ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Which of the following server types would benefit MOST from the use of a load balancer?

A.
DNS server
A.
DNS server
Answers
B.
File server
B.
File server
Answers
C.
DHCP server
C.
DHCP server
Answers
D.
Web server
D.
Web server
Answers
Suggested answer: D

Explanation:

The server type that would benefit most from the use of a load balancer is web server. A web server is a server that hosts web applications or websites and responds to requests from web browsers or clients. A load balancer is a device or software that distributes network traffic across multiple servers based on various criteria, such as availability, capacity, or performance. A load balancer can improve the scalability, reliability, and performance of web servers by balancing the workload and preventing any single server from being overloaded or unavailable.

Reference:

https://www.dnsstuff.com/what-is-server-load-balancing

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

A.
Asynchronous
A.
Asynchronous
Answers
B.
Incremental
B.
Incremental
Answers
C.
Application consistent
C.
Application consistent
Answers
D.
Constant
D.
Constant
Answers
Suggested answer: D

Explanation:

The type of data replication that is required for a hot-site disaster recovery model is constant. A hot site is a type of disaster recovery site that has fully operational IT infrastructure and equipment that can take over the primary site’s functions immediately in case of a disaster or disruption. A hot site requires constant data replication between the primary site and the hot site to ensure that the data is up-to-date and consistent. Constant data replication means that any changes made to the data at the primary site are immediately copied to the hot site without any delay or lag.

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

A.
The server has an architecture mismatch
A.
The server has an architecture mismatch
Answers
B.
The system time is not synchronized
B.
The system time is not synchronized
Answers
C.
The technician does not have sufficient privileges
C.
The technician does not have sufficient privileges
Answers
D.
The external firewall is blocking access
D.
The external firewall is blocking access
Answers
E.
The default gateway is incorrect
E.
The default gateway is incorrect
Answers
F.
The local system log file is full
F.
The local system log file is full
Answers
Suggested answer: D, E

Explanation:

The most likely reasons why the technician is unable to access a server’s package repository internally or externally are that the external firewall is blocking access and that the default gateway is incorrect. A package repository is a source of software packages that can be installed or updated on a server using a package manager tool. A package repository can be accessed over a network using a URL or an IP address. However, if there are any network issues or misconfigurations, the access to the package repository can be blocked or failed. An external firewall is a device or software that controls the incoming and outgoing network traffic based on predefined rules or policies. An external firewall can block access to a package repository if it does not allow traffic on certain ports or protocols that are used by the package manager tool. A default gateway is a device or address that routes network traffic from one network to another network. A default gateway can be incorrect if it does not match the actual device or address that connects the server’s network to other networks, such as the internet. An incorrect default gateway can prevent the server from reaching the package repository over other networks.

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

A.
RAID 0
A.
RAID 0
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAID 5
C.
RAID 5
Answers
D.
RAID 6
D.
RAID 6
Answers
Suggested answer: A

Explanation:

The RAID level that provides the highest possible capacity for a storage array is RAID 0. RAID 0 is a type of RAID level that provides performance enhancement by using striping. Striping means dividing data into blocks and distributing them across multiple disks to increase speed and capacity. RAID 0 does not provide any fault tolerance or redundancy, as it does not use any parity or mirroring techniques. RAID 0 uses all of the available disk space for data storage, without losing any space for overhead. Therefore, RAID 0 provides the highest possible capacity for a storage array, but also has the highest risk of data loss.

Reference: https://www.thinkmate.com/inside/articles/what-is-raid

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

A.
RAID 0
A.
RAID 0
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAID 5
C.
RAID 5
Answers
D.
RAID 6
D.
RAID 6
Answers
Suggested answer: A

Explanation:

The RAID level that provides the highest possible capacity for a storage array is RAID 0. RAID 0 is a type of RAID level that provides performance enhancement by using striping. Striping means dividing data into blocks and distributing them across multiple disks to increase speed and capacity. RAID 0 does not provide any fault tolerance or redundancy, as it does not use any parity or mirroring techniques. RAID 0 uses all of the available disk space for data storage, without losing any space for overhead. Therefore, RAID 0 provides the highest possible capacity for a storage array, but also has the highest risk of data loss.

Reference: https://www.thinkmate.com/inside/articles/what-is-raid

A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?

