ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber, copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to narrow down the issue?

A.
Disk IOPS
A.
Disk IOPS
Answers
B.
CPU utilization
B.
CPU utilization
Answers
C.
RAM utilization
C.
RAM utilization
Answers
D.
Network latency
D.
Network latency
Answers
Suggested answer: D

Explanation:

Network latency is the measure of delay in data transmission over a network. It can affect the quality of voice over IP (VoIP) calls by causing echo, jitter, or distortion. Network latency can be caused by various factors such as network congestion, distance, routing, or bandwidth. To monitor network latency, you can use tools such as ping, traceroute, or network analyzers.

References:CompTIA Server+ Study Guide, Chapter 6: Networking, page 237.

Which of the following distributes a load across all interfaces?

A.
Link aggregation group
A.
Link aggregation group
Answers
B.
Most recently used algorithm
B.
Most recently used algorithm
Answers
C.
Active-passive configuration
C.
Active-passive configuration
Answers
D.
Failover
D.
Failover
Answers
Suggested answer: A

Explanation:

A link aggregation group (LAG) is a technique that combines multiple physical network interfaces into a single logical interface. This allows for the distribution of traffic across all the interfaces in the group, increasing bandwidth and redundancy. A LAG can use different modes to balance the load, such as address hashing, dynamic, or most recently used algorithm.

References:CompTIA Server+ Study Guide, Chapter 6: Networking, page 239.

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.
Cancelled change request
A.
Cancelled change request
Answers
B.
Change request postponement
B.
Change request postponement
Answers
C.
Emergency change request
C.
Emergency change request
Answers
D.
Privilege change request
D.
Privilege change request
Answers
E.
User permission change request
E.
User permission change request
Answers
Suggested answer: C

Explanation:

An emergency change request is a type of change request that is initiated in response to an urgent situation, such as a system breach, that requires immediate action to restore normal operations or prevent further damage. An emergency change request may bypass some of the normal change management procedures, such as approval, testing, or documentation, in order to expedite the implementation of the change. However, an emergency change request should still follow the basic steps of change management, such as identification, analysis, planning, execution, and evaluation, and should be reviewed and documented after the change is completed.

References:CompTIA Server+ Study Guide, Chapter 11: Change Management, page 443.

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.
Load balancing
A.
Load balancing
Answers
B.
Direct access
B.
Direct access
Answers
C.
Overprovisioning
C.
Overprovisioning
Answers
D.
Network teaming
D.
Network teaming
Answers
Suggested answer: A

Explanation:

Load balancing is a concept that distributes the workload across multiple servers or other resources to optimize performance, availability, and scalability. Load balancing can be implemented at different layers of the network, such as the application layer, the transport layer, or the network layer. Load balancing can use various algorithms or methods to determine how to distribute the traffic, such as round robin, least connections, or weighted distribution.

References:CompTIA Server+ Study Guide, Chapter 6: Networking, page 241.

After a technician upgrades the firmware on a database server that is connected to two external storage arrays, the server prompts the technician to configure RAID. The technician knows the server had several configured RAID sets and thinks the firmware upgrade cleared the RAID configurations. Which of the following should the technician do to troubleshoot this issue?

A.
Power cycle the storage arrays and rescan RAID on the server.
A.
Power cycle the storage arrays and rescan RAID on the server.
Answers
B.
Boot the OS into recovery mode and rescan the disks.
B.
Boot the OS into recovery mode and rescan the disks.
Answers
C.
Restore the default RAID configuration and reboot.
C.
Restore the default RAID configuration and reboot.
Answers
D.
Perform a rescan on the server's RAID controller.
D.
Perform a rescan on the server's RAID controller.
Answers
Suggested answer: D

Explanation:

A rescan on the server's RAID controller is a possible troubleshooting step to detect the existing RAID configurations on the connected storage arrays. A firmware upgrade may cause the RAID controller to lose the RAID metadata or settings, and a rescan may restore them. A rescan is preferable to restoring the default RAID configuration, as the latter may erase the existing data on the arrays. Power cycling the storage arrays or booting the OS into recovery mode may not help if the RAID controller does not recognize the RAID sets.

