ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











An administrator is configuring a host-based firewall tor a server. The server needs to allow SSH, FTP, and LDAP traffic. Which of the following ports must be configured so this traffic will be allowed? (Select THREE).

A.
21
A.
21
Answers
B.
22
B.
22
Answers
C.
53
C.
53
Answers
D.
67
D.
67
Answers
E.
69
E.
69
Answers
F.
110
F.
110
Answers
G.
123
G.
123
Answers
H.
389
H.
389
Answers
Suggested answer: A, B, H

Explanation:

These are the port numbers that must be configured on a host-based firewall for a server that needs to allow SSH, FTP, and LDAP traffic. A port number is a numerical identifier that specifies a communication endpoint for a network protocol or an application. A host-based firewall is a software tool that monitors and controls incoming and outgoing network traffic on a single host based on predefined rules. SSH (Secure Shell) is a protocol that allows secure remote access and file transfer over an encrypted connection. The default port number for SSH is 22. FTP (File Transfer Protocol) is a protocol that allows transferring files between hosts over a network connection. The default port number for FTP is 21. LDAP (Lightweight Directory Access Protocol) is a protocol that allows accessing and managing directory services over a network connection. The default port number for LDAP is 389. Reference: https://www.howtogeek.com/190014/virtualization-basics-understandingtechniques- and-fundamentals/ https://www.howtogeek.com/220152/what-is-the-differencebetween- 127.0.0.1-and-0.0.0.0/ https://www.howtogeek.com/428483/what-is-end-to-endencryption- and-why-does-it-matter/

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

A.
Administrator password
A.
Administrator password
Answers
B.
Group Policy Object
B.
Group Policy Object
Answers
C.
Root password
C.
Root password
Answers
D.
SELInux
D.
SELInux
Answers
E.
Bootloader password
E.
Bootloader password
Answers
F.
BIOS/UEFI password
F.
BIOS/UEFI password
Answers
Suggested answer: E, F

Explanation:

These are two methods that can prevent a user from installing an OS on a server if properly configured. A bootloader password is a password that protects the bootloader from unauthorized access or modification. The bootloader is a program that loads the operating system into memory when the system boots up. If a user does not know the bootloader password, they cannot change the boot order or boot from another device such as a CD-ROM or USB drive that contains an OS installation media. A BIOS/UEFI password is a password that protects the BIOS (Basic Input Output System) or UEFI (Unified Extensible Firmware Interface) from unauthorized access or modification. The BIOS or UEFI is a firmware that initializes and configures the hardware components of the system before loading

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

A.
Consult the HCL to ensure everything is supported.
A.
Consult the HCL to ensure everything is supported.
Answers
B.
Migrate the physical server to a virtual server.
B.
Migrate the physical server to a virtual server.
Answers
C.
Low-level format the hard drives to ensure there is no old data remaining.
C.
Low-level format the hard drives to ensure there is no old data remaining.
Answers
D.
Make sure the case and the fans are free from dust to ensure proper cooling.
D.
Make sure the case and the fans are free from dust to ensure proper cooling.
Answers
Suggested answer: A

Explanation:

The first thing that the technician should do before installing a new server OS on legacy server hardware is to consult the HCL (Hardware Compatibility List) to ensure everything is supported. The HCL is a list of hardware devices and components that are tested and certified to work with a specific OS or software product. The HCL helps to avoid compatibility issues and performance problems that may arise from using unsupported or incompatible hardware. Migrating the physical server to a virtual server may be a good option to improve scalability and flexibility, but it requires additional hardware and software resources and may not be feasible for legacy server hardware. Low-level formatting the hard drives may be a good practice to erase any old data and prepare the drives for a new OS installation, but it does not guarantee that the hardware will work with the new OS. Making sure the case and the fans are free from dust may be a good practice to ensure proper cooling and prevent overheating, but it does not guarantee that the hardware will work with the new OS.

Reference: https://www.howtogeek.com/190014/virtualization-basics-understanding-techniquesand- fundamentals/ https://www.howtogeek.com/173353/how-to-low-level-format-or-write-zerosto- a-hard-drive/ https://www.howtogeek.com/303282/how-to-manage-your-pcs-fans-for-optimalairflow- and-cooling/

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

A.
Cloud
A.
Cloud
Answers
B.
Cold
B.
Cold
Answers
C.
Hot
C.
Hot
Answers
D.
Warm
D.
Warm
Answers
Suggested answer: D

Explanation:

