ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

A.
Heartbeat
A.
Heartbeat
Answers
B.
Failback
B.
Failback
Answers
C.
Redundancy
C.
Redundancy
Answers
D.
Load balancing
D.
Load balancing
Answers
Suggested answer: B

Explanation:

The cluster feature that will allow Ann to complete her task is failback. A cluster is a group of servers that work together to provide high availability, scalability, and load balancing for applications or services. A cluster can have different nodes or members that have different roles or states. An active node is a node that is currently running an application or service and serving requests from clients. A passive node is a node that is on standby and ready to take over if the active node fails. A failover is a process of switching from a failed or unavailable node to another node in a cluster. A failback is a process of switching back from a failover node to the original node after it becomes available again. Failback can be automatic or manual depending on the cluster configuration.

Which of the following policies would be BEST to deter a brute-force login attack?

A.
Password complexity
A.
Password complexity
Answers
B.
Password reuse
B.
Password reuse
Answers
C.
Account age threshold
C.
Account age threshold
Answers
D.
Account lockout threshold
D.
Account lockout threshold
Answers
Suggested answer: D

Explanation:

The best policy to deter a brute-force login attack is account lockout threshold. A brute-force login attack is a type of attack that tries to guess a user’s password by trying different combinations of characters until it finds the correct one. This attack can be performed manually or with automated tools that use dictionaries, wordlists, or algorithms. An account lockout threshold is a policy that specifies how many failed login attempts are allowed before an account is locked out temporarily or permanently. This policy prevents an attacker from trying unlimited password guesses and reduces the chances of finding the correct password.

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

A.
SD card
A.
SD card
Answers
B.
NAS drive
B.
NAS drive
Answers
C.
SATA drive
C.
SATA drive
Answers
D.
SAS drive
D.
SAS drive
Answers
Suggested answer: D

Explanation:

The technician should install the Type 1 hypervisor on a SAS drive. A Type 1 hypervisor is a layer of software that runs directly on top of the physical hardware and creates virtual machines that share the hardware resources. A Type 1 hypervisor requires fast and reliable storage for optimal performance and stability. A SAS drive is a type of hard disk drive that uses Serial Attached SCSI (SAS) as its interface protocol. SAS drives offer high speed, low latency, and high reliability compared to other types of drives, such as SD cards, NAS drives, or SATA drives. SD cards are flash memory cards that offer low cost and portability but have low speed, low capacity, and low durability. NAS drives are network-attached storage devices that offer high capacity and easy access but have high latency and low reliability due to network dependency. SATA drives are hard disk drives that use Serial ATA (SATA) as their interface protocol. SATA drives offer moderate speed, moderate cost, and moderate reliability but have lower performance and durability than SAS drives.

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163<UP, BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

A.
The server is configured to use DHCP on a network that has multiple scope options
A.
The server is configured to use DHCP on a network that has multiple scope options
Answers
B.
The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
B.
The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
Answers
C.
The server is configured to use DHCP on a network that does not have a DHCP server
C.
The server is configured to use DHCP on a network that does not have a DHCP server
Answers
D.
The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting
D.
The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting
Answers
Suggested answer: C

Explanation:

The reason why the Linux server is not communicating on a network is that it is configured to use DHCP on a network that does not have a DHCP server. DHCP (Dynamic Host Configuration Protocol) is a protocol that allows a client device to obtain an IP address and other network configuration parameters from a DHCP server automatically. However, if there is no DHCP server on the network, the client device will not be able to obtain a valid IP address and will assign itself a link-local address instead. A link-local address is an IP address that is only valid within a local network segment and cannot be used for communication outside of it. A link-local address has a prefix of 169.254/16 in IPv4 or fe80::/10 in IPv6. In this case, the Linux server has assigned itself a link-local address of 127.0.0.1, which is also known as the loopback address. The loopback address is used for testing and troubleshooting purposes and refers to the device itself. It cannot be used for communication with other devices on the network.

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

A.
RAID 0
A.
RAID 0
Answers
B.
RAID 5
B.
RAID 5
Answers
C.
RAID 6
C.
RAID 6
Answers
D.
RAID 10
D.
RAID 10
Answers
Suggested answer: C

Explanation:

The technician should configure RAID 6 for this drive array to meet the server specifications. RAID 6 is a type of RAID level that provides fault tolerance and performance enhancement by using striping and dual parity. Striping means dividing data into blocks and distributing them across multiple disks to increase speed and capacity. Parity means calculating and storing extra information that can be used to reconstruct data in case of disk failure. RAID 6 uses two sets of parity information for each stripe, which are stored on different disks. This way, RAID 6 can handle up to two disk failures without losing any data or functionality. RAID 6 also allows for the least amount of drive space lost to RAID overhead compared to other RAID levels that can handle two disk failures, such as RAID 1+0 or RAID 0+1.

