ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

A.
Modifying the MAC used on the DHCP reservation
A.
Modifying the MAC used on the DHCP reservation
Answers
B.
Updating the local hosts file with the correct IP address
B.
Updating the local hosts file with the correct IP address
Answers
C.
Modifying the WWNN used on the DHCP reservation
C.
Modifying the WWNN used on the DHCP reservation
Answers
D.
Updating the NIC to use the correct WWNN
D.
Updating the NIC to use the correct WWNN
Answers
Suggested answer: A

Explanation:

A DHCP reservation is a way to assign a specific IP address to a device based on its MAC address, which is a unique identifier for each network interface card (NIC). When the administrator replaced the NIC, the MAC address of the server changed, and the DHCP server no longer recognized it as the same device. Therefore, the DHCP server assigned a different IP address to the server, which was incorrect for the application. To fix this problem, the administrator needs to modify the DHCP reservation to use the new MAC address of the NIC, so that the server can get the proper IP address.

A WWNN (World Wide Node Name) is a unique identifier for a Fibre Channel node, which is a device that can communicate over a Fibre Channel network. A WWNN is not related to DHCP or IP addresses, and it is not used for DHCP reservations. Therefore, options B and D are incorrect.

Updating the local hosts file with the correct IP address (option C) is also incorrect, because it does not solve the problem of getting the correct IP address from the DHCP server. The hosts file is a local file that maps hostnames to IP addresses, and it is used to override DNS queries. However, it does not affect how the DHCP server assigns IP addresses to devices. Moreover, updating the hosts file manually on every device that needs to communicate with the server is not a scalable or efficient solution.

How to reserve IP Address in DHCP Server - Ask Ubuntu

Static IP vs DHCP Reservation - The Tech Journal

How to Configure DHCP Server Reservation in Windows ... - ITIngredients

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

A.
53
A.
53
Answers
B.
80
B.
80
Answers
C.
389
C.
389
Answers
D.
443
D.
443
Answers
E.
45
E.
45
Answers
F.
3389
F.
3389
Answers
G.
8080
G.
8080
Answers
Suggested answer: D, F

Explanation:

Port 443 is the default port for HTTPS, which is the protocol used for secure web communication. HTTPS uses SSL/TLS certificates to encrypt the data between the web server and the browser. Port 443 is commonly used for web servers that need to provide secure services, such as online banking, e-commerce, or email.By allowing port 443, the administrator can access the web server's interface and manage its settings1.

Port 3389 is the default port for RDP, which is the protocol used for remote desktop connection. RDP allows a user to remotely access and control another computer over a network. Port 3389 is commonly used for remote administration, technical support, or remote work.By allowing port 3389, the administrator can connect to the web server's desktop and perform tasks that require graphical user interface2.

A systems administrator needs to create a data volume out of four disks with the MOST redundancy. Which of the following is the BEST solution?

A.
RAID 0
A.
RAID 0
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAID 5
C.
RAID 5
Answers
D.
RAID 6
D.
RAID 6
Answers
Suggested answer: D

Explanation:

RAID 6 is a type of RAID level that uses two parity blocks to provide fault tolerance and redundancy for data storage. RAID 6 can withstand the failure of up to two disks in the array without losing any data. RAID 6 requires a minimum of four disks to operate, and it distributes the data and parity blocks across all the disks in the array. RAID 6 has a high write penalty, which means that it takes more time and resources to write data to the disks than to read data from them.However, RAID 6 offers a high level of data protection and reliability, which makes it suitable for applications that require high availability and durability1.

RAID 1 provides redundancy and fault tolerance by mirroring the data from one disk to another disk. RAID 1 offers high read performance and data security, but it has low capacity and write performance. RAID 1 requires a minimum of two disks to operate, and it can only tolerate the failure of one disk in the array.If more than one disk fails, all the data in the array is lost2.

RAID 5 provides redundancy and fault tolerance by using one parity block to store information that can be used to reconstruct the data in case of a disk failure. RAID 5 requires a minimum of three disks to operate, and it distributes the data and parity blocks across all the disks in the array. RAID 5 offers a balance between performance, capacity, and data protection, but it can only tolerate the failure of one disk in the array.If more than one disk fails, all the data in the array is lost2.