A warm site is a type of disaster recovery site that has a target storage array that receives replication traffic and servers that are only powered on in the event of a disaster. A warm site is a compromise between a hot site and a cold site. A warm site has some equipment and data ready, but requires some configuration and restoration before resuming operations. A warm site is usually located in a different geographic area than the primary site and has redundant power, cooling, network, and security systems. A warm site is suitable for organizations that can tolerate some downtime and data loss in case of a disaster. A cloud site is a type of disaster recovery site that uses cloud-based resources and platforms to store backups and restore data and applications after a disaster. A cold site is a type of disaster recovery site that has only basic infrastructure and space available, but requires significant setup and installation before resuming operations. A hot site is a type of disaster recovery site that has all the equipment and data ready to resume operations as soon as possible after a disaster. Reference: https://www.techopedia.com/definition/11172/hot-site https://www.techopedia.com/definition/11173/warm-site

https://www.techopedia.com/definition/11174/cold-site

https://www.techopedia.com/definition/29836/cloud-recovery

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

A.
RAID 0
A.
RAID 0
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAID 5
C.
RAID 5
Answers
D.
RAID 6
D.
RAID 6
Answers
Suggested answer: B

Explanation:

RAID 1 (mirroring) is a RAID configuration that should be used to provide redundancy for the OS on a server that has two hard drives on which to install the OS. RAID 1 (mirroring) is a configuration that duplicates data across two or more drives. It provides fault tolerance and improves read performance, but reduces storage capacity by half. If one drive fails in RAID 1, the other drive can continue to operate without data loss or system downtime. RAID 0 (striping) is a configuration that splits data across two or more drives without parity or redundancy. It improves performance but offers no fault tolerance. If one drive fails in RAID 0, all data is lost and the system cannot boot. RAID 5 (striping with parity) is a configuration that stripes data across three or more drives with parity information. It provides fault tolerance and improves performance, but reduces storage capacity by one drive’s worth of space. RAID 5 can tolerate one drive failure without data loss, but not two or more. RAID 6 (striping with double parity) is a configuration that stripes data across four or more drives with double parity information. It provides fault tolerance and improves performance, but reduces storage capacity by two drives’ worth of space. RAID 6 can tolerate two drive failures without data loss, but not three or more. Reference: https://www.howtogeek.com/199068/how-toupgrade- your-existing-hard-drive-in-under-an-hour/

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

A.
bash
A.
bash
Answers
B.
!execute
B.
!execute
Answers
C.
#!
C.
#!
Answers
D.
@eacho off
D.
@eacho off
Answers
Suggested answer: C

Explanation:

#! is the symbol that should be placed at the top of a Bash script to ensure it can be executed. #! is also known as shebang or hashbang. It is a special notation that tells the operating system which interpreter to use to run the script. The shebang is followed by the path to the interpreter, such as /bin/bash for Bash, /bin/python for Python, or /bin/perl for Perl. For example, a Bash script that prints “Hello World” would start with:

#!/bin/bash echo “Hello World”

The shebang must be the first line of the script and must not have any spaces between the # and ! symbols. bash is not a valid shebang by itself, as it does not specify the path to the interpreter. !execute is not a valid shebang at all, as it does not start with #. @echo off is a command that disables the echoing of commands in a batch file on Windows, but it has nothing to do with Bash scripts on Linux. Reference: https://www.howtogeek.com/67469/the-beginners-guide-to-shellscripting- the-basics/ https://www.howtogeek.com/435903/what-is-a-shebang-line/

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

A.
Two-person Integrity
A.
Two-person Integrity
Answers
B.
SSO
B.
SSO
Answers
C.
SIEM
C.
SIEM
Answers
D.
Faraday cage
D.
Faraday cage
Answers
E.
MFA
E.
MFA
Answers
Suggested answer: A

Explanation:

Two-person integrity is a security measure that can be implemented to increase security against a potential insider threat on an air-gapped system. An air-gapped system is a system that is isolated from any network connection and can only be accessed physically. An insider threat is a malicious actor who has authorized access to an organization’s system or data and uses it for unauthorized or harmful purposes. Two-person integrity is a system of storage and handling that requires the presence of at least two authorized persons, each capable of detecting incorrect or unauthorized security procedures, for accessing certain sensitive data or material. This way, no single person can compromise the security or integrity of the data or material without being noticed by another person. SSO (Single Sign-On) is a feature that allows users to access multiple applications or systems with one set of credentials, but it does not prevent insider threats. SIEM (Security Information and Event Management) is a tool that collects and analyzes log data from various sources to detect and respond to security incidents, but it does not work on air-gapped systems. A Faraday cage is a structure that blocks electromagnetic signals from entering or leaving, but it does not prevent physical access or insider threats. MFA (Multi-Factor Authentication) is a method that requires users to provide two or more pieces of evidence to verify their identity, such as something they know, something they have, or something they are, but it does not prevent insider threats. Reference:

https://www.howtogeek.com/169080/air-gap-how-to-isolate-a-computer-to-protect-it-fromhackers/ https://www.howtogeek.com/428483/what-is-end-to-end-encryption-and-why-does-itmatter/ https://www.howtogeek.com/202794/what-is-the-difference-between-127.0.0.1-and- 0.0.0.0/ https://www.howtogeek.com/443611/how-to-encrypt-your-macs-system-drive-removabledevices- and-individual-files/

A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:

Bash ./startup,sh:Permission denied

Which of the following commands would BEST resolve the error message?

