ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

A.
25
A.
25
Answers
B.
53
B.
53
Answers
C.
443
C.
443
Answers
D.
3389
D.
3389
Answers
E.
8080
E.
8080
Answers
Suggested answer: C

Explanation:

HTTPS (Secure Web Traffic):Port 443 is the standard port for HTTPS, which is essential for encrypting communication between web browsers and a secure website. (CompTIA Server+ Objectives SK0-004: 4.1)

Why other options are not essential:

25 (SMTP):Used for email transmission

53 (DNS):Used for domain name resolution

**3389 (RDP): ** Used for remote desktop connections

**8080 (Alternate HTTP): ** Sometimes used for web servers, but not the standard secure port

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

A.
Deploying each server from a VM template
A.
Deploying each server from a VM template
Answers
B.
Using a kickstart file during installation
B.
Using a kickstart file during installation
Answers
C.
Configuring each server manually one at a time
C.
Configuring each server manually one at a time
Answers
D.
Copying/pasting configuration commands into each server through SSH sessions
D.
Copying/pasting configuration commands into each server through SSH sessions
Answers
E.
Configuring a single server and then creating clones of it
E.
Configuring a single server and then creating clones of it
Answers
Suggested answer: B

Explanation:

Kickstart Files (Linux):Kickstart files are configuration files that automate the Linux installation process. They contain pre-determined answers to installation prompts, allowing for identical and rapid deployment of multiple systems. (CompTIA Server+ Objectives SK0-004: 3.1, Red Hat documentation on Kickstart:https://access.redhat.com/documentation/)

Why other options are less ideal:

VM Template (A):Templates are useful for replicating the OS & some software, but might not capture all configurations.

Manual Configuration (C):Time-consuming and prone to errors when replicating across many servers.

Copy/Paste via SSH (D):Tedious, error-prone, and requires servers to be online before configuration.

Cloning (E):Can work but has version compatibility risks if the OS of the cloned server isn't identical to the new ones.


An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

A.
Labeling
A.
Labeling
Answers
B.
Serial number
B.
Serial number
Answers
C.
Warranty
C.
Warranty
Answers
D.
Asset tag
D.
Asset tag
Answers
Suggested answer: D

Explanation:

The most important piece of information needed by the legal department in the event that an employee does not return company-issued equipment is the asset tag. The asset tag is a unique identifier that is used to track assets throughout their lifecycle. It allows the company to keep precise records of the assets, monitor their location, and manage their overall inventory. In legal situations, the asset tag can be used to prove ownership and aid in the recovery process of the equipment. The serial number is also important, but it is the asset tag that ties the equipment directly to the company's asset management system and is therefore the most crucial for the legal department. Warranty and labeling information are less critical from a legal perspective when it comes to unreturned equipment.

Which of the following authentication types defines credentials as 'something you have'?

A.
Swipe pattern
A.
Swipe pattern
Answers
B.
PIN
B.
PIN
Answers
C.
Fingerprint
C.
Fingerprint
Answers
D.
Smart card
D.
Smart card
Answers
Suggested answer: D

Explanation:

The concept of authentication is rooted in the principle of verifying identity, which is commonly broken down into three categories: 'something you know' (like a password or PIN), 'something you have' (such as a smart card or a security token), and 'something you are' (biometric data, for example, fingerprints). The question asks for the authentication type defined by 'something you have.'

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.
Load balancing
A.
Load balancing
Answers
B.
Direct access
B.
Direct access
Answers
C.
Overprovisioning
C.
Overprovisioning
Answers
D.
Network teaming
D.
Network teaming
Answers
Suggested answer: A

Explanation:

Load balancing is a technique used to distribute workloads evenly across multiple servers, ensuring no single server is overwhelmed. This is especially important in environments where high availability and reliability are critical, such as when multiple servers are serving the same website. By doing so, load balancing improves the responsiveness and availability of applications or websites.

Load balancing refers to the process of distributing network or application traffic across multiple servers to ensure no single server becomes overwhelmed, thereby improving responsiveness and availability of applications or websites. In the scenario described, where four servers are set up to each serve the same website, the concept of load balancing is applied. This setup aims to distribute incoming requests evenly among the servers to maximize speed and capacity utilization while ensuring no one server is overburdened, which can lead to improved overall performance of the website. Options B, C, and D do not accurately describe the scenario of distributing traffic for the same website across multiple servers.

