ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Which of the following will correctly map a script to a home directory for a user based on username?

A.
\\server\users$\username
A.
\\server\users$\username
Answers
B.
\\server\%username%
B.
\\server\%username%
Answers
C.
\\server\FirstInitialLastName
C.
\\server\FirstInitialLastName
Answers
D.
\\server\$username$
D.
\\server\$username$
Answers
Suggested answer: B

Explanation:

The administrator should use \server%username% to correctly map a script to a home directory for a user based on username. %username% is an environment variable that represents the current user’s name on a Windows system. By using this variable in the path of the script, the administrator can dynamically map the script to the user’s home directory on the server. For example, if the user’s name is John, the script will be mapped to \server\John.

Reference:

https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9- 08280a1ef25a/ mapping-home-directory-with-username-variable?forum=w7itprogeneral

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

A.
Faulty memory
A.
Faulty memory
Answers
B.
Data partition error
B.
Data partition error
Answers
C.
Incorrectly seated memory
C.
Incorrectly seated memory
Answers
D.
Incompatible disk speed
D.
Incompatible disk speed
Answers
E.
Uninitialized disk
E.
Uninitialized disk
Answers
F.
Overallocated memory
F.
Overallocated memory
Answers
Suggested answer: A, C

Explanation:

Faulty memory and incorrectly seated memory are likely causes of the random BSOD conditions on the server. Memory is one of the most common hardware components that can cause BSOD (Blue Screen of Death) errors on Windows systems. BSOD errors occur when the system encounters a fatal error that prevents it from continuing to operate normally. Memory errors can be caused by faulty or incompatible memory modules that have physical defects or manufacturing flaws. Memory errors can also be caused by incorrectly seated memory modules that are not properly inserted or locked into the memory slots on the motherboard. This can result in loose or poor connections between the memory modules and the motherboard.

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

A.
PKI
A.
PKI
Answers
B.
SSL
B.
SSL
Answers
C.
LDAP
C.
LDAP
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: B

Explanation:

The administrator needs to install SSL to make the website trusted. SSL stands for Secure Sockets Layer, which is an encryption-based Internet security protocol that ensures privacy, authentication, and data integrity in web communications. SSL enables HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP (Hypertext Transfer Protocol) that encrypts the data exchanged between a web browser and a web server. SSL also uses digital certificates to verify the identity of the web server and establish trust with the web browser. A web server that implements SSL has HTTPS in its URL instead of HTTP and displays a padlock icon or a green bar in the browser’s address bar.

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

A.
Press F8 to enter safe mode
A.
Press F8 to enter safe mode
Answers
B.
Boot from the media
B.
Boot from the media
Answers
C.
Enable HIDS on the server
C.
Enable HIDS on the server
Answers
D.
Log in with an administrative account
D.
Log in with an administrative account
Answers
Suggested answer: B

Explanation:

The technician should boot from the media to install the firmware on the server. Firmware is a type of software that controls the low-level functions of hardware devices, such as BIOS (Basic Input/Output System), RAID controllers, network cards, etc. Firmware updates are often provided by hardware manufacturers to fix bugs, improve performance, or add new features to their devices. To install firmware updates on a server, the technician needs to boot from a media device (such as a CDROM, DVD-ROM, USB flash drive, etc.) that contains the firmware files and installation program. The technician cannot install firmware updates from within the operating system because firmware updates often require restarting or resetting the hardware devices.

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?

