ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











A Linux server requires repetitive tasks for reconfiguration. Which of the following would be the best scripting language to use?

A.
PowerShell
A.
PowerShell
Answers
B.
Batch command file
B.
Batch command file
Answers
C.
Bash
C.
Bash
Answers
D.
Visual Basic
D.
Visual Basic
Answers
Suggested answer: C

Explanation:

Bash is a scripting language that is commonly used in Linux systems to automate tasks and manipulate text. Bash scripts can run commands, variables, functions, loops, and conditional statements. PowerShell is a scripting language that is mainly used in Windows systems, while batch command files are simple text files that contain a series of commands to be executed by the command-line interpreter. Visual Basic is a programming language that is used to create applications, not scripts. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 4.0: Server Administration, Objective 4.2: Given a scenario, perform proper server maintenance techniques.

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.
The server will gracefully shut down.
A.
The server will gracefully shut down.
Answers
B.
The server will immediately crash.
B.
The server will immediately crash.
Answers
C.
The server will operate but in read-only mode.
C.
The server will operate but in read-only mode.
Answers
D.
The server will continue to operate normally.
D.
The server will continue to operate normally.
Answers
Suggested answer: B

Explanation:

RAID 0 is a configuration that splits data evenly across two or more disks without parity or mirroring.

This improves performance but offers no fault tolerance. If a drive in a RAID 0 array fails, the data on the array becomes inaccessible and the server will immediately crash. The other options are not applicable to RAID 0. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 3.0:

Storage, Objective 3.2: Given a scenario, configure RAID using best practices.

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

A.
Increasing IOPS by implementing flash storage
A.
Increasing IOPS by implementing flash storage
Answers
B.
Implementing deduplication on the storage
B.
Implementing deduplication on the storage
Answers
C.
Extending capacity by installing a 4TB SATA disk
C.
Extending capacity by installing a 4TB SATA disk
Answers
D.
Reformatting the disk as FAT32
D.
Reformatting the disk as FAT32
Answers
Suggested answer: A

Explanation:

Increasing IOPS (input/output operations per second) by implementing flash storage is the most likely solution to resolve a slowdown issue in the storage subsystem of a database server. Flash storage uses solid-state drives (SSDs) that have faster read/write speeds and lower latency than traditional hard disk drives (HDDs). This can improve the performance of database queries and transactions. Implementing deduplication, extending capacity, or reformatting the disk as FAT32 are not likely to resolve the issue, as they do not affect the IOPS of the storage subsystem. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 3.0: Storage, Objective 3.5: Summarize hardware and features of various storage technologies.

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

A.
Document the findings and actions.
A.
Document the findings and actions.
Answers
B.
Escalate the issue to the management team.
B.
Escalate the issue to the management team.
Answers
C.
Implement the solution.
C.
Implement the solution.
Answers
D.
Establish an action plan.
D.
Establish an action plan.
Answers
Suggested answer: D

Explanation:

The next step to troubleshoot the issue after developing and testing a theory is to establish an action plan. This involves identifying the steps needed to implement the solution, estimating the time and resources required, and evaluating the potential risks and impacts of the solution. Documenting the findings and actions, escalating the issue to the management team, or implementing the solution are steps that should be done after establishing an action plan. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 6.0: Disaster Recovery, Objective 6.2: Explain troubleshooting theory and methodologies.

Which of the following security risks provides unauthorized access to an application?

A.
Backdoor
A.
Backdoor
Answers
B.
Data corruption
B.
Data corruption
Answers
C.
Insider threat
C.
Insider threat
Answers
D.
Social engineering
D.
Social engineering
Answers
Suggested answer: A

Explanation:

A backdoor is a security risk that provides unauthorized access to an application. A backdoor is a hidden or undocumented way of bypassing the normal authentication or encryption mechanisms of an application, allowing an attacker to gain remote access, execute commands, or steal data. A backdoor can be created intentionally by the developer, maliciously by an attacker, or unintentionally by a programming error. Reference: CompTIA Server+ Certification Exam Objectives, Domain 5.0: Security, Objective 5.2: Given a scenario, apply logical access control methods.

Which of the following actions should the server administrator perform on the server?

