ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional. Which of the following is MOST likely causing the issue?

A.
The kernel is corrupt.
A.
The kernel is corrupt.
Answers
B.
Resources are misallocated.
B.
Resources are misallocated.
Answers
C.
The backplane has failed.
C.
The backplane has failed.
Answers
D.
The drives need to be reseated.
D.
The drives need to be reseated.
Answers
Suggested answer: C

Explanation:

The backplane is a circuit board that connects multiple hard drives to a RAID controller and provides power and data transfer between them. If the backplane has failed, it may cause all the hard drives to be offline and prevent the server from booting into the OS. The fact that replacing one of the drives with a known-good drive did not work, and that taking a drive out of the server and placing it in a spare server made it functional, suggests that the problem is not with the drives themselves but with the backplane. A corrupt kernel (A) would not affect the status of the hard drives, as it is a software component of the OS. Resource misallocation (B) would not cause all the hard drives to be offline, as it is a configuration issue that affects how resources are assigned to processes or applications. Reseating the drives (D) would not help, as it would not fix a faulty backplane.

Reference: https://www.dell.com/support/kbdoc/en-us/000130114/how-to-troubleshoot-a-faultybackplane

Which of the following can be used to map a network drive to a user profile?

A.
System service
A.
System service
Answers
B.
Network service
B.
Network service
Answers
C.
Login script
C.
Login script
Answers
D.
Kickstart script
D.
Kickstart script
Answers
Suggested answer: C

Explanation:

A login script is a file that contains commands or instructions that are executed when a user logs into a system or network. A login script can be used to map a network drive to a user profile, which means that the user will have access to a shared folder or resource on another computer or server. A login script can be written in various languages, such as batch, PowerShell, or VBScript, and can be assigned to a user or a group using tools such as Group Policy or Active Directory . A system service (A) is a program that runs in the background and performs tasks that are essential for the operation of the system, such as security, networking, or hardware management. A system service does not map a network drive to a user profile. A network service (B) is a program that provides functionality or resources to other programs or devices over a network, such as file sharing, printing, or web hosting. A network service does not map a network drive to a user profile. A kickstart script (D) is a file that contains configuration settings and commands for automated installation of Linux operating systems. A kickstart script does not map a network drive to a user profile. Reference:

https://www.howtogeek.com/118452/how-to-map-network-drives-from-the-command-prompt-inwindows/ https://docs.microsoft.com/en-us/windows-server/administration/windowscommands/ logon

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

A.
Restore the data from backup.
A.
Restore the data from backup.
Answers
B.
Disclose the incident.
B.
Disclose the incident.
Answers
C.
Disable unnecessary ports.
C.
Disable unnecessary ports.
Answers
D.
Run an antivirus scan.
D.
Run an antivirus scan.
Answers
E.
Identify the exploited vulnerability.
E.
Identify the exploited vulnerability.
Answers
F.
Move the data to a different location.
F.
Move the data to a different location.
Answers
Suggested answer: B, E

Explanation:

These are two measures that should be taken when a data breach occurs. A data breach is an unauthorized or illegal access to confidential or sensitive data by an internal or external actor. A data breach can result in financial losses, reputational damage, legal liabilities, and regulatory penalties for the affected organization. Disclosing the incident is a measure that involves informing the relevant stakeholders, such as customers, employees, partners, regulators, and law enforcement, about the nature, scope, and impact of the data breach. Disclosing the incident can help to mitigate the negative consequences of the data breach, comply with legal obligations, and restore trust and confidence. Identifying the exploited vulnerability is a measure that involves investigating and analyzing the root cause and source of the data breach. Identifying the exploited vulnerability can help to prevent further data loss, remediate the security gaps, and improve the security posture of the organization. Restoring the data from backup is a measure that involves recovering the lost or corrupted data from a secondary storage device or location. However, this does not address the underlying issue of how the data breach occurred or prevent future breaches. Disabling unnecessary ports is a measure that involves closing or blocking network communication endpoints that are not required for legitimate purposes. However, this does not address how the data breach occurred or what vulnerability was exploited. Running an antivirus scan is a measure that involves detecting and removing malicious software from a system or network. However, this does not address how the data breach occurred or what vulnerability was exploited. Moving the data to a different location is a measure that involves transferring the data to another storage device or location that may be more secure or less accessible. However, this does not address how the data breach occurred or what vulnerability was exploited. Reference: https://www.howtogeek.com/428483/what-is-end-to-endencryption- and-why-does-it-matter/ https://www.howtogeek.com/202794/what-is-the-differencebetween- 127.0.0.1-and-0.0.0.0/ https://www.howtogeek.com/443611/how-to-encrypt-your-macssystem- drive-removable-devices-and-individual-files/

DRAG DROP

A recent power Outage caused email services to go down. A sever administrator also received alerts from the datacenter’s UPS.

