ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.
Perform scheduled chkdsk tests.
A.
Perform scheduled chkdsk tests.
Answers
B.
Purchase matching hardware and clone the disk.
B.
Purchase matching hardware and clone the disk.
Answers
C.
Upgrade the hard disk to SSD.
C.
Upgrade the hard disk to SSD.
Answers
D.
Perform quarterly backups.
D.
Perform quarterly backups.
Answers
Suggested answer: B

Explanation:

The best course of action to preserve business continuity for a very old PC that is running a critical, proprietary application in MS-DOS is to purchase matching hardware and clone the disk. This way, the technician can create an exact copy of the PC’s configuration and data on another PC that has the same specifications and compatibility. This will ensure that the application can run smoothly on the new PC without any installation or configuration issues. Performing scheduled chkdsk tests would not help, as chkdsk is a tool that checks and repairs disk errors, but does not prevent hardware failures or software compatibility issues. Upgrading the hard disk to SSD would not help either, as SSDs may not be compatible with the old PC or the MS-DOS operating system. Performing quarterly backups would help with data protection, but not with hardware availability or software compatibility. Reference: https://www.howtogeek.com/199068/how-to-upgrade-your-existing-harddrive- in-under-an-hour/ https://www.howtogeek.com/66776/how-to-repair-disk-errors-in-windows- 7/

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown? A virtual serial console

A.
A KVM
A.
A KVM
Answers
B.
An IDRAC
B.
An IDRAC
Answers
C.
A crash cart
C.
A crash cart
Answers
Suggested answer: C

Explanation:

An IDRAC (Integrated Dell Remote Access Controller) is a tool that can be used to command a remote shutdown of a physical Linux server. An IDRAC is a hardware device that provides out-of-band management for Dell servers. It allows the technician to access the server’s console, power cycle, reboot, or shut down the server remotely using a web interface or a command-line interface. An IDRAC does not depend on the operating system or network connectivity of the server. A virtual serial console is a tool that can be used to access a remote virtual machine’s console using a serial port connection. A KVM (Keyboard, Video, Mouse) switch is a device that allows the technician to switch between different computer sources using the same keyboard, monitor, and mouse. A crash cart is a mobile unit that contains a keyboard, monitor, mouse, and other tools that can be connected to a physical server for troubleshooting purposes. Reference:

https://www.dell.com/support/kbdoc/en-us/000131486/understanding-the-idrac https://www.howtogeek.com/799968/what-is-a-kvm-switch/

https://www.techopedia.com/definition/1032/business-impact-analysis-bia

An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for dat a. Which of the following failure scenarios MOST likely occurred?

A.
A drive failed in the OS array.
A.
A drive failed in the OS array.
Answers
B.
A drive failed and then recovered in the data array.
B.
A drive failed and then recovered in the data array.
Answers
C.
A drive failed in both of the arrays.
C.
A drive failed in both of the arrays.
Answers
D.
A drive failed in the data array.
D.
A drive failed in the data array.
Answers
Suggested answer: A

Explanation:

If a server has two arrays on the failed server: a two-drive RAID 0 set for the OS, and an eight-drive RAID 10 set for data, then the most likely failure scenario that caused the server to crash and not boot is that a drive failed in the OS array. RAID 0 is a RAID configuration that stripes data across two or more drives without parity or redundancy. RAID 0 offers high performance but no fault tolerance. If one drive fails in RAID 0, all data is lost and the system cannot boot. RAID 10 is a RAID configuration that combines disk mirroring and disk striping with parity. RAID 10 offers high performance and fault tolerance. RAID 10 can tolerate up to one drive failure per mirrored pair without losing data or functionality. Reference: https://www.technewstoday.com/what-is-a-raid-0/ https://www.technewstoday.com/what-is-a-raid-10/

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.
Logical volume management
A.
Logical volume management
Answers
B.
Dynamic disk
B.
Dynamic disk
Answers
C.
GPT
C.
GPT
Answers
D.
UEFI
D.
UEFI
Answers
Suggested answer: B

Explanation:

