ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.
Tabletcp
A.
Tabletcp
Answers
B.
Backup recovery test
B.
Backup recovery test
Answers
C.
Lrverail over
C.
Lrverail over
Answers
D.
Hot-site visit audit
D.
Hot-site visit audit
Answers
Suggested answer: A

Explanation:

A tabletop exercise is a type of disaster recovery testing exercise that is primarily used to discuss incident response strategies for critical systems without affecting production data. A tabletop exercise is a discussion-based session where team members meet in an informal, classroom setting to review their roles and responsibilities during an emergency and their responses to a hypothetical scenario. A facilitator guides the participants through the discussion and evaluates the strengths and weaknesses of the preparedness program. A tabletop exercise does not involve any actual deployment of resources or activation of systems12. A backup recovery test (B) is a type of disaster recovery testing exercise that involves restoring data from backup media to verify its integrity and availability. A backup recovery test may affect production data if it is not performed on a separate environment. A live failover © is a type of disaster recovery testing exercise that involves switching operations from a primary site to a secondary site in case of a failure or disruption. A live failover may affect production data if it is not performed on a simulated environment. A hot-site visit audit (D) is a type of disaster recovery testing exercise that involves inspecting and evaluating a hot site, which is a backup location that has fully operational equipment and resources to resume business operations in case of a disaster. A hot-site visit audit does not involve any discussion of incident response strategies or simulation of scenarios. Reference: 1 https://www.ready.gov/testingexercises 2 https://www.ready.gov/exercises

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

A.
DLF configuration
A.
DLF configuration
Answers
B.
MBR failure
B.
MBR failure
Answers
C.
ECC support
C.
ECC support
Answers
D.
MD5 checksum
D.
MD5 checksum
Answers
Suggested answer: D

Explanation:

A MD5 checksum is a value that is calculated from a file using a cryptographic hash function. A MD5 checksum is used to verify the integrity of a file by comparing it with the original value provided by the manufacturer or the source. If the MD5 checksums match, it means that the file is authentic and has not been corrupted or tampered with. If the MD5 checksums do not match, it means that the file is potentially corrupt or malicious and should not be installed12. A DLF configuration (A) is a setting that determines how a dynamic link library (DLL) is loaded into memory and executed by an application. A DLF configuration does not check the integrity of a file. A MBR failure (B) is a problem that occurs when the master boot record (MBR) of a disk is damaged or corrupted, preventing the system from booting. A MBR failure does not check the integrity of a file. ECC support © is a feature that enables error-correcting code (ECC) memory to detect and correct data errors in RAM. ECC support does not check the integrity of a file. Reference: 1 https://www.comparitech.com/netadmin/ file-integrity-monitoring-tools/ 2 https://csrc.nist.gov/CSRC/media/Presentations/Firmware- Integrity-Verification-Monitoring-and-Re/images-media/day2_demonstration_330-420.pdf

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.
SD card
A.
SD card
Answers
B.
NAS drive
B.
NAS drive
Answers
C.
SATA drive
C.
SATA drive
Answers
D.
SAS drive
D.
SAS drive
Answers
Suggested answer: A

Explanation:

A SD card is a type of flash memory card that can be used to store data and run applications. A SD card can be used to install a Type 1 hypervisor on a server, as it provides fast boot time, low power consumption, and high reliability. A Type 1 hypervisor runs directly on the underlying computer’s physical hardware, interacting directly with its CPU, memory, and physical storage. For this reason, Type 1 hypervisors are also referred to as bare-metal hypervisors. A Type 1 hypervisor takes the place of a host operating system and VM resources are scheduled directly to the hardware by the hypervisor123. A NAS drive (B) is a type of network-attached storage (NAS) device that provides shared access to files and data over a network. A NAS drive cannot be used to install a Type 1 hypervisor on a server, as it requires a network connection and a host operating system to function. A SATA drive © is a type of hard disk drive (HDD) or solid state drive (SSD) that uses the Serial ATA (SATA) interface to connect to a computer. A SATA drive can be used to install a Type 1 hypervisor on a server, but it may have some disadvantages compared to a SD card, such as slower boot time, higher power consumption, and lower reliability. A SAS drive (D) is a type of hard disk drive (HDD) or solid state drive (SSD) that uses the Serial Attached SCSI (SAS) interface to connect to a computer. A SAS drive can also be used to install a Type 1 hypervisor on a server, but it may have similar disadvantages as a SATA drive, and it may also be more expensive and less compatible than a SD card. Reference: 1 https://phoenixnap.com/kb/what-is-hypervisor-type-1- 2 2 https://www.ibm.com/topics/hypervisors 3 https://www.redhat.com/en/topics/virtualization/w hat-is-a-hypervisor