References:CompTIA Server+ Study Guide, Chapter 7: Storage, page 287.

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

A.
Intrusion detection is blocking the port.
A.
Intrusion detection is blocking the port.
Answers
B.
The new application's DNS entry is incorrect.
B.
The new application's DNS entry is incorrect.
Answers
C.
The application should be changed to use port 443.
C.
The application should be changed to use port 443.
Answers
D.
The core switch has a network issue.
D.
The core switch has a network issue.
Answers
Suggested answer: B

Explanation:

A DNS entry is a record that maps a domain name to an IP address. If the DNS entry for the new application is incorrect, users will not be able to resolve the domain name to the correct IP address and port number. This will prevent them from accessing the application, even if the firewall rules allow port 8443. To fix this issue, the server administrator should verify and update the DNS entry for the new application.

References:CompTIA Server+ Study Guide, Chapter 6: Networking, page 230.

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

A.
Hot
A.
Hot
Answers
B.
Cold
B.
Cold
Answers
C.
Colocated
C.
Colocated
Answers
D.
Warm
D.
Warm
Answers
Suggested answer: B

Explanation:

A cold site is a backup facility with little or no hardware equipment installed. A cold site is the most cost-effective option among the three disaster recovery sites. However, due to the fact that a cold site doesn't have any pre-installed equipment, it takes a lot of time to properly set it up so as to fully resume business operations1.

References = 1: Disaster Recovery Sites Comparison: Which one to Choose? - NAKIVO(https://www.nakivo.com/blog/overview-disaster-recovery-sites/)

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

A.
VPN
A.
VPN
Answers
B.
TFTP
B.
TFTP
Answers
C.
SSH
C.
SSH
Answers
D.
HTTP
D.
HTTP
Answers
Suggested answer: B

Explanation:

TFTP (Trivial File Transfer Protocol) is a simple and lightweight protocol that can be used to transfer files over a network. TFTP is often used to upgrade firmware or software on network devices, such as routers, switches, or servers. TFTP can also be used to install a Type 1 hypervisor, such as VMware ESXi, on multiple hosts simultaneously12.

References = 1: How to Install VMware ESXi Type 1 Hypervisor - MatthewEaton.net(https://mattheweaton.net/posts/how-to-install-vmware-esxi-type-1-hypervisor/) 2: Explore Type 1 Hypervisors - Set Up Virtual Machines Using VirtualBox and vSphere - OpenClassrooms(https://openclassrooms.com/en/courses/7163136-set-up-virtual-machines-using-virtualbox-and-vsphere/7358546-explore-type-1-hypervisors)

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to accomplish this task?

A.
tracert
A.
tracert
Answers
B.
telnet
B.
telnet
Answers
C.
ipconfig
C.
ipconfig
Answers
D.
ping
D.
ping
Answers
Suggested answer: C

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.
Cancelled change request
A.
Cancelled change request
Answers
B.
Change request postponement
B.
Change request postponement
Answers
C.
Emergency change request
C.
Emergency change request
Answers
D.
Privilege change request
D.
Privilege change request
Answers
E.
User permission change request
E.
User permission change request
Answers
Suggested answer: C

Explanation:

An emergency change request is a type of change management activity that is used to address urgent issues that pose a significant risk to the organization, such as a system breach. An emergency change request requires immediate action and approval, and it may bypass some of the normal change management procedures, such as testing, documentation, or stakeholder communication12.

References = 1: Change Management Plans: A Definitive Guide - Indeed(https://www.indeed.com/career-advice/career-development/change-management-activities) 2: The 10 Best Change Management Activities - Connecteam(https://connecteam.com/top-10-change-management-activities/)

Total 462 questions
Go to page: of 47