ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which of the following will correctly map a script to a home directory for a user based on username?

\\server\users$\username
\\server\users$\username
\\server\%username%
\\server\%username%
\\server\FirstInitialLastName
\\server\FirstInitialLastName
\\server\$username$
\\server\$username$
Suggested answer: B
Explanation:

The administrator should use \server%username% to correctly map a script to a home directory for a user based on username. %username% is an environment variable that represents the current user’s name on a Windows system. By using this variable in the path of the script, the administrator can dynamically map the script to the user’s home directory on the server. For example, if the user’s name is John, the script will be mapped to \server\John.

Reference:

https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9- 08280a1ef25a/ mapping-home-directory-with-username-variable?forum=w7itprogeneral

asked 02/10/2024
CCF AG Alexander Seidler
37 questions

Question 22

Report Export Collapse

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Faulty memory
Faulty memory
Data partition error
Data partition error
Incorrectly seated memory
Incorrectly seated memory
Incompatible disk speed
Incompatible disk speed
Uninitialized disk
Uninitialized disk
Overallocated memory
Overallocated memory
Suggested answer: A, C
Explanation:

Faulty memory and incorrectly seated memory are likely causes of the random BSOD conditions on the server. Memory is one of the most common hardware components that can cause BSOD (Blue Screen of Death) errors on Windows systems. BSOD errors occur when the system encounters a fatal error that prevents it from continuing to operate normally. Memory errors can be caused by faulty or incompatible memory modules that have physical defects or manufacturing flaws. Memory errors can also be caused by incorrectly seated memory modules that are not properly inserted or locked into the memory slots on the motherboard. This can result in loose or poor connections between the memory modules and the motherboard.

asked 02/10/2024
Faqeer Ali
44 questions

Question 23

Report Export Collapse

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

PKI
PKI
SSL
SSL
LDAP
LDAP
DNS
DNS
Suggested answer: B
Explanation:

The administrator needs to install SSL to make the website trusted. SSL stands for Secure Sockets Layer, which is an encryption-based Internet security protocol that ensures privacy, authentication, and data integrity in web communications. SSL enables HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP (Hypertext Transfer Protocol) that encrypts the data exchanged between a web browser and a web server. SSL also uses digital certificates to verify the identity of the web server and establish trust with the web browser. A web server that implements SSL has HTTPS in its URL instead of HTTP and displays a padlock icon or a green bar in the browser’s address bar.

asked 02/10/2024
Mattie Hendricks
50 questions

Question 24

Report Export Collapse

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do

NEXT to install the firmware?

Press F8 to enter safe mode
Press F8 to enter safe mode
Boot from the media
Boot from the media
Enable HIDS on the server
Enable HIDS on the server
Log in with an administrative account
Log in with an administrative account
Suggested answer: B
Explanation:

The technician should boot from the media to install the firmware on the server. Firmware is a type of software that controls the low-level functions of hardware devices, such as BIOS (Basic Input/Output System), RAID controllers, network cards, etc. Firmware updates are often provided by hardware manufacturers to fix bugs, improve performance, or add new features to their devices. To install firmware updates on a server, the technician needs to boot from a media device (such as a CDROM, DVD-ROM, USB flash drive, etc.) that contains the firmware files and installation program. The technician cannot install firmware updates from within the operating system because firmware updates often require restarting or resetting the hardware devices.

asked 02/10/2024
ISRAEL PEREZ GARCIA
40 questions

Question 25

Report Export Collapse

A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?

echo /newdisk >> /etc/fstab
echo /newdisk >> /etc/fstab
net use /newdisk
net use /newdisk
mount –o remount, rw /newdisk
mount –o remount, rw /newdisk
mount –a
mount –a
Suggested answer: C
Explanation:

