ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should be configured in pairs on a server to provide network redundancy?

A.
MRU
A.
MRU
Answers
B.
SCP
B.
SCP
Answers
C.
DLP
C.
DLP
Answers
D.
CPU
D.
CPU
Answers
E.
NIC
E.
NIC
Answers
Suggested answer: E

Explanation:

NIC stands for network interface card, which is a hardware component that allows a server to connect to a network. Configuring NICs in pairs on a server would provide network redundancy, meaning that if one NIC fails, the other one can take over and maintain network connectivity. The other options are not related to network redundancy.

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

A.
A security camera
A.
A security camera
Answers
B.
A mantrap
B.
A mantrap
Answers
C.
A security guard
C.
A security guard
Answers
D.
A proximity card
D.
A proximity card
Answers
Suggested answer: B

Explanation:

A mantrap is a security device that consists of two interlocking doors that allow only one person to enter at a time. A mantrap would prevent employees from blocking the door in the main data center and force them to enter properly using their credentials. The other options would not enforce proper entry to the data center

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

A.
Service-level agreement
A.
Service-level agreement
Answers
B.
Disaster recovery plan
B.
Disaster recovery plan
Answers
C.
Business impact analysis
C.
Business impact analysis
Answers
D.
Business continuity plan
D.
Business continuity plan
Answers
Suggested answer: B

Explanation:

A disaster recovery plan would be useful when trying to restore IT infrastructure operations after a non-planned interruption. A disaster recovery plan is a document that outlines the steps and procedures to recover from a major disruption of IT services caused by natural or man-made disasters, such as fire, flood, earthquake, cyberattack, etc. A disaster recovery plan typically includes:

A list of critical IT assets and resources that need to be protected and restored A list of roles and responsibilities of IT staff and stakeholders involved in the recovery process A list of backup and recovery strategies and tools for data, applications, servers, networks, etc. A list of communication channels and methods for notifying users, customers, vendors, etc. A list of testing and validation methods for ensuring the functionality and integrity of restored systems

A list of metrics and criteria for measuring the effectiveness and efficiency of the recovery process A disaster recovery plan helps IT organizations to minimize downtime, data loss, and financial impact of a disaster, as well as to resume normal operations as quickly as possible.

Which of the following will correctly map a script to a home directory for a user based on username?

A.
\\server\users$\username
A.
\\server\users$\username
Answers
B.
\\server\%username%
B.
\\server\%username%
Answers
C.
\\server\FirstInitialLastName
C.
\\server\FirstInitialLastName
Answers
D.
\\server\$username$
D.
\\server\$username$
Answers
Suggested answer: B

Explanation:

The administrator should use \server%username% to correctly map a script to a home directory for a user based on username. %username% is an environment variable that represents the current user’s name on a Windows system. By using this variable in the path of the script, the administrator can dynamically map the script to the user’s home directory on the server. For example, if the user’s name is John, the script will be mapped to \server\John.

Reference:

https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9- 08280a1ef25a/ mapping-home-directory-with-username-variable?forum=w7itprogeneral

Which of the following policies would be BEST to deter a brute-force login attack?

A.
Password complexity
A.
Password complexity
Answers
B.
Password reuse
B.
Password reuse
Answers
C.
Account age threshold
C.
Account age threshold
Answers
D.
Account lockout threshold
D.
Account lockout threshold
Answers
Suggested answer: D

Explanation:

The best policy to deter a brute-force login attack is account lockout threshold. A brute-force login attack is a type of attack that tries to guess a user’s password by trying different combinations of characters until it finds the correct one. This attack can be performed manually or with automated tools that use dictionaries, wordlists, or algorithms. An account lockout threshold is a policy that specifies how many failed login attempts are allowed before an account is locked out temporarily or permanently. This policy prevents an attacker from trying unlimited password guesses and reduces the chances of finding the correct password.

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

A.
Configure the domain search variable
A.
Configure the domain search variable
Answers
B.
Change the permissions on resolv. conf
B.
Change the permissions on resolv. conf
Answers
C.
Configure the DNS address
C.
Configure the DNS address
Answers
D.
Modify nsswitch. Conf.
D.
Modify nsswitch. Conf.
Answers
Suggested answer: A

Explanation:

The domain search variable is used to specify a list of domains that are appended to a hostname when resolving it. If the servername is not fully qualified, the resolver will try each domain in the list until it finds a match or fails. By configuring the domain search variable, the technician can avoid typing the full domain name every time they want to ping a server. Verified

Reference: [How to configure DNS suffixes on Linux systems]

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

A.
chmod 777 filename
A.
chmod 777 filename
Answers
B.
chown Joe filename
B.
chown Joe filename
Answers
C.
Chmod g+w filename
C.
Chmod g+w filename
Answers
D.
chgrp IT filename
D.
chgrp IT filename
Answers
Suggested answer: C

Explanation:

The chmod command is used to change the permissions of files and directories. The g+w option means to grant write permission to the group owner of the file. Since Joe is a member of the IT group, which is also the group owner of the file, this command will allow him to save changes to the file without affecting the permissions of other users. Verified

Reference: [Linux chmod command]

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

A.
Configure a RAID array.
A.
Configure a RAID array.
Answers
B.
Replace the current drives with higher-capacity disks.
B.
Replace the current drives with higher-capacity disks.
Answers
C.
Implement FCoE for more storage capacity.
C.
Implement FCoE for more storage capacity.
Answers
D.
Connect the server to a SAN
D.
Connect the server to a SAN
Answers
Suggested answer: D

Explanation:

A SAN (Storage Area Network) is a network of storage devices that can provide shared storage capacity to multiple servers. By connecting the server to a SAN, the administrator can increase the storage capacity of the server without adding any internal disks or expansion cards. This solution can be implemented quickly and without any downtime. Verified

Reference: [What is a SAN and how does it differ from NAS?]

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

A.
Pet site
A.
Pet site
Answers
B.
Per server
B.
Per server
Answers
C.
Per user
C.
Per user
Answers
D.
Per core
D.
Per core
Answers
Suggested answer: D

Explanation:

A per core licensing model is based on the number of processor cores in a server. This model is suitable for a data center that has a variable daily equipment count, as it allows for scaling up or down the number of cores as needed. A per core licensing model also provides better performance and efficiency than other models. Verified

Reference: [Per Core Licensing and Basic Definitions]

A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?

A.
Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
A.
Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
Answers
B.
Perform a complete OS reinstall on the server using the same media that was used during the initial install.
B.
Perform a complete OS reinstall on the server using the same media that was used during the initial install.
Answers
C.
Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
C.
Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
Answers
D.
Set a BIOS password to prevent server technicians from making any changes to the system.
D.
Set a BIOS password to prevent server technicians from making any changes to the system.
Answers
Suggested answer: A

Explanation:

The bootloader configuration file is used to specify which kernel version and options to use when booting the system. The first kernel stanza in the file is the default one that is loaded automatically. By editing this stanza and changing it to point to the last known-good kernel files, the administrator can boot the system with a working kernel and avoid any compatibility issues with the new kernel update. Verified

Reference: [How To Change The Linux Kernel Version]

Total 462 questions
Go to page: of 47