single JBOD for OS and application data.
Use a single JBOD for OS and application data.
Suggested answer: B, D, E
Explanation:

To comply with the user requirements, the best options are to install the OS on a RAID 1 array, configure RAID 5 for the application data, and use SSD hard drives for the data application array. Here is why:

RAID 1 is a mirroring technique that creates an exact copy of data on two disks. This provides redundancy and fault tolerance in case of hard drive failure. RAID 1 also improves read performance since either disk can be read at the same time. Therefore, installing the OS on a RAID 1 array meets the first requirement of separating the OS from the application data and protecting it from hard drive failure.

RAID 5 is a striping technique with parity that distributes data and parity blocks across three or more disks. This provides improved performance and storage efficiency compared to RAID 1, as well as fault tolerance in case of a single disk failure. Therefore, configuring RAID 5 for the application data meets the second and third requirements of providing high IOPS performance and data availability. SSD hard drives are solid-state drives that use flash memory to store data. They have no moving parts and offer faster read and write speeds, lower latency, and lower power consumption than traditional HDDs. Therefore, using SSD hard drives for the data application array meets the second requirement of providing high IOPS performance.

Reference:

https://phoenixnap.com/kb/raid-levels-and-types

https://en.wikipedia.org/wiki/Standard_RAID_levels

asked 02/10/2024
Krishna chaithanya
42 questions

Question 98

Report Export Collapse

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

CompTIA SK0-005 image Question 98 97769 10022024175342000000

Which of the following caused the issue?

Duplicate IP address
Duplicate IP address
Incorrect default gateway
Incorrect default gateway
DHCP misconfiguration
DHCP misconfiguration
Incorrect routing table
Incorrect routing table
Suggested answer: A
Explanation:

The ping command output shows that the NIC has an IP address of 192.168.1.100 and a default gateway of 192.168.1.1. However, when the technician tries to ping the default gateway, the reply comes from another IP address: 192.168.1.101. This means that there is another device on the network that has the same IP address as the default gateway, and it is responding to the ping request instead of the intended destination.

A duplicate IP address can cause network connectivity problems, such as packet loss, routing errors, or unreachable hosts. To resolve this issue, the technician should either change the IP address of the default gateway or the device that is conflicting with it, or use DHCP to assign IP addresses automatically and avoid conflicts.

The other options are not correct because they do not explain the ping output. An incorrect default gateway would cause no reply or a destination unreachable message, not a reply from a different IP address. A DHCP misconfiguration would cause an invalid or no IP address on the NIC, not a duplicate IP address on the network. An incorrect routing table would cause routing errors or unreachable destinations, not a reply from a different IP address.

Reference:

https://askleo.com/what_is_ping_and_what_does_its_output_tell_me/ https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/ping

asked 02/10/2024
Danish Vohra
40 questions

Question 99

Report Export Collapse

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Inspect the GPU that is being installed.
Inspect the GPU that is being installed.
Ensure the GPU meets HCL guidelines.
Ensure the GPU meets HCL guidelines.
Shut down the server.
Shut down the server.
Disconnect the power from the rack.
Disconnect the power from the rack.
Suggested answer: C
Explanation:

The first action that the administrator should take before swapping out the GPU card inside a server is to shut down the server. This is to ensure that the server is not running any processes that might be using the GPU card, and to prevent any damage to the hardware or data loss due to sudden power loss. Shutting down the server also reduces the risk of electrostatic discharge (ESD) that might harm the components. Reference: https://pcgearhead.com/installing-a-new-gpu/

asked 02/10/2024
Hayat Hassan
50 questions

Question 100

Report Export Collapse

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

BIA.
BIA.
RTO.
RTO.
MTTR.
MTTR.
SLA.
SLA.
Suggested answer: D
Explanation:

The server administrator needs to adhere to the Service Level Agreement (SLA) when responding to tickets within a certain amount of time. An SLA is a contract between a service provider and a customer that defines the quality, availability, and responsibilities of the service. An SLA may specify the response time for tickets, as well as other metrics such as uptime, performance, security, and backup frequency. Reference: https://www.ibm.com/cloud/learn/service-level-agreements

asked 02/10/2024
Randhir Singh
43 questions
Total 530 questions
Go to page: of 53
Search

Related questions