ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

A.
Service-level agreement
A.
Service-level agreement
Answers
B.
Disaster recovery plan
B.
Disaster recovery plan
Answers
C.
Business impact analysis
C.
Business impact analysis
Answers
D.
Business continuity plan
D.
Business continuity plan
Answers
Suggested answer: B

Explanation:

A disaster recovery plan would be useful when trying to restore IT infrastructure operations after a non-planned interruption. A disaster recovery plan is a document that outlines the steps and procedures to recover from a major disruption of IT services caused by natural or man-made disasters, such as fire, flood, earthquake, cyberattack, etc. A disaster recovery plan typically includes:

A list of critical IT assets and resources that need to be protected and restored A list of roles and responsibilities of IT staff and stakeholders involved in the recovery process A list of backup and recovery strategies and tools for data, applications, servers, networks, etc. A list of communication channels and methods for notifying users, customers, vendors, etc. A list of testing and validation methods for ensuring the functionality and integrity of restored systems

A list of metrics and criteria for measuring the effectiveness and efficiency of the recovery process A disaster recovery plan helps IT organizations to minimize downtime, data loss, and financial impact of a disaster, as well as to resume normal operations as quickly as possible.

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.
Port 443 is not open on the firewall
A.
Port 443 is not open on the firewall
Answers
B.
The server is experiencing a downstream failure
B.
The server is experiencing a downstream failure
Answers
C.
The local hosts file is blank
C.
The local hosts file is blank
Answers
D.
The server is not joined to the domain
D.
The server is not joined to the domain
Answers
Suggested answer: D

Explanation:

The server is not joined to the domain is causing the issue. A domain is a logical grouping of computers that share a common directory database and security policy on a network. Active Directory is a Microsoft technology that provides domain services for Windows-based computers. To use Active Directory credentials to log on to a server, the server must be joined to the domain that hosts Active Directory. If the server is not joined to the domain, it will not be able to authenticate with Active Directory and will only accept local accounts for logon. To join a server to a domain, the administrator must have a valid domain account with sufficient privileges and must know the name of the domain controller that hosts Active Directory.

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

A.
Separate circuits
A.
Separate circuits
Answers
B.
An uninterruptible power supply
B.
An uninterruptible power supply
Answers
C.
Increased PDU capacity
C.
Increased PDU capacity
Answers
D.
Redundant power supplies
D.
Redundant power supplies
Answers
Suggested answer: A

Explanation:

The administrator should implement separate circuits first to address the issue of power issues due to the increased load. Separate circuits are electrical wiring systems that provide independent power sources for different devices or groups of devices. By using separate circuits, the administrator can avoid overloading a single circuit with too many servers and reduce the risk of power outages, surges, or fires. Separate circuits also provide redundancy and fault tolerance, as a failure in one circuit will not affect the other circuit.

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

A.
Bollards
A.
Bollards
Answers
B.
Reflective glass
B.
Reflective glass
Answers
C.
Security guards
C.
Security guards
Answers
D.
Security cameras
D.
Security cameras
Answers
Suggested answer: A

Explanation:

Bollards are an example of a method that is used to prevent motor vehicles from getting too close to building entrances and exits. Bollards are short, sturdy posts that are installed on sidewalks, parking lots, or roads to create physical barriers and control traffic flow. Bollards can be used to protect pedestrians, buildings, or other structures from vehicle collisions or attacks. Bollards can be made of various materials, such as metal, concrete, or plastic, and can be fixed, removable, or retractable.

Reference: https://en.wikipedia.org/wiki/Bollard

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

A.
Alternate the direction of the airflow
A.
Alternate the direction of the airflow
Answers
B.
Install the heaviest server at the bottom of the rack
B.
Install the heaviest server at the bottom of the rack
Answers
C.
Place a UPS at the top of the rack
C.
Place a UPS at the top of the rack
Answers
D.
Leave 1U of space between each server
D.
Leave 1U of space between each server
Answers
Suggested answer: B

Explanation:

The technician should install the heaviest server at the bottom of the rack to load the rack properly. Installing the heaviest server at the bottom of the rack helps to balance the weight distribution and prevent the rack from tipping over or collapsing. Installing the heaviest server at the bottom of the rack also makes it easier to access and service the server without lifting or moving it. Installing the heaviest server at any other position in the rack could create instability and safety hazards.

