ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











Which of the following licensing models was created by software companies in response to the increasing density of processors?

A.
Per-instance
A.
Per-instance
Answers
B.
Per-server
B.
Per-server
Answers
C.
per-user
C.
per-user
Answers
D.
per-core
D.
per-core
Answers
Suggested answer: D

Explanation:

The correct answer is D. per-core.

The per-core licensing model was created by software companies in response to the increasing density of processors. This model is used for software that runs on servers with multi-core processors, and the licensing fee is based on the number of cores. This way, the software vendors can charge more for software that runs on servers with more processing power1

The management team has mandated the use of data-at-rest encryption on all corporate servers.

Using this encryption paradigm will ensure:

A.
website traffic is protected while traversing the internet.
A.
website traffic is protected while traversing the internet.
Answers
B.
files stored on the server are protected against physical theft.
B.
files stored on the server are protected against physical theft.
Answers
C.
attachments that are emailed from this server cannot be intercepted.
C.
attachments that are emailed from this server cannot be intercepted.
Answers
D.
databases in use are protected from remote hackers.
D.
databases in use are protected from remote hackers.
Answers
Suggested answer: B

Explanation:

Data-at-rest encryption is a method of encrypting data while it is stored on a storage device, such as a hard drive, an SSD, or a tape library. This ensures that if the data is stolen or lost, it will be unreadable without the encryption key. Data-at-rest encryption does not protect data while it is in transit over the network, in use by the CPU or memory, or attached to an email.

An administrator needs to increase the size of an existing RAID 6 array that is running out of available space. Which of the following is the best way the administrator can perform this task?

A.
Replace all the array drives at once and then expand the array.
A.
Replace all the array drives at once and then expand the array.
Answers
B.
Expand the array by changing the RAID level to 6.
B.
Expand the array by changing the RAID level to 6.
Answers
C.
Expand the array by changing the RAID level to 10.
C.
Expand the array by changing the RAID level to 10.
Answers
D.
Replace the array drives one at a time and then expand the array.
D.
Replace the array drives one at a time and then expand the array.
Answers
Suggested answer: D

Explanation:

RAID 6 is a type of RAID that uses block-level striping with two parity blocks distributed across all member disks. It allows for two disk failures within the RAID set before any data is lost1. A minimum of four disks is required to create RAID 61. To increase the size of an existing RAID 6 array, the administrator can replace the array drives one at a time with larger drives and then expand the array. This way, the data and parity are rebuilt on each new drive and the array remains operational during the process2.

Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?

A.
Per-server
A.
Per-server
Answers
B.
per-seat
B.
per-seat
Answers
C.
Per-concurrent user
C.
Per-concurrent user
Answers
D.
per-core
D.
per-core
Answers
Suggested answer: C

Explanation:

The per-concurrent user licensing model is a type of licensing model that restricts the number of active sessions or connections to a software application at any given time. This means that multiple users can share the same license, as long as they do not access the application simultaneously. This model is often used for applications that are accessed intermittently or for a short duration by different users, such as remote access software, web-based applications, or testing tools12.

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

A.
Security guards
A.
Security guards
Answers
B.
Security cameras
B.
Security cameras
Answers
C.
Bollards
C.
Bollards
Answers
D.
An access control vestibule
D.
An access control vestibule
Answers
Suggested answer: D

Explanation:

An access control vestibule, or mantrap, is a type of physical access control that provides a space between two sets of interlocking doors. It is designed to prevent unauthorized individuals from following authorized individuals into facilities with controlled access, such as a check-in desk. The vestibule can be configured to limit the number of individuals who enter the controlled area and to verify their authorization for physical access1. The other options are incorrect because they are not as effective as an access control vestibule in facilitating the implementation of a check-in desk. Security guards, security cameras, and bollards are useful for monitoring, deterring, or preventing unauthorized access, but they do not provide the same level of control and verification as an access control vestibule

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

A.
Manage the fileshare from an RDP session.
A.
Manage the fileshare from an RDP session.
Answers
B.
Audit the permissions of the fileshare.
B.
Audit the permissions of the fileshare.
Answers
C.
Audit the access to the physical fileshare.
C.
Audit the access to the physical fileshare.
Answers
D.
Manage the permissions from the fileshare.
D.
Manage the permissions from the fileshare.
Answers
Suggested answer: B