After some investigation, the server administrator learned that each POU was rated at a maximum Of 12A.

INSTRUCTIONS

Ensure power redundancy is implemented throughout each rack and UPS alarms are resolved. Ensure the maximum potential PDU consumption does not exceed 80% or 9.6A).

a. PDU selections must be changed using the pencil icon.

b. VM Hosts 1 and 2 and Mail Relay can be moved between racks.

c. Certain devices contain additional details


Question 154
Correct answer: Question 154

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?

A.
Hardware failure
A.
Hardware failure
Answers
B.
Marware
B.
Marware
Answers
C.
Data corruption
C.
Data corruption
Answers
D.
Insider threat
D.
Insider threat
Answers
Suggested answer: D

Explanation:

An insider threat is a type of risk that can be mitigated by implementing split encryption keys for sensitive files. An insider threat is a malicious actor who has authorized access to an organization’s system or data and uses it for unauthorized or harmful purposes. An insider threat can cause data breaches, sabotage, fraud, theft, espionage, or other damages to the organization. Split encryption keys are a method of encrypting data using multiple keys that are stored separately and require collaboration to decrypt. Split encryption keys can prevent an insider threat from accessing or compromising sensitive data without being detected by another authorized party who holds another key. Hardware failure is a type of risk that involves physical damage or malfunction of hardware components such as hard drives, memory modules, power supplies, or fans. Hardware failure can cause data loss, system downtime, performance issues, or other problems for the organization. Hardware failure cannot be mitigated by split encryption keys, but by backup, redundancy, monitoring, and maintenance measures.

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

A.
mantrap.
A.
mantrap.
Answers
B.
a bollard
B.
a bollard
Answers
C.
geofencing
C.
geofencing
Answers
D.
RFID.
D.
RFID.
Answers
Suggested answer: A

Explanation:

A mantrap is a security device that consists of a small space with two sets of interlocking doors, such that the first set of doors must close before the second one opens. A mantrap can be used to control access to a data center by verifying the identity and weight of the person entering. A bollard is a sturdy post that prevents vehicles from entering a restricted area. Geofencing is a technology that uses GPS or RFID to create a virtual boundary around a location and trigger an action when a device crosses it. RFID is a technology that uses radio waves to identify and track objects or people.

Reference:

https://www.techopedia.com/definition/16293/mantrap

https://www.techopedia.com/definition/1437/bollard

https://www.techopedia.com/definition/23961/geofencing

https://www.techopedia.com/definition/506/radio-frequency-identification-rfid

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

A.
A local firewall is blocking authentication requests.
A.
A local firewall is blocking authentication requests.
Answers
B.
The users have expired passwords
B.
The users have expired passwords
Answers
C.
The system clock is off by more than five minutes
C.
The system clock is off by more than five minutes
Answers
D.
The server has no access to the LDAP host
D.
The server has no access to the LDAP host
Answers
Suggested answer: C

Explanation:

Kerberos is a network authentication protocol that uses tickets to allow clients and servers to prove their identity to each other. Kerberos relies on accurate time synchronization between the parties involved, as the tickets have expiration dates and timestamps. If the system clock of a Linux server is off by more than five minutes from the LDAP server or the domain controller, the Kerberos authentication will fail and generate errors. A local firewall is unlikely to block authentication requests if the server can communicate over the network and is configured correctly. The users’ passwords are not relevant if they are known-working LDAP credentials. The server has access to the LDAP host if it can communicate over the network and is configured correctly. Reference:

https://access.redhat.com/documentation/enus/red_hat_enterprise_linux/6/html/identity_management_guide/kerberos_errors https://www.ibm.com/docs/en/aix/7.2?topic=authentication-kerberos-time-synchronization

Which of the following BEST describes a warm site?

