ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

A.
RTO
A.
RTO
Answers
B.
MTBF
B.
MTBF
Answers
C.
PRO
C.
PRO
Answers
D.
MTTR
D.
MTTR
Answers
Suggested answer: A

Explanation:

Reference: https://www.druva.com/blog/understanding-rpo-and-rto/ The Recovery Time Objective (RTO) is the maximum amount of time that a company agrees to tolerate in the event of a disaster before restoring its normal operations. The RTO is based on the business impact analysis (BIA) and the criticality of the processes and data involved. The RTO helps determine the backup and recovery strategies and resources needed to minimize downtime and data loss. Reference: https://www.ibm.com/cloud/learn/recovery-time-objective

A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps. Which of the following testing methods is the administrator MOST likely performing?

A.
Backup recovery
A.
Backup recovery
Answers
B.
Simulated
B.
Simulated
Answers
C.
Tabletop
C.
Tabletop
Answers
D.
Live failover
D.
Live failover
Answers
Suggested answer: D

Explanation:

The live failover testing method is the most likely one that the server administrator is performing when creating a downtime scenario and taking the necessary steps. A live failover test involves switching from the primary system to the secondary system (or backup site) in a real environment, without any simulation or preparation. A live failover test can evaluate the effectiveness and readiness of the disaster recovery plan, but it also carries a high risk of data loss, corruption, or disruption. Reference: https://www.ibm.com/cloud/learn/disaster-recovery-testing

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

A.
Formatting
A.
Formatting
Answers
B.
Compression
B.
Compression
Answers
C.
Disk quotas
C.
Disk quotas
Answers
D.
Partitioning
D.
Partitioning
Answers
Suggested answer: C

Explanation:

Reference: https://www.digitalcitizen.life/simple-questions-what-are-disk-quotas-how-set-themwindows/ Disk quotas are a way to limit disk usage on a server by setting a maximum amount of space that each user or group can use. Disk quotas can help manage disk space allocation, prevent disk space exhaustion, and enforce fair usage policies. Disk quotas can be set at the volume level or at the folder level, depending on the file system and operating system used. Reference:

https://docs.microsoft.com/en-us/windows-server/storage/ntfs/ntfs-disk-quotas-overview

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished?

A.
Restore the server from a snapshot.
A.
Restore the server from a snapshot.
Answers
B.
Restore the server from backup.
B.
Restore the server from backup.
Answers
C.
Swap the drive and initialize the disk.
C.
Swap the drive and initialize the disk.
Answers
D.
Swap the drive and initialize the array.
D.
Swap the drive and initialize the array.
Answers
Suggested answer: C

Explanation:

The next action that the administrator should take once the rebuild is finished is to swap the drive and initialize the disk. This is to replace the faulty disk that has a solid amber light, which indicates a predictive failure or a SMART error. Initializing the disk will prepare it for use by the RAID controller and add it to the array. The administrator should also monitor the array status and performance after swapping the drive. Reference: https://www.salvagedata.com/how-to-rebuild-a-failed-raid/

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

A.
255.255.255.0
A.
255.255.255.0
Answers
B.
255.255.255.128
B.
255.255.255.128
Answers
C.
255.255.255.224
C.
255.255.255.224
Answers
D.
255.255.255.252
D.
255.255.255.252
Answers
Suggested answer: C

Explanation:

The most efficient subnet address for a network that will have no more than 30 available IP addresses is 255.255.255.224. This subnet mask corresponds to a /27 prefix length, which means that 27 bits are used for the network portion and 5 bits are used for the host portion of an IP address. With 5 bits for hosts, there are 2^5 - 2 = 30 possible host addresses per subnet, which meets the requirement. The other options are either too large or too small for the network size. Reference:

https://www.ibm.com/cloud/learn/subnet-mask

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

A.
Out-of-band management
A.
Out-of-band management
Answers
B.
Crash cart access
B.
Crash cart access
Answers
C.
Virtual administrator console
C.
Virtual administrator console
Answers
D.
Local KVM setup
D.
Local KVM setup
Answers
E.
RDP connection
E.
RDP connection
Answers
Suggested answer: A

Explanation:

The connection type that the server administrator is using to access the server remotely is out-ofband management. Out-of-band management is a method of accessing and controlling a server through a dedicated network interface or port that is separate from the regular data network. Outof- band management allows administrators to perform tasks such as rebooting, configuring, troubleshooting, or updating a server even if the server is offline or unresponsive through the regular network. Out-of-band management can use protocols such as IPMI, iLO, DRAC, or BMC.

