ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?

A.

Check the firewall rules.

A.

Check the firewall rules.

Answers
B.

Replace the CMOS battery in the server.

B.

Replace the CMOS battery in the server.

Answers
C.

Restart the time servers.

C.

Restart the time servers.

Answers
D.

Manually correct the time.

D.

Manually correct the time.

Answers
Suggested answer: D

Explanation:

The virtual server's time is incorrect despite proper configuration of internal time servers.

Resolution:The engineer shouldmanually correct the time(Option D):

If the internal time servers are configured correctly, manual adjustment is necessary.

Checking firewall rules would help identify NTP (Network Time Protocol) issues.

Replacing the CMOS battery is unlikely to be the cause of incorrect time.

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

A.

VMFS

Answers
B.

ZFS

B.

ZFS

Answers
C.

GPT

C.

GPT

Answers
D.

MBR

D.

MBR

Answers
E.

LVM

E.

LVM

Answers
Suggested answer: C

Explanation:

Scenario:Installing Windows on an 8TB drive, aiming for a single 8TB partition.

Solution:Use theGPT (GUID Partition Table)option (Option C):

GPT supports larger partitions (up to 18.4 million TB) compared to MBR (limited to 2TB).

VMFS, ZFS, and LVM are unrelated to the partitioning scheme in Windows.

Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?

A.

Bolting door lock

A.

Bolting door lock

Answers
B.

Combination door lock

B.

Combination door lock

Answers
C.

Electronic door lock

C.

Electronic door lock

Answers
D.

Biometric door lock

D.

Biometric door lock

Answers
Suggested answer: C

Explanation:

Lock Type:The type of lock utilizing key fobs or key cards is anelectronic door lock(Option C).

Electronic locks use electronic credentials (such as key cards) for access control.

Which of the following will protect critical data during a natural disaster?

A.

Off-site storage

A.

Off-site storage

Answers
B.

Life-cycle management

B.

Life-cycle management

Answers
C.

Environmental controls

C.

Environmental controls

Answers
D.

Data-at-rest encryption

D.

Data-at-rest encryption

Answers
Suggested answer: A

Explanation:

Off-site storage involves storing data backups in a physically separate location from where the servers and primary data reside. This protects critical data in case the main site is damaged or destroyed due to a natural disaster, such as floods, fires, or earthquakes. Off-site storage can be in the form of cloud storage or physical tapes stored in a geographically distant location.

Off-site storage (Answer A): It ensures that a company's critical data remains accessible even if the local infrastructure is compromised. This is a common part of disaster recovery planning and is crucial for business continuity.

Life-cycle management (Option B): While important for managing data from creation to deletion, it does not specifically protect data during disasters.

Environmental controls (Option C): These manage physical conditions like temperature and humidity but do not address the risk of data loss during disasters.

Data-at-rest encryption (Option D): Encryption protects the confidentiality of stored data but does not ensure availability in the event of a disaster.

A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?

A.

Enable an administrator account

A.

Enable an administrator account

Answers
B.

Enable a UEFI password

B.

Enable a UEFI password

Answers
C.

Disable WOL

C.

Disable WOL

Answers
D.

Enable encryption at rest

D.

Enable encryption at rest

Answers
Suggested answer: B

Explanation:

Enabling a UEFI (Unified Extensible Firmware Interface) password prevents unauthorized users from making changes to the server's hardware configuration settings, such as boot order or device settings. This is crucial for protecting the integrity of the server at a remote location where physical security might be more difficult to enforce.

UEFI password (Answer B): It provides security at the firmware level, preventing changes to low-level configurations unless the correct password is provided.

Administrator account (Option A): While important for OS-level access, it doesn't prevent someone with physical access from altering hardware settings via UEFI/BIOS.

Disabling WOL (Option C): Wake-on-LAN (WOL) allows a device to be powered on remotely. Disabling it can help with security but does not prevent hardware configuration changes.

Encryption at rest (Option D): Encryption protects data on the server but does not prevent hardware configuration access.

CompTIA Server+

Reference:

This topic is covered under SK0-005 Objective 2.1: Install and configure server operating systems.

An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?

A.

The user accounts are locked out

A.

The user accounts are locked out

Answers
B.

The NTP on the client side is misconfigured

B.

The NTP on the client side is misconfigured

Answers
C.

MFA is not working

C.

MFA is not working

Answers
D.

The wrong time zone was set in the remote office

D.

The wrong time zone was set in the remote office

Answers
Suggested answer: B

Explanation:

A misconfigured NTP (Network Time Protocol) on the client side can cause authentication issues because Active Directory relies on accurate time synchronization between clients and domain controllers for security purposes. If the clocks are out of sync, even by a few minutes, it can prevent users from authenticating to the domain.

NTP misconfiguration (Answer B): If the client machines have incorrect time settings, it can disrupt Kerberos-based authentication, which is time-sensitive.

Locked user accounts (Option A): While it can prevent login, it would affect individual users rather than a whole office.

MFA (Option C): Multi-factor authentication not working would typically cause a login issue but is less likely across an entire remote office.

Wrong time zone (Option D): While incorrect time zones can cause confusion, they usually don't prevent logins as long as the NTP server synchronizes the actual time correctly.

