ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A.
A full, weekly backup with daily open-file backups
A.
A full, weekly backup with daily open-file backups
Answers
B.
A full, weekly backup with daily archive backups
B.
A full, weekly backup with daily archive backups
Answers
C.
A full, weekly backup with daily incremental backups
C.
A full, weekly backup with daily incremental backups
Answers
D.
A full, weekly backup with daily differential backups
D.
A full, weekly backup with daily differential backups
Answers
Suggested answer: D

Explanation:

A differential backup is a type of backup that copies all the files that have changed since the last full backup. A differential backup requires more storage space than an incremental backup, which only copies the files that have changed since the last backup of any type, but it also requires less time to restore in case of data loss. By combining a full, weekly backup with daily differential backups, the administrator can ensure that only two backup sets are needed to restore a full backup as quickly as possible. Verified

Reference: [Incremental vs Differential Backup]

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

A.
Uninstall recent updates.
A.
Uninstall recent updates.
Answers
B.
Reimage the server with a different OS.
B.
Reimage the server with a different OS.
Answers
C.
Run a port scan to verify open ports.
C.
Run a port scan to verify open ports.
Answers
D.
Enable a GPO to uninstall the update.
D.
Enable a GPO to uninstall the update.
Answers
E.
Scan and remove any malware.
E.
Scan and remove any malware.
Answers
F.
Reformat the server and restore the image from the latest backup.
F.
Reformat the server and restore the image from the latest backup.
Answers
Suggested answer: E, F

Explanation:

The most likely cause of the server crashing and the application being inaccessible is that the unauthorized software installed by the update is malware that corrupted the system files or compromised the security of the server. To restore access to the application while minimizing downtime, the administrator should scan and remove any malware from the server, and then reformat the server and restore the image from the latest back-up. This will ensure that the server is clean and has a working configuration of the application. Verified

Reference: [How to Remove Malware from a Server]

Which of the following backup types should be chosen for database servers?

A.
Differential
A.
Differential
Answers
B.
Incremental
B.
Incremental
Answers
C.
Synthetic full
C.
Synthetic full
Answers
D.
Open file
D.
Open file
Answers
Suggested answer: C

Explanation:

A synthetic full backup is a type of backup that combines a full backup with one or more incremental backups to create a new full backup without accessing the source data. This type of backup is suitable for database servers, as it reduces the backup window, minimizes the impact on the server performance, and provides faster recovery time. Verified

Reference: [Synthetic Full Backup]

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

A.
The UPS batteries were overcharged.
A.
The UPS batteries were overcharged.
Answers
B.
Redundant power supplies require 220V power
B.
Redundant power supplies require 220V power
Answers
C.
Both power supplies were connected to the same power feed
C.
Both power supplies were connected to the same power feed
Answers
D.
The power supplies were not cross-connected
D.
The power supplies were not cross-connected
Answers
Suggested answer: C

Explanation:

The most likely cause of this failure is that both power supplies were connected to the same power feed, which means that they both lost power when utility power was lost. To prevent this from happening, redundant power supplies should be connected to different power feeds, preferably from different sources, such as a UPS or a generator. Verified

Reference: [Redundant Power Supply Best Practices]

A data center has 4U rack servers that need to be replaced using VMs but without losing any dat

A.
Which of the following methods will MOST likely be used to replace these servers?
A.
Which of the following methods will MOST likely be used to replace these servers?
Answers
B.
VMFS
B.
VMFS
Answers
C.
Unattended scripted OS installation
C.
Unattended scripted OS installation
Answers
D.
P2V
D.
P2V
Answers
E.
VM cloning
E.
VM cloning
Answers
Suggested answer: C

Explanation:

P2V (Physical to Virtual) is a method of converting a physical server into a virtual machine that can run on a hypervisor. This method can be used to replace 4U rack servers with VMs without losing any data, as it preserves the configuration and state of the original server. P2V can also reduce hardware costs, power consumption, and space requirements. Verified

Reference: [What is P2V?]

