ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











A technician replaces a single faulted disk in the following array RAID 10, Four 15K SAS HDD The technician replaces it from a disk in spare parts, and the array rebuilds the data in a few minutes. After the array rebuild is complete, the system reports the IOPS on the disk array have dropped by almost 60% Which of the following should the technician investigate first?

A.
Check the RAID controller (or background rebuild tasks
A.
Check the RAID controller (or background rebuild tasks
Answers
B.
Check the firmware version on the newly replaced disk.
B.
Check the firmware version on the newly replaced disk.
Answers
C.
Check the RPM speed on the newly replaced disk-
C.
Check the RPM speed on the newly replaced disk-
Answers
D.
Check the cache settings on the RAID controller.
D.
Check the cache settings on the RAID controller.
Answers
Suggested answer: C

Explanation:

In RAID 10 arrays, disk performance is crucial, especially if they are high-speed 15K RPM SAS HDDs, as each disk in the array is part of a mirrored pair that also stripes data with another pair. When replacing a disk, it's essential that the new disk matches the specifications of the others, especially in terms of rotational speed (RPM). If the replaced disk is slower, it can significantly reduce the Input/Output operations per second (IOPS) of the entire array. This is because all disks need to work in tandem, and the slowest disk can become a bottleneck. Thus, checking the RPM of the newly replaced disk is a sensible first step to ensure it matches the performance of the other disks in the array.

A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?

A.
MTBF
A.
MTBF
Answers
B.
RTO
B.
RTO
Answers
C.
MTTR
C.
MTTR
Answers
D.
RPO
D.
RPO
Answers
Suggested answer: B

Explanation:

Recovery Time Objective (RTO) refers to the target time set for the recovery of IT and business activities after a disaster has struck, which includes restoring server, network, and data access. The policy requirement mentioned in the question aligns with the definition of RTO, as it specifies the maximum allowable downtime or the time within which functionality must be restored. Mean Time Between Failures (MTBF) and Mean Time To Repair (MTTR) are metrics related to the reliability and repair times of systems but do not specifically pertain to disaster recovery time frames. Recovery Point Objective (RPO) describes the acceptable amount of data loss measured in time, not the restoration of operations.

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

A.
chown
A.
chown
Answers
B.
sestatus
B.
sestatus
Answers
C.
setenforce
C.
setenforce
Answers
D.
getenforce
D.
getenforce
Answers
E.
chmod
E.
chmod
Answers
Suggested answer: E

Explanation:

The given output in the image indicates that the file is present, but the permissions may not allow it to be read. The output indicates '-rw-------', which means that the file is set to be readable and writable by the owner only, with no permissions for group or others. To allow the file to be read by users other than the owner, the file's permissions will need to be changed. The chmod (change mode) command is used to change the file's permissions in Linux. For example, chmod 644 file would change the permissions of the file to be readable by everyone and writable by the owner, which is typically what's required for a file server. It is always recommended to apply the least permissive settings that still allow the required operation to maintain security.

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

A.
VM
A.
VM
Answers
B.
vNIC
B.
vNIC
Answers
C.
vSwitch
C.
vSwitch
Answers
D.
vCPU
D.
vCPU
Answers
E.
vHBA
E.
vHBA
Answers
Suggested answer: C

Explanation:

Uplink redundancy is a method used to ensure that if one physical network interface card (NIC) fails, the network connectivity for the virtual machines (VMs) does not go down. This is typically achieved by configuring multiple NICs to connect to a single virtual switch (vSwitch) and setting up NIC teaming or bonding. The vSwitch manages the internal network traffic between the VMs and the outside network by using the physical NICs assigned to it. By configuring the vSwitch with multiple NICs, you can create redundancy, so if one NIC fails, the other NICs can take over the traffic, ensuring continuous network connectivity.

A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).

A.
Floor load limitations
A.
Floor load limitations
Answers
B.
Rack balancing
B.
Rack balancing
Answers
C.
Proper lifting techniques
C.
Proper lifting techniques
Answers
D.
Power connector type
D.
Power connector type
Answers
E.
KVM placement
E.
KVM placement
Answers
F.
Cable management
F.
Cable management
Answers
G.
UPS power requirements
G.
UPS power requirements
Answers
H.
PDU installation
H.
PDU installation
Answers
I.
Separate circuits for power
I.
Separate circuits for power
Answers
Suggested answer: A, B, C

Explanation:

When configuring a server rack, it's important to consider:

A) Floor load limitations: Server racks can be extremely heavy, especially when filled with equipment like blade servers. It is crucial to ensure that the floor can handle the load to avoid structural damage or failure.

B) Rack balancing: Properly distributing the weight in a server rack is important for stability. Heavier equipment should generally be placed at the bottom to prevent the rack from becoming top-heavy and risking a tip-over.