CompTIA Server+

Reference:

This topic is covered under SK0-005 Objective 2.4: Troubleshoot common server problems.

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

A.

Check the database server

A.

Check the database server

Answers
B.

Change the database password

B.

Change the database password

Answers
C.

Open port 3306 on the server

C.

Open port 3306 on the server

Answers
D.

Edit the network firewall rules

D.

Edit the network firewall rules

Answers
Suggested answer: D

Explanation:

Since port 3306 (MySQL) is open on the local workstation as confirmed by the Nmap scan, the next logical step is to check network firewall rules. It's possible that the workstation's firewall or network-level security rules are blocking outbound or inbound traffic on port 3306, which is required for database access.

Edit the network firewall rules (Answer D): Ensuring the firewall allows traffic on port 3306 is the appropriate next step, especially since other workstations are not having the same issue.

Checking the database server (Option A): This is unnecessary because other workstations can access the server, confirming the server itself is functioning correctly.

Changing the database password (Option B): This would not resolve the issue of one workstation being unable to connect while others can.

Opening port 3306 on the server (Option C): The problem isn't server-side since other machines can connect without issue.

CompTIA Server+

Reference:

This topic relates to SK0-005 Objective 2.4: Troubleshoot common server problems.

A technician notices that every time a server is powered on, it turns off after several minutes. After reviewing logs, the technician notices the server registers execution of the shutdown. Which of the following should the technician do to fix this issue?

A.

Reset the memory modules

A.

Reset the memory modules

Answers
B.

Check for fan failure

B.

Check for fan failure

Answers
C.

Change the VM password

C.

Change the VM password

Answers
D.

Set credentials for the remote console

D.

Set credentials for the remote console

Answers
Suggested answer: B

Explanation:

The server is shutting down after being powered on, which could indicate overheating. This is a common issue when fans fail, causing the CPU or other components to overheat and forcing the system to shut down to protect itself from damage.

Check for fan failure (Answer B): Ensuring the server's cooling system is functioning properly is crucial. Overheating due to a fan failure can cause the system to shut down automatically.

Resetting memory modules (Option A): While memory issues can cause system instability, they generally do not lead to immediate shutdowns as described.

Changing the VM password (Option C): This is unrelated to the shutdown issue.

Setting credentials for the remote console (Option D): This is irrelevant to the described problem of server shutdown.

CompTIA Server+

Reference:

This topic is related to SK0-005 Objective 3.3: Diagnose hardware and software issues.

A server administrator needs to set up active-passive load balancing for an environment with multiple network paths. The traffic should be directed to one path and switched only in the event that the original path becomes unavailable. Which of the following describes this scenario?

A.

Most recently used

A.

Most recently used

Answers
B.

Heartbeat

B.

Heartbeat

Answers
C.

Link aggregation

C.

Link aggregation

Answers
D.

Round robin

D.

Round robin

Answers
Suggested answer: B

Explanation:

In an active-passive load balancing configuration, one path (or server) handles all the traffic while the other remains in standby mode, ready to take over if the active path becomes unavailable. This setup is typically monitored via a heartbeat mechanism, where the standby server checks the availability of the active server and takes over when it detects a failure.

Heartbeat (Answer B): This term refers to the monitoring process that checks the availability of the active path in an active-passive configuration.

Most recently used (Option A): This describes a load-balancing method where the most recently used path or server is prioritized, but it doesn't describe an active-passive setup.

Link aggregation (Option C): This refers to combining multiple network connections for increased throughput, not for failover purposes.

Round robin (Option D): This load-balancing method alternates traffic between all available paths, which doesn't match the active-passive description.

CompTIA Server+

Reference:

This topic is covered under SK0-005 Objective 1.4: Summarize methods used to manage network connections.

A junior administrator reported that the website used for anti-malware updates is not working. The senior administrator then discovered all requests to the anti-malware site are being redirected to a malicious site. Which of the following tools should the senior administrator check first to identify the potential cause of the issue?

A.

Data loss prevention

A.

Data loss prevention

Answers
B.

File integrity monitor

B.

File integrity monitor

Answers
C.

Port scanner

C.

Port scanner

Answers
D.

Sniffer

D.

Sniffer

Answers
Suggested answer: D

Explanation:

A sniffer (also known as a packet analyzer) is a tool that captures and inspects data packets traveling across the network. In this case, using a sniffer would help identify suspicious or malicious redirection of traffic, possibly caused by a man-in-the-middle attack, DNS hijacking, or malware.

Sniffer (Answer D): This tool will allow the senior administrator to inspect the network traffic and identify if and how requests to the anti-malware website are being intercepted or redirected.

Data loss prevention (Option A): DLP tools focus on preventing data leakage rather than analyzing traffic redirection.

File integrity monitor (Option B): This checks for unauthorized changes to files, which may not directly address network traffic redirection.

Port scanner (Option C): A port scanner would only identify open ports on devices, which is unrelated to the redirection issue.

CompTIA Server+

Reference:

This topic is addressed under SK0-005 Objective 4.2: Explain server roles and their purposes.

Total 462 questions
Go to page: of 47