ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to restore data from a backup. The technician has these files in the backup inventory:

Which of the following backup types is being used if the file 01062020.bak requires another file to restore data?

A.
Full
A.
Full
Answers
B.
Incremental
B.
Incremental
Answers
C.
Snapshot
C.
Snapshot
Answers
D.
Differential
D.
Differential
Answers
Suggested answer: B

Explanation:

An incremental backup only backs up files that have changed since the last backup, whether it was a full or an incremental backup. Therefore, an incremental backup file may require another file to restore data, depending on the sequence of backups. A full backup backs up all files and does not require any other file to restore dat a. A snapshot is a point-in-time copy of data that does not depend on other files. A differential backup backs up files that have changed since the last full backup and does not require any other file to restore data.

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

A.
Apply security updates.
A.
Apply security updates.
Answers
B.
Disable unneeded hardware.
B.
Disable unneeded hardware.
Answers
C.
Set a BIOS password.
C.
Set a BIOS password.
Answers
D.
Configure the boot order.
D.
Configure the boot order.
Answers
Suggested answer: A

Explanation:

Applying security updates is one of the common operating system hardening methods that can help protect the OS from cyberattacks and vulnerabilities. Security updates are released by the OS developer to fix bugs, patch security holes, and improve performance. By installing the latest updates, the server administrator can ensure that the OS is up to date and secure12.

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

A.
The jumbo frames are not enabled.
A.
The jumbo frames are not enabled.
Answers
B.
The subnet mask is incorrect.
B.
The subnet mask is incorrect.
Answers
C.
There is an IP address conflict.
C.
There is an IP address conflict.
Answers
D.
There is an improper DNS configuration.
D.
There is an improper DNS configuration.
Answers
Suggested answer: B

Explanation:

A subnet mask is a number that distinguishes the network address and the host address within an IP address1. A subnet mask allows network traffic to understand IP addresses by splitting them into the network and host addresses. If the subnet mask is incorrect, the network traffic may not be able to determine the correct destination for the packets, and only reach some of the servers that have similar IP addresses. For example, if the new virtual server has an IP address of 192.168.1.100 and a subnet mask of 255.255.0.0, it can only communicate with servers that have IP addresses in the range of 192.168.0.0 to 192.168.255.2552. To fix this issue, the systems administrator needs to check and correct the subnet mask of the new virtual server according to the network configuration.

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

A.
Rack balancing
A.
Rack balancing
Answers
B.
Cable management
B.
Cable management
Answers
C.
Blade enclosure
C.
Blade enclosure
Answers
D.
Rail kits
D.
Rail kits
Answers
Suggested answer: B

Explanation:

Cable management is the process of organizing, securing, and labeling cables in a server rack or cabinet. Cable management can help improve airflow and cooling, reduce clutter and confusion, prevent damage and interference, and enhance safety and aesthetics123. Cable management can be achieved by using various tools and accessories, such as cable trays, ties, hooks, clips, labels, ducts, and organizers12.

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected.

The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

A.
Linked list
A.
Linked list
Answers
B.
String
B.
String
Answers
C.
Loop
C.
Loop
Answers
D.
Constant
D.
Constant
Answers
Suggested answer: C

Explanation:

A loop is a programming construct that allows a block of code to be executed repeatedly until a certain condition is met1. A loop can be used to cycle through a list of servers and run a script on each one of them. For example, in Python, a loop can be written as:

Python This code is AI-generated. Review and use carefully. Visit our FAQ for more information.

Copy # Assume servers is a list of server names for server in servers:

# Run the script on the server run_script(server)

A loop can help automate the task of correcting the misconfiguration on all servers, saving time and effort.