Dynamic disk is a technology that allows an administrator to build a software RAID on a Windows server. Dynamic disk is a type of disk management that supports creating volumes that span multiple disks, stripe data across disks, mirror data between disks, or use parity for fault tolerance. Dynamic disk can be used to create RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity), or spanned volumes on Windows servers. Logical volume management is a technology that allows creating and resizing logical volumes on Linux servers. GPT (GUID Partition Table) is a standard for defining the partition structure on a disk. UEFI (Unified Extensible Firmware Interface) is a specification for the interface between the operating system and the firmware. Reference:

https://www.howtogeek.com/school/using-windows-admin-tools-like-a-pro/lesson2/ https://www.howtogeek.com/howto/40702/how-to-manage-and-use-lvm-logical-volumemanagement- in-ubuntu/ https://www.howtogeek.com/193669/whats-the-difference-between-gptand- mbr-when-partitioning-a-drive/ https://www.howtogeek.com/56958/htg-explains-how-uefiwill- replace-the-bios/

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

A.
The VLAN Is improperly configured.
A.
The VLAN Is improperly configured.
Answers
B.
The DNS configuration Is invalid.
B.
The DNS configuration Is invalid.
Answers
C.
The OS version is not compatible with the network switch vendor.
C.
The OS version is not compatible with the network switch vendor.
Answers
D.
The HIDS is preventing the connection.
D.
The HIDS is preventing the connection.
Answers
Suggested answer: A

Explanation:

If the server administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity, then the most likely reason for the lack of connectivity is that the VLAN is improperly configured. A VLAN (Virtual Local Area Network) is a logical grouping of network devices that share the same broadcast domain and can communicate with each other without routing. If the server is assigned to a different VLAN than the DHCP server or the default gateway, it will not be able to obtain an IP address or reach other network devices. The DNS configuration is not relevant for network connectivity, as DNS only resolves names to IP addresses. The OS version is not likely to be incompatible with the network switch vendor, as most network switches use standard protocols and interfaces. The HIDS (Host-based Intrusion Detection System) is not likely to prevent the connection, as HIDS only monitors and alerts on suspicious activities on the host. Reference:

https://www.howtogeek.com/190014/virtualization-basics-understanding-techniques-andfundamentals/ https://www.howtogeek.com/164981/how-to-use-nslookup-to-check-domain-nameinformation- in-microsoft-windows/ https://www.howtogeek.com/202794/what-is-an-intrusiondetection- system-ids-and-how-does-it-work/

A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?

A.
Crash cart
A.
Crash cart
Answers
B.
Out-of-band console
B.
Out-of-band console
Answers
C.
IP KVM
C.
IP KVM
Answers
D.
RDP
D.
RDP
Answers
Suggested answer: B

Explanation:

Out-of-band console is a tool that can be used to command a remote shutdown of a physical Linux server. Out-of-band console is a method of accessing a server’s console through a dedicated management port or device that does not rely on the server’s operating system or network connection. Out-of-band console can be used to power cycle, reboot, update firmware, monitor performance, and perform other tasks remotely even if the server is unresponsive or offline. Crash cart is a mobile unit that contains a keyboard, monitor, mouse, and other tools that can be used to troubleshoot a server on-site, but it requires physical access to the server. IP KVM (Internet Protocol Keyboard Video Mouse) switch is a hardware device that allows remote access to multiple servers using a web browser or a client software, but it requires network connectivity and may not work if the SSH connection is lost. RDP (Remote Desktop Protocol) is a protocol that allows remote access to a Windows server’s graphical user interface, but it does not work on Linux servers and requires network connectivity. Reference: https://www.techopedia.com/definition/13623/crash-cart https://www.techopedia.com/definition/13624/kvm-switch

https://www.techopedia.com/definition/3422/remote-desktop-protocol-rdp

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

A.
End-to-end encryption
A.
End-to-end encryption
Answers
B.
Encryption in transit
B.
Encryption in transit
Answers
C.
Encryption at rest
C.
Encryption at rest
Answers
D.
Public key encryption
D.
Public key encryption
Answers
Suggested answer: C

Explanation:

