ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?

A.
Variable
A.
Variable
Answers
B.
Loop
B.
Loop
Answers
C.
Comparator
C.
Comparator
Answers
D.
Conditional
D.
Conditional
Answers
Suggested answer: B

Explanation:

A loop is a script construct that allows the script to repeat a block of code until a certain condition is met or for a specified number of times. A loop can be used to apply a test to each file in a directory and move the files that meet the criteria. For example, in a bash script, a loop can be written as:

#!/bin/bash

# Ask the user for the date

echo "Enter the date (YYYY-MM-DD):"

read date

# Loop through all the files in the current directory

for file in *

do

# Check if the file was created before the date

if [[ $(date -r "$file" +%F) < $date ]]

then

# Move the file to another location

mv "$file" /path/to/destination

fi

done

Copy

A variable is a script construct that allows the script to store and manipulate data. A variable can be used to store the date input by the user, but it cannot apply a test to each file1

A comparator is a script construct that allows the script to compare two values and determine their relationship. A comparator can be used to check if a file was created before the date, but it cannot repeat the test for all files1

A conditional is a script construct that allows the script to execute different blocks of code based on certain conditions. A conditional can be used to decide whether to move a file or not, but it cannot iterate over all files1

1: CompTIA Server+ Certification Exam Objectives

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

A.
Usage
A.
Usage
Answers
B.
End-of-life
B.
End-of-life
Answers
C.
Procurement
C.
Procurement
Answers
D.
Disposal
D.
Disposal
Answers
Suggested answer: D

Explanation:

Disposal is the part of the asset life cycle that can cause the greatest number of issues in relation to PII exposure. PII stands for personally identifiable information, which is any data that can be used to identify a specific individual, such as name, address, phone number, email, social security number, etc. PII exposure is the unauthorized access or disclosure of PII, which can result in identity theft, fraud, or other harms to the individuals whose data is compromised. Disposal is the process of getting rid of an asset that is no longer needed or useful, such as a server, a hard drive, or a mobile device. If the disposal is not done properly, the PII stored on the asset may still be accessible or recoverable by unauthorized parties, such as hackers, thieves, or competitors. Therefore, it is important to follow best practices for secure disposal of assets that contain PII, such as wiping, encrypting, shredding, or physically destroying the data storage media

Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?

A.
Humidity control system
A.
Humidity control system
Answers
B.
Sensors
B.
Sensors
Answers
C.
Fire suppression
C.
Fire suppression
Answers
D.
Heating system
D.
Heating system
Answers
Suggested answer: C

Explanation:

Fire suppression systems are designed to extinguish or contain fires in a server room, but they can also damage the server equipment if they are not carefully researched and selected. For example, water-based fire suppression systems can cause electrical shorts and corrosion, while gas-based fire suppression systems can create thermal shock and reduce oxygen levels. Therefore, fire suppression systems must be compatible with the server environment and equipment.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 1, Lesson 1.5, Objective 1.5

An administrator needs to reconfigure a teamed network connection on a server in a remote data center. Which of the following will offer the most resilient connection while performing this change?

A.
Use of an 00B solution
A.
Use of an 00B solution
Answers
B.
Use of a crash cart
B.
Use of a crash cart
Answers
C.
Use of a VNC console
C.
Use of a VNC console
Answers
D.
Use of an RDP console
D.
Use of an RDP console
Answers
Suggested answer: A

Explanation:

An out-of-band (OOB) solution is a method of accessing and managing a server remotely without using the network connection or the operating system of the server. An OOB solution can use a dedicated management port, a serial console, or a KVM switch to provide a resilient connection while performing changes to the network configuration of the server. An OOB solution is more reliable than a VNC or RDP console, which depend on the network and the operating system, and more convenient than a crash cart, which requires physical access to the server.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 2, Lesson 2.3, Objective 2.3

A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?

A.
Necessary dependencies were installed for multiple architectures.
A.
Necessary dependencies were installed for multiple architectures.
Answers
B.
There is not enough hard drive space.
B.
There is not enough hard drive space.
Answers
C.
The server is infected with a virus.
C.
The server is infected with a virus.
Answers
D.
Some modules are not compatible.
D.
Some modules are not compatible.
Answers
Suggested answer: D

Explanation:

A kernel upgrade is a process of updating the core component of a Linux operating system that manages the hardware, memory, processes, and drivers. A kernel upgrade can improve the performance, security, and compatibility of the system, but it can also introduce errors if some modules are not compatible with the new kernel version. Modules are pieces of code that can be loaded and unloaded into the kernel to provide additional functionality or support for specific devices. If a module is not compatible with the kernel, it can cause crashes or instability.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 4, Lesson 4.2, Objective 4.2

A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen.

Which of the following is the next step the administrator should take to diagnose the error without opening the machine?