A.
Chmod +w startup.sh
A.
Chmod +w startup.sh
Answers
B.
Chmod 444 startup.sh
B.
Chmod 444 startup.sh
Answers
C.
Chmod+x startup.sh
C.
Chmod+x startup.sh
Answers
D.
Chmod 466 startUp,sh
D.
Chmod 466 startUp,sh
Answers
Suggested answer: C

Explanation:

This is the command that would best resolve the error message “Bash ./startup.sh: Permission denied” when trying to execute a script on Linux. Chmod is a command that changes the permissions of files or directories on Linux. +x is an option that adds the execute permission to the file or directory for the owner, group, and others. startup.sh is the name of the script file that needs to be executed. By running chmod +x startup.sh, the technician grants execute permission to the script file and allows it to be run by any user. Chmod +w startup.sh would add write permission to the file, but not execute permission. Chmod 444 startup.sh would set read-only permission for all users, but not execute permission. Chmod 466 startup.sh would set read and write permission for the owner and write-only permission for group and others, but not execute permission. Reference:

https://www.howtogeek.com/437958/how-to-use-the-chmod-command-on-linux

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

A.
The server is In the process of shutting down, so fan speed operations have been defaulted to high.
A.
The server is In the process of shutting down, so fan speed operations have been defaulted to high.
Answers
B.
An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.
B.
An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.
Answers
C.
A fan failure has occurred, and the other fans have increased speed to compensate.
C.
A fan failure has occurred, and the other fans have increased speed to compensate.
Answers
D.
The server is utilizing more memory than the other servers, so it has increased the fans to compensate.
D.
The server is utilizing more memory than the other servers, so it has increased the fans to compensate.
Answers
Suggested answer: C

Explanation:

This is the most likely reason why the fans in that server are operating at full speed while the ambient temperature in the room is normal and the other servers in the rack are not experiencing this behavior. A fan failure is a situation where one or more fans in a server stop working or malfunction due to wear and tear, dust, or other factors. This can cause overheating and performance issues on the server. To prevent this, most servers have a fan redundancy feature that allows the other fans to increase their speed and airflow to compensate for the failed fan and maintain a safe temperature level. The server is not likely to be in the process of shutting down, as this would not cause the fans to run at high speeds. An incorrect fan size is not likely to be inserted into the server, as most fans are standardized and compatible with the server chassis and motherboard. The server is not likely to be utilizing more memory than the other servers, as this would not cause a significant increase in temperature or fan speed. Reference:

https://www.howtogeek.com/303282/how-to-manage-your-pcs-fans-for-optimal-airflow-andcooling/ https://www.howtogeek.com/174288/how-to-tell-if-your-computer-is-overheating-andwhat- to-do-about-it/

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

A.
Disable the heartbeat network.
A.
Disable the heartbeat network.
Answers
B.
Fallback cluster services.
B.
Fallback cluster services.
Answers
C.
Set the cluster to active-active.
C.
Set the cluster to active-active.
Answers
D.
Failover all VMs.
D.
Failover all VMs.
Answers
Suggested answer: D

Explanation:

This is the best action to perform before applying patches to one of the hosts in a high availability cluster. A high availability cluster is a group of hosts that act like a single system and provide continuous uptime. A high availability cluster is often used for load balancing, backup, and failover purposes. Failover is a process of transferring workloads from one host to another in case of a failure or maintenance. By failing over all VMs (Virtual Machines) from the host that needs to be patched to another host in the cluster, the technician can ensure that there is no downtime or data loss during the patching process. Disabling the heartbeat network is not a good action to perform, as this would disrupt the communication and synchronization between the hosts in the cluster. Fallback cluster services is not a valid term, but it may refer to restoring cluster services after a failover, which is not relevant before applying patches. Setting the cluster to active-active is not a good action to perform, as this would increase the load on both hosts and reduce redundancy. Reference:

https://www.howtogeek.com/190014/virtualization-basics-understanding-techniques-andfundamentals/ https://www.howtogeek.com/428483/what-is-end-to-end-encryption-and-why-doesit- matter/

Total 462 questions
Go to page: of 47