ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Users at a company work with highly sensitive dat

A.
The security department implemented an administrative and technical control to enforce leastprivilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
A.
The security department implemented an administrative and technical control to enforce leastprivilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?
Answers
B.
Utilize privacy screens.
B.
Utilize privacy screens.
Answers
C.
Implement disk quotas.
C.
Implement disk quotas.
Answers
D.
Install a DLP solution.
D.
Install a DLP solution.
Answers
E.
Enforce the lock-screen feature.
E.
Enforce the lock-screen feature.
Answers
Suggested answer: C

Explanation:

Components of a Data Loss Solution

Reference: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/ The best way to protect the data from leaking is to install a DLP solution. A DLP (Data Loss Prevention) solution is a software that helps businesses prevent confidential data from being leaked or stolen by unauthorized parties. A DLP solution can identify, monitor, and protect data as it moves across networks and devices, such as endpoints, email, web, cloud applications, or removable media. A DLP solution can also enforce security policies based on content and context for data in use, in motion, and at rest. A DLP solution can detect and prevent data breaches by using various techniques, such as content inspection, contextual analysis, encryption, blocking, alerting, warning, quarantining, or other remediation actions.

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.
Create a group that includes all users and assign it to an ACL.
A.
Create a group that includes all users and assign it to an ACL.
Answers
B.
Assign individual permissions on the folder to each user.
B.
Assign individual permissions on the folder to each user.
Answers
C.
Create a group that includes all users and assign the proper permissions.
C.
Create a group that includes all users and assign the proper permissions.
Answers
D.
Assign ownership on the folder for each user.
D.
Assign ownership on the folder for each user.
Answers
Suggested answer: C

Explanation:

The top portion of the dialog box lists the users and/or groups that have access to the file or folder.

Reference: https://www.uwec.edu/kb/article/drives-establishing-windows-file-and-folder-levelpermissions/

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.
Firmware incompatibility
A.
Firmware incompatibility
Answers
B.
CPU overheating
B.
CPU overheating
Answers
C.
LED indicators
C.
LED indicators
Answers
D.
ESD issues
D.
ESD issues
Answers
Suggested answer: B

Explanation:

Unexpected shutdowns. If the system is randomly shutting down or rebooting, the most likely cause is a heat problem.

Reference: https://www.microsoftpressstore.com/articles/article.aspx?p=2224043&seqNum=3

Which of the following would a systems administrator implement to ensure all web traffic is secure?

A.
SSH
A.
SSH
Answers
B.
SSL
B.
SSL
Answers
C.
SMTP
C.
SMTP
Answers
D.
PGP
D.
PGP
Answers
Suggested answer: B

Explanation:

Secure Sockets Layer (SSL): SSL and its successor Transport Layer Security (TLS) enable client and server computers to establish a secure connection session and manage encryption and decryption activities.

Reference: https://paginas.fe.up.pt/~als/mis10e/ch8/chpt8-4bullettext.htm

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

A.
iSCSI
A.
iSCSI
Answers
B.
eSATA
B.
eSATA
Answers
C.
NFS
C.
NFS
Answers
D.
FcoE
D.
FcoE
Answers
Suggested answer: A

Explanation:

Reference: https://docs.oracle.com/cd/E26996_01/E18549/html/BABHBFHA.html

HOTSPOT

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Question 96
Correct answer: Question 96

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

A.
The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.
A.
The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.
Answers
B.
Application data IOPS performance is a must.
B.
Application data IOPS performance is a must.
Answers
C.
Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
C.
Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST options to comply with the user requirements? (Choose three.)
Answers
D.
Install the OS on a RAID 0 array.
D.
Install the OS on a RAID 0 array.
Answers
E.
Install the OS on a RAID 1 array.
E.
Install the OS on a RAID 1 array.
Answers
F.
Configure RAID 1 for the application data.
F.
Configure RAID 1 for the application data.
Answers
G.
Configure RAID 5 for the application data.
G.
Configure RAID 5 for the application data.
Answers
H.
Use SSD hard drives for the data application array.
H.
Use SSD hard drives for the data application array.
Answers
I.
Use SATA hard drives for the data application array.
I.
Use SATA hard drives for the data application array.
Answers
J.
Use a single JBOD for OS and application data.
J.
Use a single JBOD for OS and application data.
Answers
Suggested answer: B, D, E