A.
Perform a cold reboot.
A.
Perform a cold reboot.
Answers
B.
Listen for POST code beeps.
B.
Listen for POST code beeps.
Answers
C.
Call technical support.
C.
Call technical support.
Answers
D.
Check the monitor connection.
D.
Check the monitor connection.
Answers
Suggested answer: B

Explanation:

A power-on self-test (POST) is a diagnostic process that runs when a server is turned on to check the basic functionality of the hardware components and report any errors or faults. A POST code is a series of beeps or flashes that indicate the status of the POST process and identify any problems that prevent the server from booting up. A POST code can be heard through a speaker or seen on a display attached to the server motherboard. A POST code is useful for diagnosing errors without opening the machine or using any software tools.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 5, Lesson 5.1, Objective 5.1

A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?

A.
A virtual router
A.
A virtual router
Answers
B.
A host NIC
B.
A host NIC
Answers
C.
A VPN
C.
A VPN
Answers
D.
A virtual switch
D.
A virtual switch
Answers
E.
A vNlC
E.
A vNlC
Answers
Suggested answer: D

Explanation:

The correct answer is D. A virtual switch.

A virtual switch is a software-based network device that connects the virtual machines (VMs) in a virtual environment and allows them to communicate with each other and with the physical network. A virtual switch can also create and manage virtual LANs (VLANs), which are logical segments of a network that separate the traffic of different VMs or groups of VMs. A VLAN needs a DHCP server to assign IP addresses to the VMs that belong to it. A virtual switch can act as a DHCP relay agent and forward the DHCP requests from the VMs to the DHCP server on the physical network. This way, the VMs can receive correct IP addresses for their VLANs123

A virtual router is a software-based network device that routes packets between different networks or subnets. A virtual router can also create and manage VLANs, but it is not necessary for a VM to receive a correct IP address. A virtual router can be used to provide additional security, redundancy, or load balancing for the VMs12

A host NIC is a physical network interface card that connects the host machine to the physical network. A host NIC can also support VLAN tagging, which allows the host machine to communicate with different VLANs on the network. However, a host NIC alone cannot ensure that a VM receives a correct IP address for its VLAN. The host NIC needs to be connected to a virtual switch that can relay the DHCP requests from the VMs to the DHCP server12

A VPN is a virtual private network that creates a secure tunnel between two or more devices over the internet. A VPN can be used to encrypt and protect the data traffic of the VMs, but it is not related to the configuration of VLANs or IP addresses. A VPN does not affect how a VM receives a correct IP address for its VLAN14

A vNIC is a virtual network interface card that connects a VM to a virtual switch or a virtual router. A vNIC can also support VLAN tagging, which allows the VM to communicate with different VLANs on the network. However, a vNIC alone cannot ensure that a VM receives a correct IP address for its VLAN. The vNIC needs to be connected to a virtual switch or a virtual router that can relay the DHCP requests from the VMs to the DHCP server12

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?

A.
Lockout
A.
Lockout
Answers
B.
Length
B.
Length
Answers
C.
Complexity
C.
Complexity
Answers
D.
Minimum age
D.
Minimum age
Answers
Suggested answer: B

Explanation:

Password length is the first password policy that the administrator should implement to help mitigate the chance of a successful brute-force attack. A brute-force attack is a method of guessing passwords by trying all possible combinations of characters until the correct one is found. The longer the password, the more combinations there are, and the more time and resources it takes to crack it. Therefore, password length is a key factor in password strength and security.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 3, Lesson 3.2, Objective 3.2

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

A.
The disk uses GPT.
A.
The disk uses GPT.
Answers
B.
The partition is formatted with ext4.
B.
The partition is formatted with ext4.
Answers
C.
The partition is formatted with FAT32.
C.
The partition is formatted with FAT32.
Answers
D.
The disk uses MBR.
D.
The disk uses MBR.
Answers
Suggested answer: A

Explanation:

The most likely cause of the issue is that the disk uses GPT. GPT stands for GUID Partition Table, which is a newer standard for disk partitioning that supports larger disks and more partitions than the older MBR (Master Boot Record) standard1. However, GPT is not compatible with some older operating systems, such as Windows XP or Windows Server 20032. Therefore, if the data drive was formatted with GPT on a new Windows server and then moved to an older Windows server, the older server may not be able to recognize the GPT partitions and access the data on the drive.

The partition being formatted with ext4, FAT32, or MBR are not likely causes of the issue. Ext4 is a file system that is commonly used on Linux-based systems, but it can also be read by Windows with some third-party software3. FAT32 is a file system that is widely compatible with most operating systems and devices, but it has some limitations such as a maximum file size of 4 GB and a maximum partition size of 8 TB4. MBR is not a file system, but a partitioning scheme that can support various file systems such as NTFS, FAT32, or exFAT5. However, MBR has some disadvantages compared to GPT, such as a maximum disk size of 2 TB and a maximum number of primary partitions of four1.

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

A.
The boot log
A.
The boot log
Answers
B.
The BIOS
B.
The BIOS
Answers
C.
The HCL
C.
The HCL
Answers
D.
The event log
D.
The event log
Answers
Suggested answer: C

Explanation:

The technician should check the hardware compatibility list (HCL) first to see if the new NIC is supported by the server's operating system. The HCL is a list of hardware devices that have been tested and verified to work with a specific operating system. If the NIC is not on the HCL, it means that there is no device driver available or compatible for it, and the NIC will not function properly.

Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 5, Lesson 5.2, Objective 5.2

Total 462 questions
Go to page: of 47