ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 20

List of questions

Question 191

Report Export Collapse

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

RAID 0 was configured by mistake.
RAID 0 was configured by mistake.
RAID 5 was configured properly.
RAID 5 was configured properly.
JBOD was configured by mistake.
JBOD was configured by mistake.
RAID 10 was configured by mistake.
RAID 10 was configured by mistake.
Most voted
(1)
Most voted
Suggested answer: B
Explanation:

The output of the configuration shows that RAID 5 was configured properly using four 200GB drives. The approximate volume size of 400GB is correct, since RAID 5 uses one disk for parity and the rest for data. Therefore, the usable storage capacity is three-fourths of the total capacity, which is 600GB out of 800GB. The other RAID levels given would result in different volume sizes: RAID 0 would result in 800GB, RAID 1 would result in 200GB, and JBOD would result in an error since it does not support multiple drives in a single volume. Reference:

https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_5

asked 02/10/2024
Jim Balkwill
50 questions

Question 192

Report Export Collapse

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

RTO
RTO
SLA
SLA
MTBF
MTBF
MTTR
MTTR
Suggested answer: A
Explanation:

RTO stands for Recovery Time Objective and it is a metric that defines the maximum acceptable amount of time that a system or service can be unavailable after a disaster or disruption. RTO is part of the business continuity planning and disaster recovery planning processes. RTO ensures a guarantee of the amount of time it will take to restore a downed service by setting a target or goal for recovery. RTO can vary depending on the criticality and priority of the service. Reference:

https://www.comptia.org/training/resources/exam-objectives/comptia-server-sk0-005-examobjectives (Objective 3.3)

asked 02/10/2024
Matteo Di Pomponio
43 questions

Question 193

Report Export Collapse

A technician is attempting to log in to a Linux server as root but cannot remember the administrator password. Which of the following is the LEAST destructive method of resetting the administrator password?

Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
Boot using a Linux live CD and mount the hard disk to /mnt. Change to the /mnt/etc directory. Edit the passwd file found in that directory.
Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
Reinstall the OS in overlay mode. Reset the root password from the install GUI screen.
Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
Adjust the GRUB boot parameters to boot into single-user mode. Run passwd from the command prompt.
Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.
Boot using a Linux live CD and mount the hard disk to /mnt. SCP the /etc directory from a known accessible server to /mnt/etc.
Suggested answer: C
Explanation:

This is the least destructive method of resetting the administrator password because it does not require modifying any files or reinstalling the OS. It only requires changing the boot parameters temporarily and running a command to change the password. Reference:

https://wiki.archlinux.org/title/Reset_lost_root_password#Using_GRUB

asked 02/10/2024
Arnaud DUTEL
36 questions

Question 194

Report Export Collapse

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

The keyboard is defective and needs to be replaced.
The keyboard is defective and needs to be replaced.
The system failed before the display card initialized.
The system failed before the display card initialized.
The power supply is faulty and is shutting down the system.
The power supply is faulty and is shutting down the system.
The NIC has failed, and the system cannot make a network connection.
The NIC has failed, and the system cannot make a network connection.
Suggested answer: B
Explanation:

This is the most likely cause of the issue because the keyboard LED flash indicates a POST error code. If the display card is not initialized, the system cannot show any error messages on the screen and will stop booting. Reference: https://www.computerhope.com/beep.htm#04

asked 02/10/2024
Kr Sk
36 questions

Question 195

Report Export Collapse

Which of the following BEST describes overprovisioning in a virtual server environment?

Committing more virtual resources to virtual machines than there are physical resources present
Committing more virtual resources to virtual machines than there are physical resources present
Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
Suggested answer: A
Explanation:

This is the best definition of overprovisioning in a virtual server environment because it means allocating more CPU, memory, disk, or network resources to the virtual machines than what is actually available on the physical host. This can lead to performance issues and resource contention.

Reference: https://www.hpe.com/us/en/insights/articles/10-virtualization-mistakes-everyonemakes- 1808.html

asked 02/10/2024
Madhankumar Rathinakumar
41 questions

Question 196

Report Export Collapse

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

The IP address
The IP address
The default gateway
The default gateway
The VLAN
The VLAN
The subnet mask
The subnet mask
Suggested answer: B
Explanation:

This is the most likely misconfigured setting because the default gateway is the router that connects the local network to other networks. If the default gateway is incorrect, the server will not be able to communicate with remote users or devices outside its own subnet. Reference:

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/ipconfig

asked 02/10/2024
Raed Abu-Haija
41 questions

Question 197

Report Export Collapse

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

NAT
NAT
ICMP
ICMP
VLAN
VLAN
NIDS
NIDS
Suggested answer: C
Explanation:

This is the most likely cause of preventing the users from accessing the application server because a VLAN is a logical segmentation of a network that isolates traffic based on certain criteria. If the human resources department and the application server are on different VLANs, they will not be able to communicate with each other unless there is a router or a switch that can route between VLANs.

Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/inter-vlan-routing/41860- howto-L3-intervlanrouting.html

asked 02/10/2024
Dmitry Balikhin
26 questions

Question 198

Report Export Collapse

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

DHCP
DHCP
WINS
WINS
DNS
DNS
TCP
TCP
Suggested answer: C
Explanation:

This is the most likely misconfigured setting because DNS is the service that resolves hostnames to IP addresses and vice versa. If the DNS server is incorrect or unreachable, the administrator will not be able to log on to the server with a domain account because the server will not be able to authenticate with the domain controller. Reference: https://docs.microsoft.com/enus/ troubleshoot/windows-server/networking/dns-troubleshooting

asked 02/10/2024
Casey Donovan
43 questions

Question 199

Report Export Collapse

An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?

Implement data loss prevention.
Implement data loss prevention.
Configure intrusion detection.
Configure intrusion detection.
Turn on User Account Control.
Turn on User Account Control.
Disable anonymous access.
Disable anonymous access.
Suggested answer: D
Explanation:

This is the best solution to prevent unauthorized files from being copied to the server via FTP because anonymous access allows anyone to log in to the FTP server without providing a username or password. Disabling anonymous access will require users to authenticate with valid credentials before accessing the FTP server. Reference: https://docs.microsoft.com/enus/ iis/configuration/system.applicationhost/sites/site/ftpserver/security/authentication/anonymous authentication

asked 02/10/2024
Luis Campoy
43 questions

Question 200

Report Export Collapse

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

Per socket
Per socket
Open-source
Open-source
Per concurrent user
Per concurrent user
Volume
Volume
Suggested answer: D
Explanation:

This is the most likely licensing type that will be used because volume licensing allows a single license key to be used for multiple installations of a software product. Volume licensing is typically used by organizations that need to deploy software to a large number of devices or users. Reference:

https://www.microsoft.com/en-us/licensing/licensing-programs/volume-licensing-programs

asked 02/10/2024
Yung-Shuen Chang
40 questions
Total 499 questions
Go to page: of 50
Search

Related questions