A.
Full
A.
Full
Answers
B.
Bare metal
B.
Bare metal
Answers
C.
Core
C.
Core
Answers
D.
GUI
D.
GUI
Answers
Suggested answer: C

Explanation:

The server installation method that would optimize server resources is core. Core is a minimal installation option that is available for some operating systems, such as Windows Server and Linux. Core installs only the essential components and features of the operating system, without any graphical user interface (GUI) or other unnecessary services or applications. Core reduces the disk footprint, memory usage, CPU consumption, and attack surface of the server, making it more efficient and secure. Core can be managed remotely using command-line tools, PowerShell, or GUI tools.

Reference:

https://docs.microsoft.com/en-us/windows-server/administration/performance-tuning/hardware/

A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?

A.
Disable port 389 on the server
A.
Disable port 389 on the server
Answers
B.
Move traffic from port 389 to port 443
B.
Move traffic from port 389 to port 443
Answers
C.
Move traffic from port 389 to port 637
C.
Move traffic from port 389 to port 637
Answers
D.
Enable port 389 for web traffic
D.
Enable port 389 for web traffic
Answers
Suggested answer: A

Explanation:

The best way to complete the request to harden the server is to disable port 389 on the server. Port 389 is the default port used by LDAP (Lightweight Directory Access Protocol), which is a protocol that allows access and modification of directory services over a network. LDAP can be used for authentication, authorization, or information retrieval purposes. However, LDAP does not encrypt its data by default, which can expose sensitive information or credentials to attackers who can intercept or modify the network traffic. Therefore, port 389 should be disabled on a web server that only hosts websites and does not need LDAP functionality. Alternatively, port 636 can be used instead of port 389 to enable LDAPS (LDAP over SSL/TLS), which encrypts the data using SSL/TLS certificates.

Which of the following would be BEST to help protect an organization against social engineering?

A.
More complex passwords
A.
More complex passwords
Answers
B.
Recurring training and support
B.
Recurring training and support
Answers
C.
Single sign-on
C.
Single sign-on
Answers
D.
An updated code of conduct to enforce social media
D.
An updated code of conduct to enforce social media
Answers
Suggested answer: B

Explanation:

The best way to protect an organization against social engineering is to provide recurring training and support. Social engineering is a type of attack that exploits human psychology and behavior to manipulate people into divulging confidential information or performing malicious actions. Social engineering can take various forms, such as phishing emails, phone calls, impersonation, baiting, or quid pro quo. The best defense against social engineering is to educate and empower the employees to recognize and avoid common social engineering techniques and report any suspicious activities or incidents. Recurring training and support can help raise awareness and reinforce best practices among the employees.

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

A.
Restart the server
A.
Restart the server
Answers
B.
Configure the network on the server
B.
Configure the network on the server
Answers
C.
Enable the port on the server
C.
Enable the port on the server
Answers
D.
Check the DHCP configuration
D.
Check the DHCP configuration
Answers
Suggested answer: C

Explanation:

The next thing that the technician should perform is to enable the port on the server. A port is a logical endpoint that identifies a specific service or application on a network device. A port can be enabled or disabled depending on whether the service or application is running or not. If a port is disabled on a server, it means that the server cannot send or receive any network traffic on that port, which can prevent communication with other devices or services that use that port. In this case, if port 389 is disabled on the server, it means that the server cannot use LDAP to access or modify directory services over a network. To resolve this issue, the technician should enable port 389 on the server using commands such as netsh or iptables.

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

A.
SSO
A.
SSO
Answers
B.
LDAP
B.
LDAP
Answers
C.
TACACS
C.
TACACS
Answers
D.
MFA
D.
MFA
Answers
Suggested answer: A

Explanation:

The term that is most likely part of the user authentication process when implementing SAML across multiple applications is SSO. SSO (Single Sign-On) is a way for users to be authenticated for multiple applications and services at once. With SSO, a user signs in at a single login screen and can then use a number of apps without having to enter their credentials again. SSO improves user experience and security by reducing password fatigue and phishing risks. SAML (Security Assertion Markup Language) is a protocol that enables SSO by providing a standardized way to exchange authentication and authorization data between an identity provider (IdP) and a service provider (SP). SAML uses XML-based messages called assertions to communicate user identity and attributes between parties.

Reference:

https://www.onelogin.com/learn/how-single-sign-on-works

Total 462 questions
Go to page: of 47