Therefore, among these options, RAID 6 is the best solution for creating a data volume out of four disks with the most redundancy.

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

A.
A firewall
A.
A firewall
Answers
B.
An antivirus
B.
An antivirus
Answers
C.
AHIDS
C.
AHIDS
Answers
D.
User account control
D.
User account control
Answers
Suggested answer: A

Explanation:

The most likely cause of the servers displaying the wrong time is A. A firewall. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined rules. A firewall can block or allow certain ports, protocols, or applications that are used for network communication.

One of the protocols that is used for time synchronization is the Network Time Protocol (NTP), which requires the use of UDP port 123 for all time synchronization1. If a firewall blocks this port, it can prevent the servers from obtaining the correct time from the time source. Therefore, the server administrator should check the firewall settings and make sure that UDP port 123 is allowed for NTP traffic.

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

A.
Reinstall the OS and programs.
A.
Reinstall the OS and programs.
Answers
B.
Configure old drives to RAID.
B.
Configure old drives to RAID.
Answers
C.
Reconfigure the RAID.
C.
Reconfigure the RAID.
Answers
D.
Install from backup.
D.
Install from backup.
Answers
Suggested answer: C

Explanation:

RAID (Redundant Array of Independent Disks) is a technology that combines multiple hard drives into a logical unit that provides improved performance, reliability, or capacity. RAID can be implemented by hardware, software, or a combination of both.Hardware RAID uses a dedicated controller to manage the RAID array, while software RAID uses the operating system or a driver to do the same1.

In this scenario, the technician noted that the RAID hard drives were functional while troubleshooting a motherboard failure. This means that the data on the drives was not corrupted or lost. However, the technician installed a spare motherboard with similar specifications and used the original components. This means that the new motherboard may not have the same RAID configuration as the old one, or it may not recognize the existing RAID array at all. Therefore, the technician needs to reconfigure the RAID in order to restore operations with minimal downtime.

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

A.
Something you are
A.
Something you are
Answers
B.
Something you know
B.
Something you know
Answers
C.
Something you have
C.
Something you have
Answers
D.
Something you do
D.
Something you do
Answers
Suggested answer: C

Explanation:

Something you have is one of the types of authentication methods that relies on a physical object or device that the user possesses to verify their identity. A token is an example of something you have, as it is a small device that generates a one-time password or code that the user enters during login. A token can be a hardware device, such as a key fob or a smart card, or a software application, such as an app on a smartphone or a browser extension.A token provides an additional layer of security to the authentication process, as it prevents unauthorized access even if the user's username and password are compromised1.

Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?

A.
Aggregation
A.
Aggregation
Answers
B.
Subscription
B.
Subscription
Answers
C.
Merging
C.
Merging
Answers
D.
Collection
D.
Collection
Answers
Suggested answer: A

Explanation:

Aggregation is the process of collecting, standardizing, and consolidating log data from multiple sources into a central location. Aggregation makes it easier to search, analyze, and report on log data, as well as to comply with security policies and regulations.By aggregating logs from all servers, regardless of their state, the corporate policy can ensure that no log data is lost or inaccessible in case of a server failure or outage

A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?

A.
DHCP configuration
A.
DHCP configuration
Answers
B.
Firewall rules
B.
Firewall rules
Answers
C.
DLP software
C.
DLP software
Answers
D.
Intrusion detection system
D.
Intrusion detection system
Answers
Suggested answer: C

Explanation:

DLP (Data Loss Prevention) software is a type of security software that monitors and controls the transfer of sensitive or confidential data outside the organization. DLP software can prevent data breaches, data leaks, or data theft by blocking, encrypting, or alerting on unauthorized data transfers. DLP software can be applied to various channels, such as email, web, cloud, or removable devices.