Explanation:

DLP, or Data Loss Prevention, is a type of security measure that aims to prevent unauthorized access, use, or transfer of sensitive dat a) DLP can be applied to various types of data, such as email, cloud storage, network traffic, or fileshares1. DLP for fileshares can help monitor and control who can access, modify, or share files on a network share2. By turning on DLP for the fileshare and letting it propagate for a week, the administrator can audit the permissions of the fileshare and see if there are any violations or anomalies in the access patterns. This can help the administrator identify and remediate any potential risks or compliance issues related to the fileshare2. The other options are incorrect because they are not directly related to DLP for fileshares. Managing the fileshare from an RDP session or from the fileshare itself are administrative tasks that do not require DLP. Auditing the access to the physical fileshare is a physical security measure that is not affected by DLP.

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

A.
Round robin
A.
Round robin
Answers
B.
SCP
B.
SCP
Answers
C.
MRU
C.
MRU
Answers
D.
Link aggregation
D.
Link aggregation
Answers
Suggested answer: C

Explanation:

MRU, or Most Recently Used, is a concept that refers to prioritizing a connection that had previously worked successfully. It is often used in load balancing algorithms to distribute the workload among multiple servers or paths. MRU assumes that the most recently used connection is the most likely to be available and efficient, and therefore assigns the next request to that connection. This can help reduce latency and improve performance12. The other options are incorrect because they do not refer to prioritizing a previous connection. Round robin is a concept that refers to distributing the workload equally among all available connections in a circular order12. SCP, or Secure Copy Protocol, is a concept that refers to transferring files securely between hosts using encryption3. Link aggregation is a concept that refers to combining multiple physical links into a single logical link to increase bandwidth and redundancy4.

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

A.
Differential
A.
Differential
Answers
B.
Incremental
B.
Incremental
Answers
C.
Synthetic full
C.
Synthetic full
Answers
D.
Snapshot
D.
Snapshot
Answers
Suggested answer: C

Explanation:

A synthetic full backup is a type of backup that copies changed data from a server and then combines the backups on the backup target. This way, the backup target always has a full backup of the server, without requiring a full backup to be performed over the network. A synthetic full backup reduces the network bandwidth and time required for backups, while also simplifying the restoration process1

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.
Add more memory.
A.
Add more memory.
Answers
B.
Check if the cache is turned on.
B.
Check if the cache is turned on.
Answers
C.
Install faster hard drives.
C.
Install faster hard drives.
Answers
D.
Enable link aggregation.
D.
Enable link aggregation.
Answers
Suggested answer: B

Explanation:

The cache is a temporary storage area that holds frequently accessed data or instructions for faster retrieval. The cache can improve the read times for accessing files by reducing the need to access the hard drive, which is slower than the cache memory1. Therefore, the first step the technician should take is to check if the cache is turned on for the new file server. If the cache is turned off, the technician should enable it and see if the read times improve. The other options are incorrect because they are not the first steps to take. Adding more memory, installing faster hard drives, or enabling link aggregation are possible ways to improve the performance of the file server, but they are more costly and time-consuming than checking the cache. Moreover, they may not address the root cause of the problem if the cache is turned off.

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

A.
Bollards
A.
Bollards
Answers
B.
Signal blocking
B.
Signal blocking
Answers
C.
Reflective glass
C.
Reflective glass
Answers
D.
Data center camouflage
D.
Data center camouflage
Answers
Suggested answer: C

Explanation:

Reflective glass is an architectural reinforcement that attempts to conceal the interior of an organization by reflecting light and preventing outsiders from seeing inside. Reflective glass can also reduce heat and glare, and enhance the aesthetic appearance of a building. Reflective glass is often used in high-security facilities, such as data centers, government buildings, or corporate headquarters12 1: Server Architecture for CompTIA Server+ (SK0-004) | Pluralsight 2: Introducing the CompTIA Infrastructure Career Pathway

Total 462 questions
Go to page: of 47