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

A.
21
A.
21
Answers
B.
22
B.
22
Answers
C.
23
C.
23
Answers
D.
443
D.
443
Answers
Suggested answer: B

Explanation:

The technician should use port 22 to configure a server that requires secure remote access. Port 22 is the default port for Secure Shell (SSH), which is a protocol that allows secure remote login and command execution over a network connection using a command-line interface (CLI). SSH encrypts both the authentication and data transmission between the client and the server, preventing eavesdropping, tampering, or spoofing. SSH can be used to perform various tasks on a server remotely, such as configuration, administration, maintenance, troubleshooting, etc.

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

A.
Network connectivity on the server
A.
Network connectivity on the server
Answers
B.
LVM status on the server
B.
LVM status on the server
Answers
C.
Disk space in the /var directory
C.
Disk space in the /var directory
Answers
D.
YUM dependencies
D.
YUM dependencies
Answers
Suggested answer: C

Explanation:

The administrator should check disk space in the /var directory first when using YUM to update applications on a server. YUM stands for Yellowdog Updater Modified, which is a software package manager for Linux systems that use RPM (Red Hat Package Manager) packages. YUM downloads and installs packages from online repositories and resolves dependencies automatically. YUM stores its cache files in the /var/cache/yum directory by default. These cache files include metadata and package data for each repository that YUM uses. If there is not enough disk space in the /var directory, YUM may fail to update applications and generate error messages.

Which of the following is an example of load balancing?

A.
Round robin
A.
Round robin
Answers
B.
Active-active
B.
Active-active
Answers
C.
Active-passive
C.
Active-passive
Answers
D.
Failover
D.
Failover
Answers
Suggested answer: A

Explanation:

Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load balancing improves application availability, scalability, security, and performance by preventing any single resource from being overloaded or unavailable. Round robin is a simple load balancing algorithm that assigns each incoming request to the next available resource in a circular order. For example, if there are three servers (A, B, C) in a load balancer pool, round robin will send the first request to server A, the second request to server B, the third request to server C, the fourth request to server A again, and so on.

Reference: https://simplicable.com/new/load-balancing

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

A.
VBS
A.
VBS
Answers
B.
Shell
B.
Shell
Answers
C.
Java
C.
Java
Answers
D.
PowerShell
D.
PowerShell
Answers
E.
Batch
E.
Batch
Answers
Suggested answer: B

Explanation:

Shell is the most appropriate scripting language to use for a logon script for a Linux box. Shell is a generic term for a command-line interpreter that allows users to interact with the operating system by typing commands and executing scripts. Shell scripts are files that contain a series of commands and instructions that can be executed by a shell. Shell scripts are commonly used for automating tasks, such as logon scripts that run when a user logs on to a system. There are different types of shells available for Linux systems, such as Bash, Ksh, Zsh, etc., but they all share a similar syntax and functionality.

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.
Syslog
A.
Syslog
Answers
B.
DLP
B.
DLP
Answers
C.
SIEM
C.
SIEM
Answers
D.
HIPS
D.
HIPS
Answers
Suggested answer: C

Explanation:

SIEM is the tool that will analyze network logs in real time to report on suspicious log events. SIEM stands for Security Information and Event Management, which is a software solution that collects, analyzes, and correlates log data from various sources, such as servers, firewalls, routers, antivirus software, etc. SIEM can detect anomalies, patterns, trends, and threats in the log data and generate alerts or reports for security monitoring and incident response. SIEM can also provide historical analysis and compliance reporting for audit purposes.

Reference:

https://www.manageengine.com/products/eventlog/syslog-server.html

Total 462 questions
Go to page: of 47