Reference: https://www.ibm.com/cloud/learn/out-of-band-management

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

A.
Installing the latest patches
A.
Installing the latest patches
Answers
B.
Closing open ports
B.
Closing open ports
Answers
C.
Enabling antivirus protection
C.
Enabling antivirus protection
Answers
D.
Enabling a NIDS
D.
Enabling a NIDS
Answers
Suggested answer: A

Explanation:

The best way to limit an attacker from exploiting a zero-day vulnerability that is impacting a service enabled on a server OS is to install the latest patches. Patches are updates that fix bugs, improve security, or add features to software. Installing patches can help prevent attackers from exploiting known vulnerabilities that have been fixed by the software vendor. A zero-day vulnerability is a vulnerability that is unknown to the vendor or the public until it is exploited by an attacker. Therefore, installing patches as soon as they are available can reduce the window of opportunity for attackers to exploit zero-day vulnerabilities. Reference: https://www.ibm.com/cloud/learn/patchmanagement

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

A.
Check the default gateway.
A.
Check the default gateway.
Answers
B.
Check the route tables.
B.
Check the route tables.
Answers
C.
Check the hosts file.
C.
Check the hosts file.
Answers
D.
Check the DNS server.
D.
Check the DNS server.
Answers
E.
Run the ping command.
E.
Run the ping command.
Answers
F.
Run the tracert command
F.
Run the tracert command
Answers
Suggested answer: C, D

Explanation:

If the server is not reachable by name but can be accessed by IP address, it means that there is a problem with name resolution. The hosts file and the DNS server are both responsible for mapping hostnames to IP addresses. Therefore, the server administrator should check these two files for any errors or inconsistencies that might prevent the server from being resolved by name. Reference:

https://www.howtogeek.com/662249/how-to-edit-the-hosts-file-on-linux/ https://www.howtogeek.com/164981/how-to-use-nslookup-to-check-domain-name-information-inmicrosoft- windows/

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

A.
/root.ssh/sshd/config
A.
/root.ssh/sshd/config
Answers
B.
/etc.ssh/sshd_config
B.
/etc.ssh/sshd_config
Answers
C.
/root/.ssh/ssh_config
C.
/root/.ssh/ssh_config
Answers
D.
/etc.sshs_shd_config
D.
/etc.sshs_shd_config
Answers
Suggested answer: B

Explanation:

To disable root login over SSH, the server administrator needs to edit the SSH configuration file located at /etc/ssh/sshd_config. This file contains various settings for the SSH daemon that runs on the server and accepts incoming SSH connections. The administrator needs to find the line that says PermitRootLogin and change it to no or comment it out with a # symbol. Then, the administrator needs to restart the SSH service for the changes to take effect. Reference:

https://www.howtogeek.com/828538/how-and-why-to-disable-root-login-over-ssh-on-linux/

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

A.
The controller has disabled the write cache.
A.
The controller has disabled the write cache.
Answers
B.
The controller cannot use all the available channels.
B.
The controller cannot use all the available channels.
Answers
C.
The drive array is corrupt.
C.
The drive array is corrupt.
Answers
D.
The controller has lost its configuration.
D.
The controller has lost its configuration.
Answers
Suggested answer: A

Explanation:

The write cache is a feature of some RAID controllers that allows them to temporarily store data in a fast memory buffer before writing it to the disk drives. This improves the performance and efficiency of write operations, especially for random and small writes. However, if the battery on the controller goes bad, the controller may disable the write cache to prevent data loss in case of a power failure. This can degrade the disk drive performance significantly, as every write operation will have to wait for the disk drives to complete. Reference: https://www.dell.com/support/kbdoc/enus/ 000131486/understanding-raid-controller-battery-learn-cycle

https://www.techrepublic.com/article/understanding-raid-controller-write-cache/

Total 462 questions
Go to page: of 47