The administrator should use the command mount –o remount,rw /newdisk to successfully mount the drive with the required parameters. The mount command is used to mount file systems on Linux systems. The –o option specifies options for mounting file systems. The remount option re-mounts an already mounted file system with different options. The rw option mounts a file system with readwrite permissions. In this case, /newdisk is a mount point for a new hard disk that was mounted with read-only permissions by default. To allow users to create directories or files on /newdisk, the administrator needs to re-mount /

Reference:

https://unix.stackexchange.com/

asked 02/10/2024
Rehan Malik
54 questions

Question 26

Report Export Collapse

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Encrypt the data that is leaving the SAN
Encrypt the data that is leaving the SAN
Encrypt the data at rest
Encrypt the data at rest
Encrypt the host servers
Encrypt the host servers
Encrypt all the network traffic
Encrypt all the network traffic
Suggested answer: B
asked 02/10/2024
Amir Trujillo
41 questions

Question 27

Report Export Collapse

Which of the following BEST describes the concept of right to downgrade?

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
It allows a previous version of an OS to be installed and covered by the same license as the newer version
It allows a previous version of an OS to be installed and covered by the same license as the newer version
Suggested answer: D
Explanation:

The concept of right to downgrade allows a previous version of an OS to be installed and covered by the same license as the newer version. For example, if a customer has a license for Windows 10 Pro, they can choose to install Windows 8.1 Pro or Windows 7 Professional instead and still be compliant with the license terms. Downgrade rights are granted by Microsoft for certain products and programs, such as Windows and Windows Server software acquired through Commercial Licensing, OEM, or retail channels. Downgrade rights are intended to provide customers with flexibility and compatibility when using Microsoft software.

asked 02/10/2024
David Powell
34 questions

Question 28

Report Export Collapse

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

21
21
Most voted
(1)
Most voted
22
22
23
23
53
53
443
443
636
636
Suggested answer: D
Explanation:

The administrator should only allow secure traffic and DNS inquiries on the server, which means that only ports 22, 53, and 443 should be open. Port 22 is used for SSH (Secure Shell), which is a protocol that allows secure remote login and command execution over a network connection using a command-line interface (CLI). Port 53 is used for DNS (Domain Name System), which is a service that translates domain names into IP addresses and vice versa. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP that encrypts the data exchanged between a web browser and a web server.

Reference: https://tools.cisco.com/security/center/resources/dns_best_practices

asked 02/10/2024
Soumia Djenan
33 questions

Question 29

Report Export Collapse

Which of the following open ports should be closed to secure the server properly? (Choose two.)

21
21
22
22
23
23
53
53
443
443
636
636
Suggested answer: A, C
Explanation:

The administrator should close ports 21 and 23 to secure the server properly. Port 21 is used for FTP (File Transfer Protocol), which is an unsecure protocol that allows file transfer between a client and a server over a network connection. FTP does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers. Port 23 is used for Telnet, which is an unsecure protocol that allows remote login and command execution over a network connection using a CLI. Telnet does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers.

Reference:

https://www.csoonline.com/article/3191531/securing-risky-network-ports.html

asked 02/10/2024
Inkisar Malik
44 questions

Question 30

Report Export Collapse

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Encrypt the data that is leaving the SAN
Encrypt the data that is leaving the SAN
Encrypt the data at rest
Encrypt the data at rest
Encrypt the host servers
Encrypt the host servers
Encrypt all the network traffic
Encrypt all the network traffic
Suggested answer: B
Explanation:

The administrator must encrypt the data at rest to ensure data on the SAN is not compromised if it is leaked. Data at rest refers to data that is stored on a device or a medium, such as a hard drive, a flash drive, or a SAN (Storage Area Network). Data at rest can be leaked if the device or the medium is lost, stolen, or accessed by unauthorized parties. Encrypting data at rest means applying an algorithm that transforms the data into an unreadable format that can only be decrypted with a key. Encryption protects data at rest from being exposed or misused by attackers who may obtain the device or the medium.

asked 02/10/2024
hotthefish shark
39 questions
Total 530 questions
Go to page: of 53
Search

Related questions