A.
Close ports 69 and 1010 and rerun the scan.
A.
Close ports 69 and 1010 and rerun the scan.
Answers
B.
Close ports 80 and 443 and rerun the scan.
B.
Close ports 80 and 443 and rerun the scan.
Answers
C.
Close port 3389 and rerun the scan.
C.
Close port 3389 and rerun the scan.
Answers
D.
Close all ports and rerun the scan.
D.
Close all ports and rerun the scan.
Answers
Suggested answer: C

Explanation:

The server administrator should close port 3389 and rerun the scan. Port 3389 is used for Remote Desktop Protocol (RDP), which allows remote access and control of a server. RDP is vulnerable to brute-force attacks, credential theft, and malware infection. Closing port 3389 can prevent unauthorized access and improve the security of the server. The other ports are not as risky as port 3389 and can be left open for legitimate purposes. Reference: CompTIA Server+ Certification Exam Objectives, Domain 5.0: Security, Objective 5.4: Given a scenario, implement proper environmental controls and techniques.

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

A.
Fencing
A.
Fencing
Answers
B.
Bollards
B.
Bollards
Answers
C.
Camouflage
C.
Camouflage
Answers
D.
Reflective glass
D.
Reflective glass
Answers
Suggested answer: C

Explanation:

Camouflage is an architectural reinforcement that is used to attempt to conceal the exterior of an organization. Camouflage is a technique of blending in with the surroundings or disguising the appearance of a building or facility to make it less noticeable or identifiable. Camouflage can reduce the visibility and attractiveness of a target for potential attackers or intruders. Reference: CompTIA Server+ Certification Exam Objectives, Domain 5.0: Security, Objective 5.1: Given a scenario, apply physical security methods to a server.

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

A.
Telnet
A.
Telnet
Answers
B.
SSH
B.
SSH
Answers
C.
TFTP
C.
TFTP
Answers
D.
rlogin
D.
rlogin
Answers
Suggested answer: B

Explanation:

SSH (Secure Shell) is a protocol that would most likely be implemented to encrypt data in transit for remote administration. SSH provides secure communication between two devices over an unsecured network by using public-key cryptography and symmetric encryption. SSH can be used to remotely execute commands, transfer files, or tunnel other protocols. Telnet, TFTP, and rlogin are protocols that do not encrypt data in transit and are considered insecure for remote administration. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 2.0: Networking, Objective 2.4: Given a scenario involving network security/access methods, implement an appropriate solution.

Which of the following attacks is the most difficult to mitigate with technology?

A.
Ransomware
A.
Ransomware
Answers
B.
Backdoor
B.
Backdoor
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: D

Explanation:

Phishing is a type of attack that is the most difficult to mitigate with technology. Phishing is a technique of deceiving users into revealing their personal or confidential information, such as passwords, credit card numbers, or bank accounts, by sending them fraudulent emails or messages that appear to be from legitimate sources. Phishing relies on human factors, such as curiosity, greed, or fear, to trick users into clicking on malicious links or attachments, or entering their credentials on fake websites. Technology solutions, such as antivirus software, firewalls, or spam filters, can help detect and block some phishing attempts, but they cannot prevent users from falling victim to social engineering tactics. Reference: [CompTIA Server+ Certification Exam Objectives], Domain 5.0: Security, Objective 5.3: Given a scenario, explain methods and techniques to secure data.

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

A.
SaaS
A.
SaaS
Answers
B.
Private
B.
Private
Answers
C.
Public
C.
Public
Answers
D.
Hybrid
D.
Hybrid
Answers
Suggested answer: C

Explanation:

A public cloud model will most likely meet the need of eliminating all company-owned data centers. A public cloud is a type of cloud computing service that is provided by a third-party vendor over the internet. A public cloud offers scalability, flexibility, and cost-effectiveness for hosting servers and applications, as the customers only pay for the resources they use and do not have to maintain their own infrastructure. A public cloud can also provide high availability, security, and performance for the servers and applications, as the vendor manages the underlying hardware and software. A public cloud can support various types of services, such as software as a service (SaaS), platform as a service (PaaS), or infrastructure as a service (IaaS). Reference: [CompTIA Server+ Certification Exam Objectives], Domain 1.0: Server Administration, Objective 1.2: Given a scenario, compare and contrast server roles and requirements for each.

Total 462 questions
Go to page: of 47