ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

A.
RAID 0 was configured by mistake.
A.
RAID 0 was configured by mistake.
Answers
B.
RAID 5 was configured properly.
B.
RAID 5 was configured properly.
Answers
C.
JBOD was configured by mistake.
C.
JBOD was configured by mistake.
Answers
D.
RAID 10 was configured by mistake.
D.
RAID 10 was configured by mistake.
Answers
Suggested answer: B

Explanation:

The output of the configuration shows that RAID 5 was configured properly using four 200GB drives. The approximate volume size of 400GB is correct, since RAID 5 uses one disk for parity and the rest for data. Therefore, the usable storage capacity is three-fourths of the total capacity, which is 600GB out of 800GB. The other RAID levels given would result in different volume sizes: RAID 0 would result in 800GB, RAID 1 would result in 200GB, and JBOD would result in an error since it does not support multiple drives in a single volume. Reference:

https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_5

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

A.
RTO
A.
RTO
Answers
B.
SLA
B.
SLA
Answers
C.
MTBF
C.
MTBF
Answers
D.
MTTR
D.
MTTR
Answers
Suggested answer: A

Explanation:

RTO stands for Recovery Time Objective and it is a metric that defines the maximum acceptable amount of time that a system or service can be unavailable after a disaster or disruption. RTO is part of the business continuity planning and disaster recovery planning processes. RTO ensures a guarantee of the amount of time it will take to restore a downed service by setting a target or goal for recovery. RTO can vary depending on the criticality and priority of the service. Reference:

https://www.comptia.org/training/resources/exam-objectives/comptia-server-sk0-005-examobjectives (Objective 3.3)

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

A.
Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
A.
Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
Answers
B.
Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
B.
Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
Answers
C.
Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
C.
Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
Answers
D.
Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.
D.
Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.
Answers
Suggested answer: C

Explanation:

This is the least destructive method of resetting the administrator password because it does not require modifying any files or reinstalling the OS. It only requires changing the boot parameters temporarily and running a command to change the password. Reference:

https://wiki.archlinux.org/title/Reset_lost_root_password#Using_GRUB

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

A.
The keyboard is defective and needs to be replaced.
A.
The keyboard is defective and needs to be replaced.
Answers
B.
The system failed before the display card initialized.
B.
The system failed before the display card initialized.
Answers
C.
The power supply is faulty and is shutting down the system.
C.
The power supply is faulty and is shutting down the system.
Answers
D.
The NIC has failed, and the system cannot make a network connection.
D.
The NIC has failed, and the system cannot make a network connection.
Answers
Suggested answer: B

Explanation:

This is the most likely cause of the issue because the keyboard LED flash indicates a POST error code. If the display card is not initialized, the system cannot show any error messages on the screen and will stop booting. Reference: https://www.computerhope.com/beep.htm#04

Which of the following BEST describes overprovisioning in a virtual server environment?

A.
Committing more virtual resources to virtual machines than there are physical resources present
A.
Committing more virtual resources to virtual machines than there are physical resources present
Answers
B.
Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
B.
Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
Answers
C.
Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
C.
Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
Answers
D.
Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
D.
Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
Answers
Suggested answer: A

Explanation:

This is the best definition of overprovisioning in a virtual server environment because it means allocating more CPU, memory, disk, or network resources to the virtual machines than what is actually available on the physical host. This can lead to performance issues and resource contention.

Reference: https://www.hpe.com/us/en/insights/articles/10-virtualization-mistakes-everyonemakes- 1808.html

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

A.
The IP address
A.
The IP address
Answers
B.
The default gateway
B.
The default gateway
Answers
C.
The VLAN
C.
The VLAN
Answers
D.
The subnet mask
D.
The subnet mask
Answers
Suggested answer: B

Explanation:

This is the most likely misconfigured setting because the default gateway is the router that connects the local network to other networks. If the default gateway is incorrect, the server will not be able to communicate with remote users or devices outside its own subnet. Reference:

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/ipconfig

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

A.
NAT
A.
NAT
Answers
B.
ICMP
B.
ICMP
Answers
C.
VLAN
C.
VLAN
Answers
D.
NIDS
D.
NIDS
Answers
Suggested answer: C

Explanation:

This is the most likely cause of preventing the users from accessing the application server because a VLAN is a logical segmentation of a network that isolates traffic based on certain criteria. If the human resources department and the application server are on different VLANs, they will not be able to communicate with each other unless there is a router or a switch that can route between VLANs.

Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/inter-vlan-routing/41860- howto-L3-intervlanrouting.html

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

A.
DHCP
A.
DHCP
Answers
B.
WINS
B.
WINS
Answers
C.
DNS
C.
DNS
Answers
D.
TCP
D.
TCP
Answers
Suggested answer: C

Explanation:

This is the most likely misconfigured setting because DNS is the service that resolves hostnames to IP addresses and vice versa. If the DNS server is incorrect or unreachable, the administrator will not be able to log on to the server with a domain account because the server will not be able to authenticate with the domain controller. Reference: https://docs.microsoft.com/enus/ troubleshoot/windows-server/networking/dns-troubleshooting

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

A.
Implement data loss prevention.
A.
Implement data loss prevention.
Answers
B.
Configure intrusion detection.
B.
Configure intrusion detection.
Answers
C.
Turn on User Account Control.
C.
Turn on User Account Control.
Answers
D.
Disable anonymous access.
D.
Disable anonymous access.
Answers
Suggested answer: D

Explanation:

This is the best solution to prevent unauthorized files from being copied to the server via FTP because anonymous access allows anyone to log in to the FTP server without providing a username or password. Disabling anonymous access will require users to authenticate with valid credentials before accessing the FTP server. Reference: https://docs.microsoft.com/enus/ iis/configuration/system.applicationhost/sites/site/ftpserver/security/authentication/anonymous authentication

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

A.
Per socket
A.
Per socket
Answers
B.
Open-source
B.
Open-source
Answers
C.
Per concurrent user
C.
Per concurrent user
Answers
D.
Volume
D.
Volume
Answers
Suggested answer: D

Explanation:

This is the most likely licensing type that will be used because volume licensing allows a single license key to be used for multiple installations of a software product. Volume licensing is typically used by organizations that need to deploy software to a large number of devices or users. Reference:

https://www.microsoft.com/en-us/licensing/licensing-programs/volume-licensing-programs

Total 462 questions
Go to page: of 47