ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

Service-level agreement
Service-level agreement
Disaster recovery plan
Disaster recovery plan
Business impact analysis
Business impact analysis
Business continuity plan
Business continuity plan
Suggested answer: B
Explanation:

A disaster recovery plan would be useful when trying to restore IT infrastructure operations after a non-planned interruption. A disaster recovery plan is a document that outlines the steps and procedures to recover from a major disruption of IT services caused by natural or man-made disasters, such as fire, flood, earthquake, cyberattack, etc. A disaster recovery plan typically includes:

A list of critical IT assets and resources that need to be protected and restored A list of roles and responsibilities of IT staff and stakeholders involved in the recovery process A list of backup and recovery strategies and tools for data, applications, servers, networks, etc. A list of communication channels and methods for notifying users, customers, vendors, etc. A list of testing and validation methods for ensuring the functionality and integrity of restored systems

A list of metrics and criteria for measuring the effectiveness and efficiency of the recovery process A disaster recovery plan helps IT organizations to minimize downtime, data loss, and financial impact of a disaster, as well as to resume normal operations as quickly as possible.

asked 02/10/2024
Michael Crowson
50 questions

Question 12

Report Export Collapse

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

Port 443 is not open on the firewall
Port 443 is not open on the firewall
The server is experiencing a downstream failure
The server is experiencing a downstream failure
The local hosts file is blank
The local hosts file is blank
The server is not joined to the domain
The server is not joined to the domain
Suggested answer: D
Explanation:

The server is not joined to the domain is causing the issue. A domain is a logical grouping of computers that share a common directory database and security policy on a network. Active Directory is a Microsoft technology that provides domain services for Windows-based computers. To use Active Directory credentials to log on to a server, the server must be joined to the domain that hosts Active Directory. If the server is not joined to the domain, it will not be able to authenticate with Active Directory and will only accept local accounts for logon. To join a server to a domain, the administrator must have a valid domain account with sufficient privileges and must know the name of the domain controller that hosts Active Directory.

asked 02/10/2024
Osman Rana
36 questions

Question 13

Report Export Collapse

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Separate circuits
Separate circuits
An uninterruptible power supply
An uninterruptible power supply
Increased PDU capacity
Increased PDU capacity
Redundant power supplies
Redundant power supplies
Suggested answer: A
Explanation:

The administrator should implement separate circuits first to address the issue of power issues due to the increased load. Separate circuits are electrical wiring systems that provide independent power sources for different devices or groups of devices. By using separate circuits, the administrator can avoid overloading a single circuit with too many servers and reduce the risk of power outages, surges, or fires. Separate circuits also provide redundancy and fault tolerance, as a failure in one circuit will not affect the other circuit.

asked 02/10/2024
Michele Lorengo
43 questions

Question 14

Report Export Collapse

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Bollards
Bollards
Reflective glass
Reflective glass
Security guards
Security guards
Security cameras
Security cameras
Suggested answer: A
Explanation:

Bollards are an example of a method that is used to prevent motor vehicles from getting too close to building entrances and exits. Bollards are short, sturdy posts that are installed on sidewalks, parking lots, or roads to create physical barriers and control traffic flow. Bollards can be used to protect pedestrians, buildings, or other structures from vehicle collisions or attacks. Bollards can be made of various materials, such as metal, concrete, or plastic, and can be fixed, removable, or retractable.

Reference: https://en.wikipedia.org/wiki/Bollard

asked 02/10/2024
Francesco Gallo
37 questions

Question 15

Report Export Collapse

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Alternate the direction of the airflow
Alternate the direction of the airflow
Install the heaviest server at the bottom of the rack
Install the heaviest server at the bottom of the rack
Place a UPS at the top of the rack
Place a UPS at the top of the rack
Leave 1U of space between each server
Leave 1U of space between each server
Suggested answer: B
Explanation:

The technician should install the heaviest server at the bottom of the rack to load the rack properly. Installing the heaviest server at the bottom of the rack helps to balance the weight distribution and prevent the rack from tipping over or collapsing. Installing the heaviest server at the bottom of the rack also makes it easier to access and service the server without lifting or moving it. Installing the heaviest server at any other position in the rack could create instability and safety hazards.

asked 02/10/2024
Craig Reid
40 questions

Question 16

Report Export Collapse

A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?

