ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 22

List of questions

Question 211

Report Export Collapse

Which of the following should be configured in pairs on a server to provide network redundancy?

MRU
MRU
SCP
SCP
DLP
DLP
CPU
CPU
NIC
NIC
Suggested answer: E
Explanation:

NIC stands for network interface card, which is a hardware component that allows a server to connect to a network. Configuring NICs in pairs on a server would provide network redundancy, meaning that if one NIC fails, the other one can take over and maintain network connectivity. The other options are not related to network redundancy.

asked 02/10/2024
Adilson Jacinto
42 questions

Question 212

Report Export Collapse

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

A security camera
A security camera
A mantrap
A mantrap
A security guard
A security guard
A proximity card
A proximity card
Suggested answer: B
Explanation:

A mantrap is a security device that consists of two interlocking doors that allow only one person to enter at a time. A mantrap would prevent employees from blocking the door in the main data center and force them to enter properly using their credentials. The other options would not enforce proper entry to the data center

asked 02/10/2024
Mathias Bergman
27 questions

Question 213

Report Export Collapse

Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

Service-level agreement
Service-level agreement
Disaster recovery plan
Disaster recovery plan
Business impact analysis
Business impact analysis
Business continuity plan
Business continuity plan
Suggested answer: B
Explanation:

A disaster recovery plan would be useful when trying to restore IT infrastructure operations after a non-planned interruption. A disaster recovery plan is a document that outlines the steps and procedures to recover from a major disruption of IT services caused by natural or man-made disasters, such as fire, flood, earthquake, cyberattack, etc. A disaster recovery plan typically includes:

A list of critical IT assets and resources that need to be protected and restored A list of roles and responsibilities of IT staff and stakeholders involved in the recovery process A list of backup and recovery strategies and tools for data, applications, servers, networks, etc. A list of communication channels and methods for notifying users, customers, vendors, etc. A list of testing and validation methods for ensuring the functionality and integrity of restored systems

A list of metrics and criteria for measuring the effectiveness and efficiency of the recovery process A disaster recovery plan helps IT organizations to minimize downtime, data loss, and financial impact of a disaster, as well as to resume normal operations as quickly as possible.

asked 02/10/2024
Rutger Pels
36 questions

Question 214

Report Export Collapse

Which of the following will correctly map a script to a home directory for a user based on username?

\\server\users$\username
\\server\users$\username
\\server\%username%
\\server\%username%
\\server\FirstInitialLastName
\\server\FirstInitialLastName
\\server\$username$
\\server\$username$
Suggested answer: B
Explanation:

The administrator should use \server%username% to correctly map a script to a home directory for a user based on username. %username% is an environment variable that represents the current user’s name on a Windows system. By using this variable in the path of the script, the administrator can dynamically map the script to the user’s home directory on the server. For example, if the user’s name is John, the script will be mapped to \server\John.

Reference:

https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9- 08280a1ef25a/ mapping-home-directory-with-username-variable?forum=w7itprogeneral

asked 02/10/2024
Kelvin Ogwu
36 questions

Question 215

Report Export Collapse

Which of the following policies would be BEST to deter a brute-force login attack?

Password complexity
Password complexity
Password reuse
Password reuse
Account age threshold
Account age threshold
Account lockout threshold
Account lockout threshold
Suggested answer: D
Explanation:

The best policy to deter a brute-force login attack is account lockout threshold. A brute-force login attack is a type of attack that tries to guess a user’s password by trying different combinations of characters until it finds the correct one. This attack can be performed manually or with automated tools that use dictionaries, wordlists, or algorithms. An account lockout threshold is a policy that specifies how many failed login attempts are allowed before an account is locked out temporarily or permanently. This policy prevents an attacker from trying unlimited password guesses and reduces the chances of finding the correct password.

asked 02/10/2024
GUY XAVIER DONGMO FAPONG
43 questions

Question 216

Report Export Collapse

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Configure the domain search variable
Configure the domain search variable
Change the permissions on resolv. conf
Change the permissions on resolv. conf
Configure the DNS address
Configure the DNS address
Modify nsswitch. Conf.
Modify nsswitch. Conf.
Suggested answer: A
Explanation:

The domain search variable is used to specify a list of domains that are appended to a hostname when resolving it. If the servername is not fully qualified, the resolver will try each domain in the list until it finds a match or fails. By configuring the domain search variable, the technician can avoid typing the full domain name every time they want to ping a server. Verified

Reference: [How to configure DNS suffixes on Linux systems]

asked 02/10/2024
Jaroslaw Mikolajczyk
41 questions

Question 217

Report Export Collapse

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

CompTIA SK0-005 image Question 217 97888 10022024175342000000

Which of the following commands would BEST enable the server technician to allow Joe to have access without granting excessive access to others?

chmod 777 filename
chmod 777 filename
chown Joe filename
chown Joe filename
Chmod g+w filename
Chmod g+w filename
chgrp IT filename
chgrp IT filename
Suggested answer: C
Explanation:

The chmod command is used to change the permissions of files and directories. The g+w option means to grant write permission to the group owner of the file. Since Joe is a member of the IT group, which is also the group owner of the file, this command will allow him to save changes to the file without affecting the permissions of other users. Verified

Reference: [Linux chmod command]

asked 02/10/2024
Dewi Fitriyani
58 questions

Question 218

Report Export Collapse

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

Configure a RAID array.
Configure a RAID array.
Replace the current drives with higher-capacity disks.
Replace the current drives with higher-capacity disks.
Implement FCoE for more storage capacity.
Implement FCoE for more storage capacity.
Connect the server to a SAN
Connect the server to a SAN
Suggested answer: D
Explanation:

A SAN (Storage Area Network) is a network of storage devices that can provide shared storage capacity to multiple servers. By connecting the server to a SAN, the administrator can increase the storage capacity of the server without adding any internal disks or expansion cards. This solution can be implemented quickly and without any downtime. Verified

Reference: [What is a SAN and how does it differ from NAS?]

asked 02/10/2024
Alexander Ferrer
52 questions

Question 219

Report Export Collapse

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Pet site
Pet site
Per server
Per server
Per user
Per user
Per core
Per core
Suggested answer: D
Explanation:

A per core licensing model is based on the number of processor cores in a server. This model is suitable for a data center that has a variable daily equipment count, as it allows for scaling up or down the number of cores as needed. A per core licensing model also provides better performance and efficiency than other models. Verified

Reference: [Per Core Licensing and Basic Definitions]

asked 02/10/2024
Muneer Deers
48 questions

Question 220

Report Export Collapse

A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?

Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.
Perform a complete OS reinstall on the server using the same media that was used during the initial install.
Perform a complete OS reinstall on the server using the same media that was used during the initial install.
Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.
Set a BIOS password to prevent server technicians from making any changes to the system.
Set a BIOS password to prevent server technicians from making any changes to the system.
Suggested answer: A
Explanation:

The bootloader configuration file is used to specify which kernel version and options to use when booting the system. The first kernel stanza in the file is the default one that is loaded automatically. By editing this stanza and changing it to point to the last known-good kernel files, the administrator can boot the system with a working kernel and avoid any compatibility issues with the new kernel update. Verified

Reference: [How To Change The Linux Kernel Version]

asked 02/10/2024
Kanta Prasad
42 questions
Total 499 questions
Go to page: of 50
Search

Related questions