ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

A.
53
A.
53
Answers
B.
80
B.
80
Answers
C.
389
C.
389
Answers
D.
443
D.
443
Answers
E.
445
E.
445
Answers
F.
3389
F.
3389
Answers
G.
8080
G.
8080
Answers
Suggested answer: D, F

Explanation:

Port 443 is used for HTTPS, which is a secure version of HTTP that encrypts the data between the web server and the client. Port 3389 is used for RDP, which is a protocol that allows remote desktop connections to a server. These ports should be allowed for a secure web server that can be administered via RDP.

References:

CompTIA Server+ Certification Exam Objectives1, page 15

Common Ports Cheat Sheet: The Ultimate Ports & Protocols List2

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the following installation options should the administrator use?

A.
Bare metal
A.
Bare metal
Answers
B.
Headless
B.
Headless
Answers
C.
Virtualized
C.
Virtualized
Answers
D.
Slipstreamed
D.
Slipstreamed
Answers
Suggested answer: B

Explanation:

A headless installation is an installation method that does not require a graphical user interface (GUI) or a monitor, keyboard, and mouse. It can be done remotely through a network connection or a command-line interface. A headless installation is suitable for a server that has limited resources and does not need a GUI.

References:

CompTIA Server+ Certification Exam Objectives1, page 14

Server Management: Server Hardware Installation and Management2, Module 2, Lesson 5

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

A.
Virtual switch
A.
Virtual switch
Answers
B.
Host vs. guest
B.
Host vs. guest
Answers
C.
Overprovisioning
C.
Overprovisioning
Answers
D.
Scalability
D.
Scalability
Answers
Suggested answer: C

Explanation:

Overprovisioning is a situation where the allocated resources for a virtual machine exceed the available resources of the physical host. In this case, the storage allocated for Server 1 and Server 2 on VM01 is 8TB and 10TB respectively, which adds up to 18TB. However, the storage available on the VM01 host is only 16TB, which means there is a 2TB deficit. This can cause performance issues and errors for the virtual machines.

References:

CompTIA Server+ Certification Exam Objectives1, page 8

Server Management: Server Hardware Installation and Management, Module 2, Lesson 5

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

A.
Open file
A.
Open file
Answers
B.
Archive
B.
Archive
Answers
C.
Cloud
C.
Cloud
Answers
D.
Snapshot
D.
Snapshot
Answers
E.
Differential
E.
Differential
Answers
F.
Synthetic full
F.
Synthetic full
Answers
Suggested answer: B, E

Explanation:

Archive is a method of storing historical data that is not frequently accessed or modified. Archive can reduce the amount of data that needs to be backed up and save bandwidth and storage space. Differential is a method of backing up only the data that has changed since the last full backup. Differential can also save bandwidth and storage space, as well as speed up the backup process.

References:

CompTIA Server+ Certification Exam Objectives1, page 12

Server Management: Server Hardware Installation and Management2, Module 2, Lesson 5

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely configured?

A.
Delegation
A.
Delegation
Answers
B.
Role-based
B.
Role-based
Answers
C.
Rule-based
C.
Rule-based
Answers
D.
Scope-based
D.
Scope-based
Answers
Suggested answer: D

Explanation:

Scope-based authentication is a method of restricting access to resources based on the location, network, or device of the user. It can be used to prevent unauthorized access from outside the organization's network or from untrusted devices. In this case, the user can connect to the database server from the home office, which is likely within the scope of the authentication policy, but not from the hotel room, which is outside the scope.

References:

CompTIA Server+ Certification Exam Objectives1, page 15

CompTIA Server+: Authentication & Authorization2

Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.

Which of the following types of authentications is described in this scenario?

A.
MFA
A.
MFA
Answers
B.
NTLM
B.
NTLM
Answers
C.
Kerberos
C.
Kerberos
Answers
D.
SSO
D.
SSO
Answers
Suggested answer: D

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are corrupt and cannot be used. Which of the following would best describe what caused this issue?

A.
The databases were not backed up to be application consistent.
A.
The databases were not backed up to be application consistent.
Answers
B.
The databases were asynchronously replicated
B.
The databases were asynchronously replicated
Answers
C.
The databases were mirrored
C.
The databases were mirrored
Answers
D.
The database files were locked during the restoration process.
D.
The database files were locked during the restoration process.
Answers
Suggested answer: A

Explanation:

Application consistent backup is a method of backing up data that ensures the integrity and consistency of the application state. It involves notifying the application to flush its data from memory to disk and quiescing any write operations before taking a snapshot of the data. If the databases were not backed up to be application consistent, they might contain incomplete or corrupted data that cannot be restored properly.

References:

CompTIA Server+ Certification Exam Objectives1, page 12

What is Application Consistent Backup and How to Achieve It2

Application-Consistent Backups3

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.
Anti-malware
A.
Anti-malware
Answers
B.
Nbtstat
B.
Nbtstat
Answers
C.
Port scanner
C.
Port scanner
Answers
D.
Sniffer
D.
Sniffer
Answers
Suggested answer: D

Explanation:

Application consistent backup is a method of backing up data that ensures the integrity and consistency of the application state. It involves notifying the application to flush its data from memory to disk and quiescing any write operations before taking a snapshot of the data. If the databases were not backed up to be application consistent, they might contain incomplete or corrupted data that cannot be restored properly.

References:

CompTIA Server+ Certification Exam Objectives1, page 12

What is Application Consistent Backup and How to Achieve It2

Application-Consistent Backups3

A.
A site is considered a warm site when it:
A.
A site is considered a warm site when it:
Answers
B.
has basic technical facilities connected to it.
B.
has basic technical facilities connected to it.
Answers
C.
has faulty air conditioning that is awaiting service.
C.
has faulty air conditioning that is awaiting service.
Answers
D.
is almost ready to take over all operations from the primary site.
D.
is almost ready to take over all operations from the primary site.
Answers
E.
is fully operational and continuously providing services.
E.
is fully operational and continuously providing services.
Answers
Suggested answer: A

Explanation:

A warm site is a backup site that has some of the necessary hardware, software, and network resources to resume operations, but not all of them. A warm site requires some time and effort to become fully operational. A warm site is different from a cold site, which has minimal or no resources, and a hot site, which has all the resources and is ready to take over immediately.

References:CompTIA Server+ Study Guide, Chapter 10: Disaster Recovery, page 403.

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

A.
rive
A.
rive
Answers
B.
Database
B.
Database
Answers
C.
Folder
C.
Folder
Answers
D.
File
D.
File
Answers
Suggested answer: A

Explanation:

Drive encryption is a form of data-at-rest encryption that encrypts the entire hard drive or solid state drive. This means that all the data on the drive, including the operating system, applications, and files, are protected from unauthorized access. Drive encryption is usually implemented at the hardware or firmware level, and requires a password, PIN, or biometric authentication to unlock the drive. Drive encryption is the most comprehensive and secure way to achieve data-at-rest encryption, as it prevents anyone from accessing the data without the proper credentials, even if they physically remove the drive from the server.

References:CompTIA Server+ Study Guide, Chapter 9: Security, page 367.

Total 462 questions
Go to page: of 47