21
21
22
22
23
23
443
443
Suggested answer: B
Explanation:

The technician should use port 22 to configure a server that requires secure remote access. Port 22 is the default port for Secure Shell (SSH), which is a protocol that allows secure remote login and command execution over a network connection using a command-line interface (CLI). SSH encrypts both the authentication and data transmission between the client and the server, preventing eavesdropping, tampering, or spoofing. SSH can be used to perform various tasks on a server remotely, such as configuration, administration, maintenance, troubleshooting, etc.

asked 02/10/2024
Marian Mateev
42 questions

Question 17

Report Export Collapse

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

Network connectivity on the server
Network connectivity on the server
LVM status on the server
LVM status on the server
Disk space in the /var directory
Disk space in the /var directory
YUM dependencies
YUM dependencies
Suggested answer: C
Explanation:

The administrator should check disk space in the /var directory first when using YUM to update applications on a server. YUM stands for Yellowdog Updater Modified, which is a software package manager for Linux systems that use RPM (Red Hat Package Manager) packages. YUM downloads and installs packages from online repositories and resolves dependencies automatically. YUM stores its cache files in the /var/cache/yum directory by default. These cache files include metadata and package data for each repository that YUM uses. If there is not enough disk space in the /var directory, YUM may fail to update applications and generate error messages.

asked 02/10/2024
Andrew Kavanagh
41 questions

Question 18

Report Export Collapse

Which of the following is an example of load balancing?

Round robin
Round robin
Active-active
Active-active
Active-passive
Active-passive
Failover
Failover
Suggested answer: A
Explanation:

Round robin is an example of load balancing. Load balancing is the method of distributing network traffic equally across a pool of resources that support an application. Load balancing improves application availability, scalability, security, and performance by preventing any single resource from being overloaded or unavailable. Round robin is a simple load balancing algorithm that assigns each incoming request to the next available resource in a circular order. For example, if there are three servers (A, B, C) in a load balancer pool, round robin will send the first request to server A, the second request to server B, the third request to server C, the fourth request to server A again, and so on.

Reference: https://simplicable.com/new/load-balancing

asked 02/10/2024
Alonzo M. Carr Sr.
29 questions

Question 19

Report Export Collapse

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

VBS
VBS
Shell
Shell
Java
Java
PowerShell
PowerShell
Batch
Batch
Suggested answer: B
Explanation:

Shell is the most appropriate scripting language to use for a logon script for a Linux box. Shell is a generic term for a command-line interpreter that allows users to interact with the operating system by typing commands and executing scripts. Shell scripts are files that contain a series of commands and instructions that can be executed by a shell. Shell scripts are commonly used for automating tasks, such as logon scripts that run when a user logs on to a system. There are different types of shells available for Linux systems, such as Bash, Ksh, Zsh, etc., but they all share a similar syntax and functionality.

asked 02/10/2024
Nghia To Duc
58 questions

Question 20

Report Export Collapse

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Syslog
Syslog
DLP
DLP
SIEM
SIEM
HIPS
HIPS
Suggested answer: C
Explanation:

SIEM is the tool that will analyze network logs in real time to report on suspicious log events. SIEM stands for Security Information and Event Management, which is a software solution that collects, analyzes, and correlates log data from various sources, such as servers, firewalls, routers, antivirus software, etc. SIEM can detect anomalies, patterns, trends, and threats in the log data and generate alerts or reports for security monitoring and incident response. SIEM can also provide historical analysis and compliance reporting for audit purposes.

Reference:

https://www.manageengine.com/products/eventlog/syslog-server.html

asked 02/10/2024
LEONARDO CESAR MARQUES
51 questions
Total 530 questions
Go to page: of 53
Search

Related questions