Explanation:

To comply with the user requirements, the best options are to install the OS on a RAID 1 array, configure RAID 5 for the application data, and use SSD hard drives for the data application array. Here is why:

RAID 1 is a mirroring technique that creates an exact copy of data on two disks. This provides redundancy and fault tolerance in case of hard drive failure. RAID 1 also improves read performance since either disk can be read at the same time. Therefore, installing the OS on a RAID 1 array meets the first requirement of separating the OS from the application data and protecting it from hard drive failure.

RAID 5 is a striping technique with parity that distributes data and parity blocks across three or more disks. This provides improved performance and storage efficiency compared to RAID 1, as well as fault tolerance in case of a single disk failure. Therefore, configuring RAID 5 for the application data meets the second and third requirements of providing high IOPS performance and data availability. SSD hard drives are solid-state drives that use flash memory to store data. They have no moving parts and offer faster read and write speeds, lower latency, and lower power consumption than traditional HDDs. Therefore, using SSD hard drives for the data application array meets the second requirement of providing high IOPS performance.

Reference:

https://phoenixnap.com/kb/raid-levels-and-types

https://en.wikipedia.org/wiki/Standard_RAID_levels

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Which of the following caused the issue?

A.
Duplicate IP address
A.
Duplicate IP address
Answers
B.
Incorrect default gateway
B.
Incorrect default gateway
Answers
C.
DHCP misconfiguration
C.
DHCP misconfiguration
Answers
D.
Incorrect routing table
D.
Incorrect routing table
Answers
Suggested answer: A

Explanation:

The ping command output shows that the NIC has an IP address of 192.168.1.100 and a default gateway of 192.168.1.1. However, when the technician tries to ping the default gateway, the reply comes from another IP address: 192.168.1.101. This means that there is another device on the network that has the same IP address as the default gateway, and it is responding to the ping request instead of the intended destination.

A duplicate IP address can cause network connectivity problems, such as packet loss, routing errors, or unreachable hosts. To resolve this issue, the technician should either change the IP address of the default gateway or the device that is conflicting with it, or use DHCP to assign IP addresses automatically and avoid conflicts.

The other options are not correct because they do not explain the ping output. An incorrect default gateway would cause no reply or a destination unreachable message, not a reply from a different IP address. A DHCP misconfiguration would cause an invalid or no IP address on the NIC, not a duplicate IP address on the network. An incorrect routing table would cause routing errors or unreachable destinations, not a reply from a different IP address.

Reference:

https://askleo.com/what_is_ping_and_what_does_its_output_tell_me/ https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/ping

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

A.
Inspect the GPU that is being installed.
A.
Inspect the GPU that is being installed.
Answers
B.
Ensure the GPU meets HCL guidelines.
B.
Ensure the GPU meets HCL guidelines.
Answers
C.
Shut down the server.
C.
Shut down the server.
Answers
D.
Disconnect the power from the rack.
D.
Disconnect the power from the rack.
Answers
Suggested answer: C

Explanation:

The first action that the administrator should take before swapping out the GPU card inside a server is to shut down the server. This is to ensure that the server is not running any processes that might be using the GPU card, and to prevent any damage to the hardware or data loss due to sudden power loss. Shutting down the server also reduces the risk of electrostatic discharge (ESD) that might harm the components. Reference: https://pcgearhead.com/installing-a-new-gpu/

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.
BIA.
A.
BIA.
Answers
B.
RTO.
B.
RTO.
Answers
C.
MTTR.
C.
MTTR.
Answers
D.
SLA.
D.
SLA.
Answers
Suggested answer: D

Explanation:

The server administrator needs to adhere to the Service Level Agreement (SLA) when responding to tickets within a certain amount of time. An SLA is a contract between a service provider and a customer that defines the quality, availability, and responsibilities of the service. An SLA may specify the response time for tickets, as well as other metrics such as uptime, performance, security, and backup frequency. Reference: https://www.ibm.com/cloud/learn/service-level-agreements

Total 462 questions
Go to page: of 47