ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report Export Collapse

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A full, weekly backup with daily open-file backups
A full, weekly backup with daily open-file backups
A full, weekly backup with daily archive backups
A full, weekly backup with daily archive backups
A full, weekly backup with daily incremental backups
A full, weekly backup with daily incremental backups
A full, weekly backup with daily differential backups
A full, weekly backup with daily differential backups
Suggested answer: D
Explanation:

A differential backup is a type of backup that copies all the files that have changed since the last full backup. A differential backup requires more storage space than an incremental backup, which only copies the files that have changed since the last backup of any type, but it also requires less time to restore in case of data loss. By combining a full, weekly backup with daily differential backups, the administrator can ensure that only two backup sets are needed to restore a full backup as quickly as possible. Verified

Reference: [Incremental vs Differential Backup]

asked 02/10/2024
Jenny Maliwanag
53 questions

Question 222

Report Export Collapse

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Uninstall recent updates.
Uninstall recent updates.
Reimage the server with a different OS.
Reimage the server with a different OS.
Run a port scan to verify open ports.
Run a port scan to verify open ports.
Enable a GPO to uninstall the update.
Enable a GPO to uninstall the update.
Scan and remove any malware.
Scan and remove any malware.
Reformat the server and restore the image from the latest backup.
Reformat the server and restore the image from the latest backup.
Suggested answer: E, F
Explanation:

The most likely cause of the server crashing and the application being inaccessible is that the unauthorized software installed by the update is malware that corrupted the system files or compromised the security of the server. To restore access to the application while minimizing downtime, the administrator should scan and remove any malware from the server, and then reformat the server and restore the image from the latest back-up. This will ensure that the server is clean and has a working configuration of the application. Verified

Reference: [How to Remove Malware from a Server]

asked 02/10/2024
JULIAN SSEMALULU
28 questions

Question 223

Report Export Collapse

Which of the following backup types should be chosen for database servers?

Differential
Differential
Incremental
Incremental
Synthetic full
Synthetic full
Open file
Open file
Suggested answer: C
Explanation:

A synthetic full backup is a type of backup that combines a full backup with one or more incremental backups to create a new full backup without accessing the source data. This type of backup is suitable for database servers, as it reduces the backup window, minimizes the impact on the server performance, and provides faster recovery time. Verified

Reference: [Synthetic Full Backup]

asked 02/10/2024
Katherine Messick
39 questions

Question 224

Report Export Collapse

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

The UPS batteries were overcharged.
The UPS batteries were overcharged.
Redundant power supplies require 220V power
Redundant power supplies require 220V power
Both power supplies were connected to the same power feed
Both power supplies were connected to the same power feed
The power supplies were not cross-connected
The power supplies were not cross-connected
Suggested answer: C
Explanation:

The most likely cause of this failure is that both power supplies were connected to the same power feed, which means that they both lost power when utility power was lost. To prevent this from happening, redundant power supplies should be connected to different power feeds, preferably from different sources, such as a UPS or a generator. Verified

Reference: [Redundant Power Supply Best Practices]

asked 02/10/2024
Robert Petty
55 questions

Question 225

Report Export Collapse

A data center has 4U rack servers that need to be replaced using VMs but without losing any dat

Which of the following methods will MOST likely be used to replace these servers?
Which of the following methods will MOST likely be used to replace these servers?
VMFS
VMFS
Unattended scripted OS installation
Unattended scripted OS installation
P2V
P2V
VM cloning
VM cloning
Suggested answer: C
Explanation:

P2V (Physical to Virtual) is a method of converting a physical server into a virtual machine that can run on a hypervisor. This method can be used to replace 4U rack servers with VMs without losing any data, as it preserves the configuration and state of the original server. P2V can also reduce hardware costs, power consumption, and space requirements. Verified

Reference: [What is P2V?]

asked 02/10/2024
ACHILLE CARROLL
46 questions

Question 226

Report Export Collapse

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

21
21
22
22
443
443
3389
3389
Suggested answer: A
Explanation:

Port 21 is used for FTP (File Transfer Protocol), which is a protocol that transfers files between servers and clients in cleartext, meaning that anyone can intercept and read the data. To stop this communication, port 21 should be closed on the web server and replaced with a secure protocol, such as SFTP (Secure File Transfer Protocol) or FTPS (File Transfer Protocol Secure), which use encryption to protect the data. Verified

Reference: [FTP vs SFTP vs FTPS]

asked 02/10/2024
Jacek Kaleta
58 questions

Question 227

Report Export Collapse

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

Copy the existing data to an external USB 3 0 enclosure.
Copy the existing data to an external USB 3 0 enclosure.
Place the existing data on a DVD and use the internal DVD-ROM drive.
Place the existing data on a DVD and use the internal DVD-ROM drive.
Transfer the existing data to an external eSATA enclosure.
Transfer the existing data to an external eSATA enclosure.
Move the existing data to a new. larger internal hard drive.
Move the existing data to a new. larger internal hard drive.
Suggested answer: C
Explanation:

The best way to accomplish the department's goals is to transfer the existing data to an external eSATA enclosure, which is a device that connects an external hard drive to a computer using an eSATA port. This will allow the accounting department to retain the current data for quick read-write access, as eSATA provides high-speed data transfer rates and supports hot-plugging. Unlike USB 3.0, eSATA does not share bandwidth with other devices, which can improve performance and reliability. Verified

Reference: [eSATA vs USB 3.0]

asked 02/10/2024
Abigail Dodson
40 questions

Question 228

Report Export Collapse

Which of the following should a technician verify FIRST before decommissioning and wiping a file server?

The media destruction method
The media destruction method
The recycling poke?
The recycling poke?
Asset management documentation
Asset management documentation
Non-utilization
Non-utilization
Suggested answer: D
Explanation:

The first thing that a technician should verify before decommissioning and wiping a file server is non-utilization, which means that no one is using or accessing the server or its data. This can be done by checking logs, monitoring network traffic, or contacting users or stakeholders. Non-utilization ensures that decommissioning and wiping will not cause any data loss or disruption to business operations. Verified

Reference: [Server Decommissioning Checklist]

asked 02/10/2024
Osama Rahman
35 questions

Question 229

Report Export Collapse

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an s> prompt. When of the following is the MOST likely cause of this issue?

The system is booting to a USB flash drive
The system is booting to a USB flash drive
The UEFI boot was interrupted by a missing Linux boot file
The UEFI boot was interrupted by a missing Linux boot file
The BIOS could not find a bootable hard disk
The BIOS could not find a bootable hard disk
The BIOS firmware needs to be upgraded
The BIOS firmware needs to be upgraded
Suggested answer: B
Explanation:

The most likely cause of this issue is that the UEFI boot was interrupted by a missing Linux boot file, such as grub.cfg or vmlinuz, which are essential for loading the Linux kernel and booting the system. The s> prompt indicates that the system entered into UEFI Shell mode, which is a command-line interface for troubleshooting UEFI boot issues. The administrator can use UEFI Shell commands to locate and restore the missing boot file or change the boot order. Verified

Reference: [UEFI Shell Guide]

asked 02/10/2024
Gerson Rodrigo Menendez
43 questions

Question 230

Report Export Collapse

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

SLA
SLA
BIA
BIA
RTO
RTO
MTTR
MTTR
Suggested answer: C
Explanation:

RTO (Recovery Time Objective) is a metric that measures how much downtime an organization can tolerate during an unplanned outage before it affects its business continuity and reputation. RTO is usually expressed in hours or minutes and is determined by the criticality of the business processes and the impact of the outage on the revenue, customers, and stakeholders. RTO helps to define the recovery strategy and the resources needed to restore the normal operations as quickly as possible. Verified

Reference: [RTO vs RPO]

asked 02/10/2024
Matt Smith
55 questions
Total 499 questions
Go to page: of 50
Search

Related questions