C) Proper lifting techniques: Using correct lifting techniques when placing servers into a rack is vital to prevent personal injury.

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.
MTTR
A.
MTTR
Answers
B.
RTO
B.
RTO
Answers
C.
RPO
C.
RPO
Answers
D.
MTBF
D.
MTBF
Answers
Suggested answer: C

Explanation:

The Recovery Point Objective (RPO) refers to the maximum tolerable period in which data might be lost from an IT service due to a major incident. The policy mentioned in the question highlights that data loss exceeding one hour is unacceptable, directly relating to the RPO concept. RPO is critical in disaster recovery and business continuity planning, indicating the age of the files that must be recovered from backup storage for normal operations to resume without significant losses. MTTR (Mean Time To Repair), RTO (Recovery Time Objective), and MTBF (Mean Time Between Failures) are related concepts but do not specifically address the amount of data loss that can be tolerated.

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.
QSFP+
A.
QSFP+
Answers
B.
10 GigE
B.
10 GigE
Answers
C.
SFP
C.
SFP
Answers
D.
SFP+
D.
SFP+
Answers
Suggested answer: A

Explanation:

QSFP+ (Quad Small Form-factor Pluggable Plus) connectors are used in high-density, high-speed networking solutions such as 40 Gigabit Ethernet (40GbE) interfaces. When upgrading a server's network to 40Gbps, QSFP+ is the appropriate choice due to its capability to support such high-speed data transfer rates. 10 GigE, SFP, and SFP+ connectors are used for lower speed connections (10Gbps and below for SFP+ and 10 GigE, and even less for SFP), making them unsuitable for a 40Gbps network upgrade.

Which of the following should a technician verify first before decommissioning and wiping a file server?

A.
The media destruction method
A.
The media destruction method
Answers
B.
The recycling policy
B.
The recycling policy
Answers
C.
Asset management documentation
C.
Asset management documentation
Answers
D.
Document retention policy
D.
Document retention policy
Answers
Suggested answer: C

Explanation:

Before decommissioning and wiping a file server, it's crucial to verify the asset management documentation. This documentation provides detailed records of the server's lifecycle, including procurement, usage, maintenance, and decommissioning information. Ensuring that asset management documentation is up-to-date and accurate is essential before proceeding with the server's decommissioning to maintain proper inventory control, comply with regulatory and organizational policies, and facilitate any potential audits. While the media destruction method, recycling policy, and document retention policy are important considerations in the decommissioning process, verifying asset management documentation is the first step to ensure the server is correctly identified and accounted for in the organization's asset registry.

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user can save the updated file while maintaining least-privilege access?

A.
Give the user 'read and execute' rights to the file.
A.
Give the user 'read and execute' rights to the file.
Answers
B.
Give the user 'modify' rights to the file.
B.
Give the user 'modify' rights to the file.
Answers
C.
Give the user 'list folder contents' rights to the folder.
C.
Give the user 'list folder contents' rights to the folder.
Answers
D.
Give the user 'full control' rights to the folder.
D.
Give the user 'full control' rights to the folder.
Answers
Suggested answer: B

Explanation:

To enable a user to both read and write to a file, the administrator needs to provide 'modify' rights. This permission level allows the user not only to open and view the file (read) but also to make changes and save those changes back to the file (write). 'Read and execute' rights would allow the user to open and run the file but not make any changes. 'List folder contents' rights would enable the user to view the files within a folder but not make changes to them. 'Full control' rights would provide the user with complete control over the file, including the ability to change permissions and delete the file, which exceeds the principle of least-privilege access necessary for this task.

Which of the following supports virtualization?

A.

Type 1 hypervisor

A.

Type 1 hypervisor

Answers
B.

Bare-metal installation

B.

Bare-metal installation

Answers
C.

Server-level redundancy

C.

Server-level redundancy

Answers
D.

Active-active load balancing

D.

Active-active load balancing

Answers
Suggested answer: A

Explanation:

A Type 1 hypervisor (also known as a bare-metal hypervisor) is installed directly on the hardware and is designed to manage multiple virtual machines. It is the most common type of hypervisor used in virtualization environments.

Type 1 hypervisor (Answer A): This is a core technology that enables virtualization by running virtual machines directly on the physical hardware.

Bare-metal installation (Option B): Refers to installing an OS or hypervisor directly on hardware, but doesn't inherently support virtualization unless it's a hypervisor.

Server-level redundancy (Option C): This provides fault tolerance but is not related to virtualization.

Active-active load balancing (Option D): Refers to distributing workloads across multiple servers, not directly tied to virtualization.

CompTIA Server+

Reference:

This topic is covered under SK0-005 Objective 1.3: Explain virtualization concepts.

Total 462 questions
Go to page: of 47