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

A.
nbtstat
A.
nbtstat
Answers
B.
netuse
B.
netuse
Answers
C.
tracert
C.
tracert
Answers
D.
netstst
D.
netstst
Answers
Suggested answer: B

Explanation:

The net use command is a Windows command that can be used to create a batch script to map multiple shares. The net use command can connect or disconnect a computer from a shared resource, such as a network drive or a printer, or display information about computer connections. The syntax of the net use command is:

net use [devicename | *] [\\computername\sharename[\u0003volume] [password | *]] [/user:[domainname\]username] [/user:[dotted domain name\]username] [/user:[[username@dotted domain name] [/savecred] [/smartcard] [{/delete | /persistent:{yes | no}}]

where:

devicename = the drive letter or printer port to assign to the shared resource computername = the name of the computer that provides access to the shared resource sharename = the name of the shared resource password = the password needed to access the shared resource /user = specifies a different username to make the connection /savecred = stores the provided credentials for future use /smartcard = uses a smart card for authentication /delete = cancels a network connection and removes the connection from the list of persistent connections /persistent = controls whether the connection is restored at logon

To create a batch script to map multiple shares, you can use the net use command with different drive letters and share names, for example:

net use W: \\computer1\share1 net use X: \\computer2\share2 net use Y: \\computer3\share3 You can also add other options, such as passwords, usernames, or persistence, as needed. To save the batch script, you can use Notepad or any text editor and save the file with a .bat extension12.

Reference: 1 https://docs.microsoft.com/en-us/windows-server/administration/windowscommands/ net-use 2 https://www.watchingthenet.com/create-a-batch-file-to-map-drivesfolders. html

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

A.
Waterfall
A.
Waterfall
Answers
B.
Synthetic full
B.
Synthetic full
Answers
C.
Tower of Hanoi
C.
Tower of Hanoi
Answers
D.
Grandfather-father-son
D.
Grandfather-father-son
Answers
Suggested answer: D

Explanation:

Grandfather-father-son (GFS) is a common backup rotation scheme that uses daily, weekly, and monthly backup media in a first-in, first-out (FIFO) method. The daily backups are rotated on a 3- months basis using a FIFO system as above. The weekly backups are similarly rotated on a bi-yearly basis, and the monthly backups are rotated on an annual basis. The oldest backup media in each cycle are overwritten by the newest ones. This scheme provides multiple versions of backup data at different intervals, allowing for flexible restoration options. Waterfall is another name for GFS. Synthetic full is a backup method that combines an initial full backup with subsequent incremental backups to create a new full backup without transferring all data again. Tower of Hanoi is another backup rotation scheme that uses an algorithm based on moving disks between three pegs.

Reference:

https://en.wikipedia.org/wiki/Backup_rotation_scheme

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

A.
Set a BIOS/UEFI password on the server.
A.
Set a BIOS/UEFI password on the server.
Answers
B.
Change the boot order on the server and restrict console access. C Configure the host OS to deny login attempts via USB.
B.
Change the boot order on the server and restrict console access. C Configure the host OS to deny login attempts via USB.
Answers
C.
Disable all the USB ports on the server.
C.
Disable all the USB ports on the server.
Answers
Suggested answer: B

Explanation:

Changing the boot order on the server and restricting console access would prevent unauthorized access attempts via USB devices at startup, as the server would not boot from any external media and only authorized users could access the console. Setting a BIOS/UEFI password on the server would also help, but it could be bypassed by resetting the CMOS battery or using a backdoor password. Configuring the host OS to deny login attempts via USB would not prevent booting from a malicious USB device that could compromise the system before the OS loads. Disabling all the USB ports on the server would limit functionality, as some peripherals or devices may need to use them.

