ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 21

List of questions

Question 201

Report Export Collapse

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

Private
Private
Hybrid
Hybrid
Community
Community
Public
Public
Suggested answer: B
Explanation:

This is the best description of a hybrid cloud model because it combines both private and public cloud resources. A private cloud is a cloud environment that is owned and operated by a single organization and hosted in its own data center. A public cloud is a cloud environment that is owned and operated by a third-party provider and hosted in its data center. A hybrid cloud allows an organization to leverage both types of cloud resources depending on its needs and preferences.

Reference: https://azure.microsoft.com/en-us/overview/what-is-hybrid-cloud-computing/

asked 02/10/2024
Mustafa Hussien
48 questions

Question 202

Report Export Collapse

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Open file
Open file
Synthetic full
Synthetic full
Full incremental
Full incremental
Full differential
Full differential
Suggested answer: B
Explanation:

This is the best description of a synthetic full backup method because it creates a full backup by combining previous incremental backups with the latest backup. An incremental backup copies only the files that have changed since the last backup, while a full backup copies all the files. A synthetic full backup reduces the storage space and network bandwidth required for backups, while also simplifying the restore process by using a single file. Reference:

https://www.veritas.com/support/en_US/doc/129705091-129705095-0/br731_wxrttot_ v131910378-129705095

asked 02/10/2024
Raymond Chan
36 questions

Question 203

Report Export Collapse

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

Unplug the power cables from the redundant power supplies, leaving just the minimum required.
Unplug the power cables from the redundant power supplies, leaving just the minimum required.
Convert the physical servers to the hypervisors and retire the ten servers.
Convert the physical servers to the hypervisors and retire the ten servers.
Reimage the physical servers and retire all ten servers after the migration is complete.
Reimage the physical servers and retire all ten servers after the migration is complete.
Convert the ten servers to power-efficient core editions.
Convert the ten servers to power-efficient core editions.
Suggested answer: B
Explanation:

This option would reduce power consumption and maintenance costs by consolidating the physical servers into virtual machines on the hypervisors. This would also free up space and resources in the data center. The other options would either not address the request, increase power consumption, or require more maintenance.

asked 02/10/2024
Arvin Lee
43 questions

Question 204

Report Export Collapse

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

Implement rollback procedures.
Implement rollback procedures.
Upgrade the drivers.
Upgrade the drivers.
Reinstall the OS.
Reinstall the OS.
Reboot the server.
Reboot the server.
Suggested answer: A
Explanation:

This option would restore the server OS to a previous state before applying the monthly patches. This would help troubleshoot the issues caused by the patches and determine if they are compatible with the server OS. The other options would either not address the issues, cause data loss, or require more time and resources

asked 02/10/2024
Nicoleta Moglan
40 questions

Question 205

Report Export Collapse

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

Telnet connections are disabled on the server.
Telnet connections are disabled on the server.
Role-based access control is misconfigured.
Role-based access control is misconfigured.
There are misconfigured firewall rules.
There are misconfigured firewall rules.
Group policies have not been applied.
Group policies have not been applied.
Suggested answer: C
Explanation:

This is the most likely cause of the issue because firewall rules can block or allow traffic based on source, destination, port, protocol, or other criteria. If the firewall rules are not configured properly, they can prevent remote users from accessing the cloud application server, while allowing on-site users to access it. Reference: https://docs.microsoft.com/en-us/azure/virtual-network/securityoverview

asked 02/10/2024
Sanjiv Cumar
44 questions

Question 206

Report Export Collapse

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

Link aggregation
Link aggregation
Heartbeat
Heartbeat
Most recently used
Most recently used
Active-active
Active-active
Suggested answer: A
Explanation:

This is the best solution to increase the speed of the NIC because link aggregation is a technique that combines multiple physical network interfaces into a single logical interface. This can increase the bandwidth, redundancy, and load balancing of network traffic. Link aggregation requires both the server and the switch to support it and be configured accordingly. Reference:

https://www.cisco.com/c/en/us/support/docs/lan-switching/etherchannel/12023-4.html

asked 02/10/2024
Franko Salajcik
39 questions

Question 207

Report Export Collapse

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

visudo I grep userid
visudo I grep userid
sudo -1 -U userid
sudo -1 -U userid
cat /etc/passwd
cat /etc/passwd
userlist I grep userid
userlist I grep userid
Suggested answer: B
Explanation:

This is the best command to find out which commands can be used by a user with sudo privileges because it lists the allowed and forbidden commands for a given user or role. The -l option stands for list, and the -U option specifies the user name. The output of this command will show what commands can be executed with sudo by that user on that server. Reference:

https://www.sudo.ws/man/1.8.13/sudo.man.html

asked 02/10/2024
Cristian Lazo
41 questions

Question 208

Report Export Collapse

Which of the following is the MOST secure method to access servers located in remote branch offices?

Use an MFAout-of-band solution.
Use an MFAout-of-band solution.
Use a Telnet connection.
Use a Telnet connection.
Use a password complexity policy.
Use a password complexity policy.
Use a role-based access policy.
Use a role-based access policy.
Suggested answer: A
Explanation:

This is the most secure method to access servers located in remote branch offices because MFA stands for multi-factor authentication, which requires users to provide more than one piece of evidence to prove their identity. An out-of-band solution means that one of the factors is delivered through a separate channel, such as a phone call, a text message, or an email. This adds an extra layer of security and prevents unauthorized access even if a password is compromised. Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks

asked 02/10/2024
Vishal Vitthal Pawar
45 questions

Question 209

Report Export Collapse

Which of the following refers to the requirements that dictate when to delete data backups?

Retention policies.
Retention policies.
Cloud security impact
Cloud security impact
Off-site storage
Off-site storage
Life-cycle management
Life-cycle management
Suggested answer: A
Explanation:

Retention policies are the guidelines that dictate when to delete data backups based on operational or compliance needs. They specify how long, how, where, and in what format the data backups are stored, and who has authority over them. The other options are not directly related to the deletion of data backups.

https://backup.ninja/news/Database-Backups-101-Backup-Retention-Policy-Considerations

asked 02/10/2024
jim eagleton
37 questions

Question 210

Report Export Collapse

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

Close unneeded ports.
Close unneeded ports.
Disable unneeded physical ports.
Disable unneeded physical ports.
Set a BIOS password.
Set a BIOS password.
Install a SIEM.
Install a SIEM.
Disable unneeded services.
Disable unneeded services.
Install a HIDS.
Install a HIDS.
Suggested answer: B, C
Explanation:

Disabling unneeded physical ports would prevent unauthorized devices from being connected to the server, such as an outside USB drive. Setting a BIOS password would restrict access to the boot settings and prevent unauthorized changes to the boot order. The other options would not address the risk of booting from an outside USB drive

asked 02/10/2024
karl hickey
46 questions
Total 499 questions
Go to page: of 50
Search

Related questions