The site has all infrastructure and live data.

A.
The site has all infrastructure and some data
A.
The site has all infrastructure and some data
Answers
B.
The site has partially redundant infrastructure and no network connectivity
B.
The site has partially redundant infrastructure and no network connectivity
Answers
C.
The site has partial infrastructure and some data.
C.
The site has partial infrastructure and some data.
Answers
Suggested answer:

Explanation:

A warm site is a type of disaster recovery site that has some pre-installed hardware, software, and network connections, but not as much as a hot site. A warm site also has some backup data, but not as current as a hot site. A warm site requires some time and effort to become fully operational in the event of a disaster. A hot site is a disaster recovery site that has all infrastructure and live data, and can take over the primary site’s operations immediately. A cold site is a disaster recovery site that has no infrastructure or data, and requires significant time and resources to set up. Reference:

https://www.enterprisestorageforum.com/management/disaster-recovery-site/ https://www.techopedia.com/definition/3780/warm-site

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

A.
RAID
A.
RAID
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAIDS
C.
RAIDS
Answers
D.
RAID 10
D.
RAID 10
Answers
Suggested answer: D

Explanation:

RAID 10 is the RAID level that will yield the best combination of available space and redundancy when configuring a new server for use as a database server with two mirrored drives for the operating system and three drive bays remaining for storage. RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data. It requires a minimum of four disks and stripes data across mirrored pairs. As long as one disk in each mirrored pair is functional, data can be retrieved. RAID 10 provides high performance, fault tolerance, and fast recovery, but it reduces storage capacity by half. RAID 0 is a RAID configuration that splits data across two or more drives without parity or redundancy. It improves performance but offers no fault tolerance. If one drive fails in RAID 0, all data is lost and the system cannot boot. RAID 1 is a RAID configuration that duplicates data across two or more drives. It provides fault tolerance and improves read performance, but reduces storage capacity by half. If one drive fails in RAID 1, the other drive can continue to operate without data loss or system downtime. RAID 5 is a RAID configuration that stripes data across three or more drives with parity information. It provides fault tolerance and improves performance, but reduces storage capacity by one drive’s worth of space. RAID 5 can tolerate one drive failure without data loss, but not two or more. Reference:

https://www.howtogeek.com/199068/how-to-upgrade-your-existing-hard-drive-in-under-an-hour/ https://www.howtogeek.com/202794/what-is-the-difference-between-127.0.0.1-and-0.0.0.0/

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

A.
Tape
A.
Tape
Answers
B.
Cloud
B.
Cloud
Answers
C.
Disk
C.
Disk
Answers
D.
Print
D.
Print
Answers
Suggested answer: D

Explanation:

A print backup is a type of backup that can be used to mitigate the risk of being unable to access the daily vital records if there is an IT disaster that causes both servers and the network to be offline. A print backup is a backup that involves printing out the data on paper and storing it in a secure location. A print backup can provide offline access to the data without relying on any hardware or software components that may be affected by the disaster. However, a print backup has some drawbacks such as high cost, low efficiency, low security, and environmental impact. A tape backup is a type of backup that involves storing the data on magnetic tape cartridges that can be accessed using a tape drive or a tape library. A tape backup can provide offline access to the data with high capacity, low cost, and long durability, but it requires special equipment and software that may not be available during a disaster. A cloud backup is a type of backup that involves storing the data on remote servers or platforms that can be accessed over the internet using a web browser or an application. A cloud backup can provide online access to the data with high scalability, flexibility, and security, but it requires network connectivity and bandwidth that may not be available during a disaster. A disk backup is a type of backup that involves storing the data on hard disk drives or solid state drives that can be accessed using a computer or a device. A disk backup can provide online or offline access to the data with high performance, reliability, and portability, but it requires compatible hardware and software that may not be available during a disaster. Reference:

https://www.howtogeek.com/428483/what-is-end-to-end-encryption-and-why-does-it-matter/ https://www.howtogeek.com/443611/how-to-encrypt-your-macs-system-drive-removable-devicesand- individual-files/ https://www.howtogeek.com/199068/how-to-upgrade-your-existing-harddrive- in-under-an-hour/ https://www.howtogeek.com/202794/what-is-the-difference-between-127

Total 462 questions
Go to page: of 47