Encryption at rest is a type of encryption methodology that would most likely be used to ensure encrypted data cannot be retrieved if a device is stolen. Encryption at rest is a process of encrypting stored data on a device such as a hard drive, SSD, USB flash drive, or mobile device. This way, if the device is lost or stolen, the data cannot be accessed without the encryption key or password. Encryption at rest can be implemented using software tools such as BitLocker on Windows or FileVault on Mac OS, or hardware features such as self-encrypting drives or Trusted Platform Module chips. End-to-end encryption is a type of encryption methodology that ensures encrypted data cannot be intercepted or modified by third parties during transmission over a network. Encryption in transit is a type of encryption methodology that protects encrypted data while it is moving from one location to another over a network. Public key encryption is a type of encryption algorithm that uses a pair of keys: a public key that can be shared with anyone and a private key that is kept secret by the owner. Reference: https://www.howtogeek.com/196541/bitlocker-101-what-it-is-how-it-works-andhow- to-use-it/ https://www.howtogeek.com/443611/how-to-encrypt-your-macs-system-driveremovable- devices-and-individual-files/ https://www.howtogeek.com/428483/what-is-end-to-endencryption- and-why-does-it-matter/ https://www.howtogeek.com/195877/what-is-encryption-andhow- does-it-work/

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.
Open file
A.
Open file
Answers
B.
Synthetic full
B.
Synthetic full
Answers
C.
Full Incremental
C.
Full Incremental
Answers
D.
Full differential
D.
Full differential
Answers
Suggested answer: B

Explanation:

A synthetic full backup is a backup method that describes copying only changed files each time it runs and using only a single file during a restore. A synthetic full backup is a backup approach that involves creating a new full backup by using the previous full backup and related incremental backups. This means that a backup solution does not have to transfer the full amount of data from the source machine and can synthetize the latest incremental backups with the last full backup to create a new full backup. This reduces the backup window and network bandwidth consumption. During a restore, only the latest synthetic full backup file is needed to recover the data. Open file backup is a backup method that allows backing up files that are in use or locked by applications. Full incremental backup is a backup method that involves performing a full backup first and then backing up only the changed files since the last backup. Full differential backup is a backup method that involves performing a full backup first and then backing up only the changed files since the last full backup. Reference: https://www.nakivo.com/blog/what-is-synthetic-backup/ https://www.howtogeek.com/192115/what-you-need-to-know-about-creating-system-imagebackups/

Which of the following licenses would MOST likely include vendor assistance?

A.
Open-source
A.
Open-source
Answers
B.
Version compatibility
B.
Version compatibility
Answers
C.
Subscription
C.
Subscription
Answers
D.
Maintenance and support
D.
Maintenance and support
Answers
Suggested answer: D

Explanation:

Maintenance and support is a type of license that would most likely include vendor assistance. Maintenance and support is a contract that defines the level and scope of service and assistance that a vendor provides to a customer for using their software product. Maintenance and support may include technical support, bug fixes, patches, updates, upgrades, documentation, training, and other benefits. Maintenance and support licenses usually have an annual fee based on the number of users or devices covered by the contract. Open-source is a type of license that allows free access to the source code and modification and distribution of the software product, but does not guarantee vendor assistance. Version compatibility is not a type of license, but a feature that ensures software products can work with different versions of operating systems or other software products. Subscription is a type of license that allows access to software products for a limited period of time based on recurring payments, but does not necessarily include vendor assistance. Reference:

https://www.techopedia.com/definition/1440/software-licensing https://www.techopedia.com/definition/1032/business-impact-analysis-bia

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

A.
Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.
A.
Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.
Answers
B.
Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.
B.
Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.
Answers
C.
Use the longest cables possible to allow for adjustment of the server rail within the rack.
C.
Use the longest cables possible to allow for adjustment of the server rail within the rack.
Answers
D.
Install an Ethernet patch panel and a PDU to accommodate the network and power cables.
D.
Install an Ethernet patch panel and a PDU to accommodate the network and power cables.
Answers
Suggested answer: B

Explanation:

This is the most appropriate way to complete the task because it follows the best practices of cable management. Cable management is a process of organizing and securing cables in a rack or a server room to improve airflow, accessibility, safety, and aesthetics. Running the network cables up the left side and the power cables down the right side of the rack helps to avoid cable clutter, interference, and confusion. It also makes it easier to trace and troubleshoot cables if needed. Using appropriatelength cables also helps to reduce cable slack and excess. Wiring the cables through the cable management arm may cause stress and damage to the cables when moving the server in or out of the rack. Using the longest cables possible may create cable loops and tangles that can block airflow and increase fire hazards. Installing an Ethernet patch panel and a PDU (Power Distribution Unit) may be useful for accommodating more network and power cables, but not necessary for a single server.

Reference: https://www.howtogeek.com/303282/how-to-manage-your-pcs-fans-for-optimal-airflowand- cooling/ https://www.howtogeek.com/303290/how-to-properly-manage-your-cables/

Total 462 questions
Go to page: of 47