Reference:

https://www.pcmag.com/how-to/dont-plug-it-in-how-to-prevent-a-usb-attack https://www.techopedia.com/definition/10362/boot-order

https://www.techopedia.com/definition/10361/console-access

https://www.techopedia.com/definition/102/bios-password

https://www.techopedia.com/definition/10363/cmos-battery

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of dat

A.
Which of the following RAID levels should the administrator choose?
A.
Which of the following RAID levels should the administrator choose?
Answers
B.
0
B.
0
Answers
C.
1
C.
1
Answers
D.
5
D.
5
Answers
E.
6
E.
6
Answers
Suggested answer: D

Explanation:

RAID 6 is a level of RAID that can survive the failure of two drives without the loss of data. RAID 6 uses block-level striping with two parity blocks distributed across all member disks. RAID 6 can tolerate two simultaneous drive failures and still provide data access and redundancy. RAID 0 is a level of RAID that uses striping without parity or mirroring, and offers no fault tolerance. RAID 0 cannot survive any drive failure without data loss. RAID 1 is a level of RAID that uses mirroring without parity or striping, and offers fault tolerance by duplicating data on two or more disks. RAID 1 can survive one drive failure without data loss, but not two. RAID 5 is a level of RAID that uses blocklevel striping with one parity block distributed across all member disks. RAID 5 can tolerate one drive failure without data loss, but not two. Reference:

https://en.wikipedia.org/wiki/Standard_RAID_levels

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

A.
Look for an unauthorized HTTP service on this server
A.
Look for an unauthorized HTTP service on this server
Answers
B.
Look for a virus infection on this server
B.
Look for a virus infection on this server
Answers
C.
Look for an unauthorized Telnet service on this server
C.
Look for an unauthorized Telnet service on this server
Answers
D.
Look for an unauthorized port scanning service on this server.
D.
Look for an unauthorized port scanning service on this server.
Answers
Suggested answer: A

Explanation:

The script that the technician is running is trying to connect to every port on the localhost (the same machine) using telnet, a network protocol that allows remote access to a command-line interface. The script mostly fails because most ports are closed or not listening for connections. However, the script succeeds on ports 80 and 443, which are the default ports for HTTP and HTTPS protocols, respectively. These protocols are used for web services and web browsers. Therefore, the technician should look for an unauthorized HTTP service on this server, as it may indicate a security breach or a misconfiguration. Looking for a virus infection on this server is also possible, but not the most likely source of the issue. Looking for an unauthorized Telnet service on this server is not relevant, as the script is using telnet as a client, not a server. Looking for an unauthorized port scanning service on this server is not relevant, as the script is scanning ports on the localhost, not on other machines.

Reference:

https://phoenixnap.com/kb/telnet-windows

https://www.techopedia.com/definition/23337/http-port-80

https://www.techopedia.com/definition/23336/https-port-443

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

A.
Fibre Channel
A.
Fibre Channel
Answers
B.
FCoE
B.
FCoE
Answers
C.
iSCSI
C.
iSCSI
Answers
D.
eSATA
D.
eSATA
Answers
Suggested answer: A

Explanation:

Fibre Channel is a connectivity option that can transmit at 16Gb over an optical connection for SANbased shared storage. Fibre Channel is a high-speed network technology that provides reliable and secure data transfer between servers and storage devices. Fibre Channel uses optical fiber cables to connect devices and supports various topologies and protocols. FCoE is another connectivity option that uses Fibre Channel over Ethernet, which encapsulates Fibre Channel frames into Ethernet packets. FCoE can also transmit at 16Gb over an optical connection, but it requires a converged network adapter (CNA) and a lossless Ethernet network. iSCSI is another connectivity option that uses SCSI commands over IP networks, which can use either copper or optical cables. iSCSI can transmit at 10Gb or 40Gb over an optical connection, but it has higher latency and lower performance than Fibre Channel. eSATA is another connectivity option that uses SATA commands over external cables, which are usually copper. eSATA can transmit at 6Gb over a copper connection, but it has limited cable length and device support compared to Fibre Channel. Reference:

https://www.ibm.com/topics/storage-area-network

https://www.techopedia.com/definition/1369/fibre-channel-fc https://www.techopedia.com/definition/1368/fibre-channel-over-ethernet-fcoe https://www.techopedia.com/definition/1367/internet-small-computer-system-interface-iscsi https://www.techopedia.com/definition/1366/external-serial-advanced-technology-attachmentesata

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

A.
set-service
A.
set-service
Answers
B.
net
B.
net
Answers
C.
sc
C.
sc
Answers
D.
services.msc
D.
services.msc
Answers
Suggested answer: C

Explanation:

The sc command is used to create, delete, start, stop, pause, or query services on a Windows OS. It can also be used to register a new service by using the create option. Reference:

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/sc-create

Total 462 questions
Go to page: of 47