Reference:

https://www.booleanworld.com/raid-levels-explained/

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.
Telnet
A.
Telnet
Answers
B.
Robocopy
B.
Robocopy
Answers
C.
XCOPY
C.
XCOPY
Answers
D.
SCP
D.
SCP
Answers
Suggested answer: D

Explanation:

The administrator should use SCP to transfer log files from a Linux server to a Windows workstation. SCP (Secure Copy Protocol) is a protocol that allows secure file transfer between two devices using SSH (Secure Shell) encryption. SCP can transfer files between different operating systems, such as Linux and Windows, as long as both devices have an SSH client installed. SCP can also preserve file attributes, such as permissions and timestamps, during the transfer.

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

A.
Connect the server to a KVM
A.
Connect the server to a KVM
Answers
B.
Use cable management
B.
Use cable management
Answers
C.
Connect the server to a redundant network
C.
Connect the server to a redundant network
Answers
D.
Connect the server to a UPS
D.
Connect the server to a UPS
Answers
Suggested answer: D

Explanation:

The administrator should connect the server to a UPS to prevent this situation in the future. A UPS (Uninterruptible Power Supply) is a device that provides backup power to a server or other device in case of a power outage or surge. A UPS typically consists of one or more batteries and an inverter that converts the battery power into AC power that the server can use. A UPS can also protect the server from power fluctuations that can damage its components or cause data corruption. By connecting the server to a UPS, the administrator can ensure that the server will continue to run or shut down gracefully during a power failure.

Which of the following describes the installation of an OS contained entirely within another OS installation?

A.
Host
A.
Host
Answers
B.
Bridge
B.
Bridge
Answers
C.
Hypervisor
C.
Hypervisor
Answers
D.
Guest
D.
Guest
Answers
Suggested answer: D

Explanation:

The installation of an OS contained entirely within another OS installation is described as a guest. A guest is a term that refers to a virtual machine (VM) that runs on top of a host operating system (OS) using a hypervisor or a virtualization software. A guest can have a different OS than the host, and can run multiple applications or services independently from the host. A guest can also be isolated from the host and other guests for security or testing purposes.

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.
hardware is UEFI compliant
A.
hardware is UEFI compliant
Answers
B.
volume is formatted as GPT
B.
volume is formatted as GPT
Answers
C.
volume is formatted as MBR
C.
volume is formatted as MBR
Answers
D.
volume is spanned across multiple physical disk drives
D.
volume is spanned across multiple physical disk drives
Answers
Suggested answer: B

Explanation:

To ensure the partition is available to the OS, the technician must verify that the volume is formatted as GPT. GPT (GUID Partition Table) is a partitioning scheme that defines how data is organized on a hard disk drive (HDD) or a solid state drive (SSD). GPT uses globally unique identifiers (GUIDs) to identify partitions and supports up to 128 primary partitions per disk. GPT also supports disks larger than 2 TB and has a backup copy of the partition table at the end of the disk for data recovery. GPT is required for installing Windows on UEFI-based PCs, which offer faster boot time and better security than legacy BIOS-based PCs.

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

A.
SAS SSD
A.
SAS SSD
Answers
B.
SATA SSD
B.
SATA SSD
Answers
C.
SAS drive with 10000rpm
C.
SAS drive with 10000rpm
Answers
D.
SATA drive with 15000rpm
D.
SATA drive with 15000rpm
Answers
Suggested answer: A

Explanation:

The best disk type for a high-performance financial application is a SAS SSD. A SAS SSD (Serial Attached SCSI Solid State Drive) is a type of storage device that uses flash memory chips to store data and has a SAS interface to connect to a server or a storage array. A SAS SSD offers high speed, low latency, high reliability, and high durability compared to other types of disks, such as SATA SSDs, SAS HDDs, or SATA HDDs. A SAS SSD can handle high I/O workloads and deliver consistent performance for applications that require fast data access and processing.

Reference:

https://www.hp.com/us-en/shop/tech-takes/sas-vs-sata

Total 462 questions
Go to page: of 47