In this scenario, the human resources analyst is attempting to email the records for new employees to an outside payroll company. The records for new employees may contain sensitive or confidential data, such as personal information, tax information, or bank account information. The DLP software may detect this data and block the email from being sent outside the company, as it may violate the company's data protection policy or regulations. The DLP software may also generate an error message to inform the analyst of the reason for the rejection.

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.
RFID
A.
RFID
Answers
B.
Proximity readers
B.
Proximity readers
Answers
C.
Signal blocking
C.
Signal blocking
Answers
D.
Camouflage
D.
Camouflage
Answers
E.
Reflective glass
E.
Reflective glass
Answers
F.
Bollards
F.
Bollards
Answers
Suggested answer: C, D

Explanation:

Signal blocking is a technique that prevents or reduces the transmission of electromagnetic signals from a building to the outside. Signal blocking can be achieved by using materials that absorb, reflect, or scatter the signals, such as metal, concrete, or mesh.Signal blocking can protect the data center from eavesdropping, interference, or jamming by unauthorized parties1.

Camouflage is a technique that disguises or conceals the appearance of a building to make it less noticeable or identifiable from the outside. Camouflage can be achieved by using colors, patterns, shapes, or vegetation that blend in with the surrounding environment.Camouflage can protect the data center from detection, reconnaissance, or targeting by hostile parties

Users report that the FinanceApp software is not running, and they need immediate access. Issues with the FinanceApp software occur every week after the IT team completes server system updates. The users, however, do not want to contact the help desk every time the issue occurs. The users also report the new MarketApp software is not usable when it crashes, which can cause significant downtime. The technician who restarted the MarketApp software noticed it is running under a test account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to remedy the stated issues.

A.
See the solution in explanation
A.
See the solution in explanation
Answers
Suggested answer: A

Explanation:

Explanation:

FinanceApp software is running as a service named ''FinanceApp Service''. The service description says ''Provides financial data and calculations for the FinanceApp software''. The service status is ''Stopped'', which means that the service is not running and the software is not functional. The service startup type is ''Manual'', which means that the service needs to be started manually by the user or the administrator. The service log on as is ''Local System'', which means that the service runs under a predefined local account that has extensive privileges on the local computer.

To fix the issue with the FinanceApp software, you need to do two things:

First, you need to start the service, so that the software can run. To do this, you can right-click on the service name and select ''Start'' from the menu. Alternatively, you can select the service name and click on the ''Start'' button on the toolbar. You should see a message saying that the service has started successfully.

Second, you need to change the service startup type, so that the service can start automatically every time the server boots up. This way, you don't have to contact the help desk every time the issue occurs. To do this, you can right-click on the service name and select ''Properties'' from the menu. Alternatively, you can select the service name and click on the ''Properties'' button on the toolbar. You should see a window with several tabs and options. On the ''General'' tab, under ''Startup type'', you can select ''Automatic'' from the drop-down list. Then, click on ''OK'' to save your changes.

By doing these two steps, you should be able to use the FinanceApp software without any problems.

The MarketApp software is running as a service named ''MarketApp Service''. The service description says ''Provides market data and analysis for the MarketApp software''. The service status is ''Running'', which means that the service is running and the software is functional. However, as you reported, the software may crash sometimes, which can cause significant downtime. The service startup type is ''Automatic'', which means that the service starts automatically every time the server boots up. The service log on as is ''TestAccount'', which is a test account that was probably used for development or testing purposes.

To fix the issue with the MarketApp software, you need to do one thing:

You need to change the service log on as, so that the service runs under a proper account that has sufficient permissions and security settings for production use. To do this, you can right-click on the service name and select ''Properties'' from the menu. Alternatively, you can select the service name and click on the ''Properties'' button on the toolbar. You should see a window with several tabs and options. On the ''Log On'' tab, under ''Log on as'', you can select either ''Local System account'' or ''This account''. If you choose ''Local System account'', then the service will run under a predefined local account that has extensive privileges on the local computer. If you choose ''This account'', then you will need to enter a valid username and password for an account that has appropriate permissions and security settings for running the service. You may need to consult with your IT team or your software vendor to determine which option is best for your situation. Then, click on ''OK'' to save your changes.


Total 462 questions
Go to page: of 47