A.
echo /newdisk >> /etc/fstab
A.
echo /newdisk >> /etc/fstab
Answers
B.
net use /newdisk
B.
net use /newdisk
Answers
C.
mount –o remount, rw /newdisk
C.
mount –o remount, rw /newdisk
Answers
D.
mount –a
D.
mount –a
Answers
Suggested answer: C

Explanation:

The administrator should use the command mount –o remount,rw /newdisk to successfully mount the drive with the required parameters. The mount command is used to mount file systems on Linux systems. The –o option specifies options for mounting file systems. The remount option re-mounts an already mounted file system with different options. The rw option mounts a file system with readwrite permissions. In this case, /newdisk is a mount point for a new hard disk that was mounted with read-only permissions by default. To allow users to create directories or files on /newdisk, the administrator needs to re-mount /

Reference:

https://unix.stackexchange.com/

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

A.
Encrypt the data that is leaving the SAN
A.
Encrypt the data that is leaving the SAN
Answers
B.
Encrypt the data at rest
B.
Encrypt the data at rest
Answers
C.
Encrypt the host servers
C.
Encrypt the host servers
Answers
D.
Encrypt all the network traffic
D.
Encrypt all the network traffic
Answers
Suggested answer: B

Which of the following BEST describes the concept of right to downgrade?

A.
It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
A.
It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
Answers
B.
It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
B.
It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
Answers
C.
It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
C.
It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
Answers
D.
It allows a previous version of an OS to be installed and covered by the same license as the newer version
D.
It allows a previous version of an OS to be installed and covered by the same license as the newer version
Answers
Suggested answer: D

Explanation:

The concept of right to downgrade allows a previous version of an OS to be installed and covered by the same license as the newer version. For example, if a customer has a license for Windows 10 Pro, they can choose to install Windows 8.1 Pro or Windows 7 Professional instead and still be compliant with the license terms. Downgrade rights are granted by Microsoft for certain products and programs, such as Windows and Windows Server software acquired through Commercial Licensing, OEM, or retail channels. Downgrade rights are intended to provide customers with flexibility and compatibility when using Microsoft software.

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

A.
21
A.
21
Answers
B.
22
B.
22
Answers
C.
23
C.
23
Answers
D.
53
D.
53
Answers
E.
443
E.
443
Answers
F.
636
F.
636
Answers
Suggested answer: D

Explanation:

The administrator should only allow secure traffic and DNS inquiries on the server, which means that only ports 22, 53, and 443 should be open. Port 22 is used for SSH (Secure Shell), which is a protocol that allows secure remote login and command execution over a network connection using a command-line interface (CLI). Port 53 is used for DNS (Domain Name System), which is a service that translates domain names into IP addresses and vice versa. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP that encrypts the data exchanged between a web browser and a web server.

Reference: https://tools.cisco.com/security/center/resources/dns_best_practices

Which of the following open ports should be closed to secure the server properly? (Choose two.)

A.
21
A.
21
Answers
B.
22
B.
22
Answers
C.
23
C.
23
Answers
D.
53
D.
53
Answers
E.
443
E.
443
Answers
F.
636
F.
636
Answers
Suggested answer: A, C

Explanation:

The administrator should close ports 21 and 23 to secure the server properly. Port 21 is used for FTP (File Transfer Protocol), which is an unsecure protocol that allows file transfer between a client and a server over a network connection. FTP does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers. Port 23 is used for Telnet, which is an unsecure protocol that allows remote login and command execution over a network connection using a CLI. Telnet does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers.

Reference:

https://www.csoonline.com/article/3191531/securing-risky-network-ports.html

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

A.
Encrypt the data that is leaving the SAN
A.
Encrypt the data that is leaving the SAN
Answers
B.
Encrypt the data at rest
B.
Encrypt the data at rest
Answers
C.
Encrypt the host servers
C.
Encrypt the host servers
Answers
D.
Encrypt all the network traffic
D.
Encrypt all the network traffic
Answers
Suggested answer: B

Explanation:

The administrator must encrypt the data at rest to ensure data on the SAN is not compromised if it is leaked. Data at rest refers to data that is stored on a device or a medium, such as a hard drive, a flash drive, or a SAN (Storage Area Network). Data at rest can be leaked if the device or the medium is lost, stolen, or accessed by unauthorized parties. Encrypting data at rest means applying an algorithm that transforms the data into an unreadable format that can only be decrypted with a key. Encryption protects data at rest from being exposed or misused by attackers who may obtain the device or the medium.

Total 462 questions
Go to page: of 47