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

A.
21
A.
21
Answers
B.
22
B.
22
Answers
C.
443
C.
443
Answers
D.
3389
D.
3389
Answers
Suggested answer: A

Explanation:

Port 21 is used for FTP (File Transfer Protocol), which is a protocol that transfers files between servers and clients in cleartext, meaning that anyone can intercept and read the data. To stop this communication, port 21 should be closed on the web server and replaced with a secure protocol, such as SFTP (Secure File Transfer Protocol) or FTPS (File Transfer Protocol Secure), which use encryption to protect the data. Verified

Reference: [FTP vs SFTP vs FTPS]

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

A.
Copy the existing data to an external USB 3 0 enclosure.
A.
Copy the existing data to an external USB 3 0 enclosure.
Answers
B.
Place the existing data on a DVD and use the internal DVD-ROM drive.
B.
Place the existing data on a DVD and use the internal DVD-ROM drive.
Answers
C.
Transfer the existing data to an external eSATA enclosure.
C.
Transfer the existing data to an external eSATA enclosure.
Answers
D.
Move the existing data to a new. larger internal hard drive.
D.
Move the existing data to a new. larger internal hard drive.
Answers
Suggested answer: C

Explanation:

The best way to accomplish the department's goals is to transfer the existing data to an external eSATA enclosure, which is a device that connects an external hard drive to a computer using an eSATA port. This will allow the accounting department to retain the current data for quick read-write access, as eSATA provides high-speed data transfer rates and supports hot-plugging. Unlike USB 3.0, eSATA does not share bandwidth with other devices, which can improve performance and reliability. Verified

Reference: [eSATA vs USB 3.0]

Which of the following should a technician verify FIRST before decommissioning and wiping a file server?

A.
The media destruction method
A.
The media destruction method
Answers
B.
The recycling poke?
B.
The recycling poke?
Answers
C.
Asset management documentation
C.
Asset management documentation
Answers
D.
Non-utilization
D.
Non-utilization
Answers
Suggested answer: D

Explanation:

The first thing that a technician should verify before decommissioning and wiping a file server is non-utilization, which means that no one is using or accessing the server or its data. This can be done by checking logs, monitoring network traffic, or contacting users or stakeholders. Non-utilization ensures that decommissioning and wiping will not cause any data loss or disruption to business operations. Verified

Reference: [Server Decommissioning Checklist]

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an s> prompt. When of the following is the MOST likely cause of this issue?

A.
The system is booting to a USB flash drive
A.
The system is booting to a USB flash drive
Answers
B.
The UEFI boot was interrupted by a missing Linux boot file
B.
The UEFI boot was interrupted by a missing Linux boot file
Answers
C.
The BIOS could not find a bootable hard disk
C.
The BIOS could not find a bootable hard disk
Answers
D.
The BIOS firmware needs to be upgraded
D.
The BIOS firmware needs to be upgraded
Answers
Suggested answer: B

Explanation:

The most likely cause of this issue is that the UEFI boot was interrupted by a missing Linux boot file, such as grub.cfg or vmlinuz, which are essential for loading the Linux kernel and booting the system. The s> prompt indicates that the system entered into UEFI Shell mode, which is a command-line interface for troubleshooting UEFI boot issues. The administrator can use UEFI Shell commands to locate and restore the missing boot file or change the boot order. Verified

Reference: [UEFI Shell Guide]

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

A.
SLA
A.
SLA
Answers
B.
BIA
B.
BIA
Answers
C.
RTO
C.
RTO
Answers
D.
MTTR
D.
MTTR
Answers
Suggested answer: C

Explanation:

RTO (Recovery Time Objective) is a metric that measures how much downtime an organization can tolerate during an unplanned outage before it affects its business continuity and reputation. RTO is usually expressed in hours or minutes and is determined by the criticality of the business processes and the impact of the outage on the revenue, customers, and stakeholders. RTO helps to define the recovery strategy and the resources needed to restore the normal operations as quickly as possible. Verified

Reference: [RTO vs RPO]

Total 462 questions
Go to page: of 47