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

A.
Robocopy
A.
Robocopy
Answers
B.
SCP
B.
SCP
Answers
C.
Drag and drop
C.
Drag and drop
Answers
D.
FTP
D.
FTP
Answers
Suggested answer: A

Explanation:

Robocopy (Robust File Copy) is a command-line tool in Windows that is designed for reliable copy or mirroring of files, and it can handle a broader range of file names and paths, including those that do not conform to traditional Windows file-naming standards. It's specifically designed to handle complex file copy demands and offers a wide range of options that can be tailored for different scenarios, which makes it suitable for the task mentioned. SCP (Secure Copy Protocol), Drag and Drop, and FTP (File Transfer Protocol) are all methods that can be used to copy files, but they might not handle non-standard Windows file names as well as Robocopy.

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

A.
Check the power cables
A.
Check the power cables
Answers
B.
Clean the fans.
B.
Clean the fans.
Answers
C.
Replace the RAM.
C.
Replace the RAM.
Answers
D.
Reattach the CPU heat sink
D.
Reattach the CPU heat sink
Answers
Suggested answer: A

Explanation:

In a situation where a server reboots randomly, the first step should be to check for any issues with the power supply. Random reboots can often be caused by intermittent power supply issues, which can be due to faulty power cables, loose connections, or problems with the power source itself. This is especially pertinent in environments like a paper mill where dust and debris might affect cable integrity. Since the issue occurs every other day and at random times, it's less likely to be caused by components that would typically fail due to overheating or other gradual issues (like RAM or CPU heat sink problems). Therefore, checking the power cables is the simplest and most direct first step to troubleshoot the issue.

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.
Use the keyboard command AH+F12 to switch to the kernel log screen
A.
Use the keyboard command AH+F12 to switch to the kernel log screen
Answers
B.
Perform a hard reboot on the server and monitor the server startup
B.
Perform a hard reboot on the server and monitor the server startup
Answers
C.
Collect a screenshot of the PSOD and note the details after the line detailing the OS version
C.
Collect a screenshot of the PSOD and note the details after the line detailing the OS version
Answers
D.
Collect a core dump from the server and store locally before rebooting the hardware
D.
Collect a core dump from the server and store locally before rebooting the hardware
Answers
Suggested answer: C

Explanation:

When a virtual server crashes and presents a Purple Screen of Death (PSOD), the immediate response should be to document the incident. Collecting a screenshot of the PSOD is crucial as it contains error codes and state information that can be used for diagnosing the root cause of the crash. Noting the details, especially those that come after the line detailing the OS version, can provide specific clues to what might have caused the server to crash. This is a standard best practice before rebooting the server, as it ensures that there is a record of the event to investigate and potentially prevent future occurrences. A hard reboot should only be done after this critical information has been recorded.

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options would minimize the amount of time the administrator needs to load the operating system on every machine?

A.
SD card
A.
SD card
Answers
B.
Optical
B.
Optical
Answers
C.
Network
C.
Network
Answers
D.
USB
D.
USB
Answers
Suggested answer: C

Explanation:

Using a network-based deployment, such as network booting (PXE - Preboot Execution Environment) or imaging through a server, is the most efficient way to load operating systems onto multiple machines simultaneously. This approach minimizes the manual intervention required for each device, as the administrator can initiate the operating system installation or imaging process across all desktops at once through the network. In contrast, using an SD card, DVD (Optical), or USB would require the administrator to physically move the media from one desktop to another, significantly increasing the setup time for each device.

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

A.
10.3.7.27
A.
10.3.7.27
Answers
B.
127.0.0.1
B.
127.0.0.1
Answers
C.
192.168.7.1
C.
192.168.7.1
Answers
D.
216.176.128.10
D.
216.176.128.10
Answers
Suggested answer: D

Explanation:

The IP address 216.176.128.10 falls within the range of public IP addresses, which are routable over the Internet. Since the company is using a public range of IP addresses internally, this address is suitable for the scenario. In contrast, 10.3.7.27 and 192.168.7.1 are private IP addresses typically used within internal networks and not routable on the public Internet. 127.0.0.1 is known as the loopback address, used by a computer to communicate with itself and not suitable for assigning to devices within a network.


Total 462 questions
Go to page: of 47