ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

A.
Private
A.
Private
Answers
B.
Hybrid
B.
Hybrid
Answers
C.
Community
C.
Community
Answers
D.
Public
D.
Public
Answers
Suggested answer: B

Explanation:

This is the best description of a hybrid cloud model because it combines both private and public cloud resources. A private cloud is a cloud environment that is owned and operated by a single organization and hosted in its own data center. A public cloud is a cloud environment that is owned and operated by a third-party provider and hosted in its data center. A hybrid cloud allows an organization to leverage both types of cloud resources depending on its needs and preferences.

Reference: https://azure.microsoft.com/en-us/overview/what-is-hybrid-cloud-computing/

A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.
Open file
A.
Open file
Answers
B.
Synthetic full
B.
Synthetic full
Answers
C.
Full incremental
C.
Full incremental
Answers
D.
Full differential
D.
Full differential
Answers
Suggested answer: B

Explanation:

This is the best description of a synthetic full backup method because it creates a full backup by combining previous incremental backups with the latest backup. An incremental backup copies only the files that have changed since the last backup, while a full backup copies all the files. A synthetic full backup reduces the storage space and network bandwidth required for backups, while also simplifying the restore process by using a single file. Reference:

https://www.veritas.com/support/en_US/doc/129705091-129705095-0/br731_wxrttot_ v131910378-129705095

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

A.
Unplug the power cables from the redundant power supplies, leaving just the minimum required.
A.
Unplug the power cables from the redundant power supplies, leaving just the minimum required.
Answers
B.
Convert the physical servers to the hypervisors and retire the ten servers.
B.
Convert the physical servers to the hypervisors and retire the ten servers.
Answers
C.
Reimage the physical servers and retire all ten servers after the migration is complete.
C.
Reimage the physical servers and retire all ten servers after the migration is complete.
Answers
D.
Convert the ten servers to power-efficient core editions.
D.
Convert the ten servers to power-efficient core editions.
Answers
Suggested answer: B

Explanation:

This option would reduce power consumption and maintenance costs by consolidating the physical servers into virtual machines on the hypervisors. This would also free up space and resources in the data center. The other options would either not address the request, increase power consumption, or require more maintenance.

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

A.
Implement rollback procedures.
A.
Implement rollback procedures.
Answers
B.
Upgrade the drivers.
B.
Upgrade the drivers.
Answers
C.
Reinstall the OS.
C.
Reinstall the OS.
Answers
D.
Reboot the server.
D.
Reboot the server.
Answers
Suggested answer: A

Explanation:

This option would restore the server OS to a previous state before applying the monthly patches. This would help troubleshoot the issues caused by the patches and determine if they are compatible with the server OS. The other options would either not address the issues, cause data loss, or require more time and resources

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

A.
Telnet connections are disabled on the server.
A.
Telnet connections are disabled on the server.
Answers
B.
Role-based access control is misconfigured.
B.
Role-based access control is misconfigured.
Answers
C.
There are misconfigured firewall rules.
C.
There are misconfigured firewall rules.
Answers
D.
Group policies have not been applied.
D.
Group policies have not been applied.
Answers
Suggested answer: C

Explanation:

This is the most likely cause of the issue because firewall rules can block or allow traffic based on source, destination, port, protocol, or other criteria. If the firewall rules are not configured properly, they can prevent remote users from accessing the cloud application server, while allowing on-site users to access it. Reference: https://docs.microsoft.com/en-us/azure/virtual-network/securityoverview

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

A.
Link aggregation
A.
Link aggregation
Answers
B.
Heartbeat
B.
Heartbeat
Answers
C.
Most recently used
C.
Most recently used
Answers
D.
Active-active
D.
Active-active
Answers
Suggested answer: A

Explanation:

This is the best solution to increase the speed of the NIC because link aggregation is a technique that combines multiple physical network interfaces into a single logical interface. This can increase the bandwidth, redundancy, and load balancing of network traffic. Link aggregation requires both the server and the switch to support it and be configured accordingly. Reference:

https://www.cisco.com/c/en/us/support/docs/lan-switching/etherchannel/12023-4.html

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.
visudo I grep userid
A.
visudo I grep userid
Answers
B.
sudo -1 -U userid
B.
sudo -1 -U userid
Answers
C.
cat /etc/passwd
C.
cat /etc/passwd
Answers
D.
userlist I grep userid
D.
userlist I grep userid
Answers
Suggested answer: B

Explanation:

This is the best command to find out which commands can be used by a user with sudo privileges because it lists the allowed and forbidden commands for a given user or role. The -l option stands for list, and the -U option specifies the user name. The output of this command will show what commands can be executed with sudo by that user on that server. Reference:

https://www.sudo.ws/man/1.8.13/sudo.man.html

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.
Use an MFAout-of-band solution.
A.
Use an MFAout-of-band solution.
Answers
B.
Use a Telnet connection.
B.
Use a Telnet connection.
Answers
C.
Use a password complexity policy.
C.
Use a password complexity policy.
Answers
D.
Use a role-based access policy.
D.
Use a role-based access policy.
Answers
Suggested answer: A

Explanation:

This is the most secure method to access servers located in remote branch offices because MFA stands for multi-factor authentication, which requires users to provide more than one piece of evidence to prove their identity. An out-of-band solution means that one of the factors is delivered through a separate channel, such as a phone call, a text message, or an email. This adds an extra layer of security and prevents unauthorized access even if a password is compromised. Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks

Which of the following refers to the requirements that dictate when to delete data backups?

A.
Retention policies.
A.
Retention policies.
Answers
B.
Cloud security impact
B.
Cloud security impact
Answers
C.
Off-site storage
C.
Off-site storage
Answers
D.
Life-cycle management
D.
Life-cycle management
Answers
Suggested answer: A

Explanation:

Retention policies are the guidelines that dictate when to delete data backups based on operational or compliance needs. They specify how long, how, where, and in what format the data backups are stored, and who has authority over them. The other options are not directly related to the deletion of data backups.

https://backup.ninja/news/Database-Backups-101-Backup-Retention-Policy-Considerations

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).

A.
Close unneeded ports.
A.
Close unneeded ports.
Answers
B.
Disable unneeded physical ports.
B.
Disable unneeded physical ports.
Answers
C.
Set a BIOS password.
C.
Set a BIOS password.
Answers
D.
Install a SIEM.
D.
Install a SIEM.
Answers
E.
Disable unneeded services.
E.
Disable unneeded services.
Answers
F.
Install a HIDS.
F.
Install a HIDS.
Answers
Suggested answer: B, C

Explanation:

Disabling unneeded physical ports would prevent unauthorized devices from being connected to the server, such as an outside USB drive. Setting a BIOS password would restrict access to the boot settings and prevent unauthorized changes to the boot order. The other options would not address the risk of booting from an outside USB drive

Total 462 questions
Go to page: of 47