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

A.
The read and write performance will be impacted.
A.
The read and write performance will be impacted.
Answers
B.
The read performance will be impacted.
B.
The read performance will be impacted.
Answers
C.
The performance will not be impacted.
C.
The performance will not be impacted.
Answers
D.
The write performance will be impacted.
D.
The write performance will be impacted.
Answers
Suggested answer: D

Explanation:

A RAID controller battery is used to protect the data in the cache memory of the controller in case of a power failure. The cache memory allows the controller to improve the write performance by buffering the data and writing it to the disk in an optimized way. However, if the battery fails, the controller will switch to write-through mode, which means it will write the data directly to the disk without caching. This will reduce the write performance and increase the latency of the system

A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?

A.
Consult internet forums to determine which is the most common cause and deploy only that solution.
A.
Consult internet forums to determine which is the most common cause and deploy only that solution.
Answers
B.
Test each solution individually to determine the root cause, rolling back the changes in between each test.
B.
Test each solution individually to determine the root cause, rolling back the changes in between each test.
Answers
C.
Implement the shortest solution first to identify the issue and minimize downtime.
C.
Implement the shortest solution first to identify the issue and minimize downtime.
Answers
D.
Test each solution in succession and restore the server from the latest snapshot.
D.
Test each solution in succession and restore the server from the latest snapshot.
Answers
Suggested answer: B

Explanation:

According to the CompTIA troubleshooting methodology, the fourth step is to establish a plan of action to resolve the problem and implement the solution1. The best practice is to test each solution individually to determine the root cause, rolling back the changes in between each test. This way, the technician can isolate the cause and avoid introducing new problems or making the situation worse.

Testing each solution in succession and restoring the server from the latest snapshot (D) is not a good option because it may not identify the root cause and may overwrite important dat a. Implementing the shortest solution first to identify the issue and minimize downtime й is also not a good option because it may not solve the problem or may create new issues. Consulting internet forums to determine which is the most common cause and deploy only that solution (A) is not a good option because it may not apply to the specific situation or may be outdated or inaccurate

An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:

The administrator has determined Ann cannot write anything to the DATA folder using the network.

Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: D

Explanation:

Option D is the best practice to set up Ann's permissions correctly, exposing only the minimum rights required. Option D shows that the share permissions on the DATA folder grant Ann Change access, which allows her to read, write, and delete files in the shared folder. The file permissions grant Ann Modify access, which allows her to read, write, execute, and delete files in the folder. This combination of permissions gives Ann the ability to write anything to the DATA folder using the network, as well as to modify and delete existing files. This meets the requirement of giving Ann modify permissions to the shared folder.

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.
End-of-life
A.
End-of-life
Answers
B.
Disposal
B.
Disposal
Answers
C.
Usage
C.
Usage
Answers
D.
Procurement
D.
Procurement
Answers
Suggested answer: A

Explanation:

End-of-life is the phase of lifecycle management that deals with a server that is no longer in operation. End-of-life means that the server has reached the end of its useful life and is no longer supported by the manufacturer or the service provider. End-of-life may also imply that the server is obsolete, incompatible, or inefficient for the current needs and standards1. End-of-life servers may be decommissioned, recycled, donated, or disposed of according to the organizational policies and environmental regulations

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

A.
Creating an exclusion to the antivirus for the application
A.
Creating an exclusion to the antivirus for the application
Answers
B.
Disabling real-time scanning by the antivirus
B.
Disabling real-time scanning by the antivirus
Answers
C.
Validating the checksum for the downloaded installation package
C.
Validating the checksum for the downloaded installation package
Answers
D.
Checking for corruption of the downloaded installation package
D.
Checking for corruption of the downloaded installation package
Answers
Suggested answer: C

Explanation:

A checksum is a value that is calculated from a data set to verify its integrity and authenticity. A checksum can be used to compare a downloaded installation package with the original source to ensure that the package has not been corrupted or tampered with during the download or transmission process. If the checksums match, then the package is safe to install. If the checksums do not match, then the package may be infected with malware or contain errors that could cause installation problems. Therefore, validating the checksum for the downloaded installation package is a necessary step before launching the installation again12 1: CompTIA Server+ Certification Exam Objectives 2: How to Verify File Integrity Using Checksums on Linux

Total 462 questions
Go to page: of 47