ExamGecko
Home / CompTIA / SK0-005 / List of questions
Ask Question

CompTIA SK0-005 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

DLP
DLP
A port scanner
A port scanner
Anti-malware
Anti-malware
A sniffer
A sniffer
Suggested answer: B
Explanation:

The tool that the administrator should use to check for unnecessary running services across 12 servers is a port scanner. A port scanner is a tool that scans a network device for open ports and identifies the services or applications that are running on those ports. A port scanner can help detect any unauthorized or unwanted services that may pose a security risk or consume network resources. A port scanner can also help troubleshoot network connectivity issues or verify firewall rules.

Reference: https://www.getsafeonline.org/business/articles/unnecessary-services/

asked 02/10/2024
Nicholas Stoner
47 questions

Question 72

Report Export Collapse

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

Install security cameras
Install security cameras
Utilize security guards
Utilize security guards
Install bollards
Install bollards
Install a mantrap
Install a mantrap
Suggested answer: C
Explanation:

The best strategy to ensure wayward vehicle traffic does not interfere with datacenter operations is to install bollards. Bollards are sturdy posts that are installed around a perimeter to prevent vehicles from entering or crashing into a protected area. Bollards can provide physical security and deterrence for datacenters that are located near busy roads or parking lots. Bollards can also prevent accidental damage or injury caused by vehicles that lose control or have faulty brakes.

asked 02/10/2024
Aung Hain Htet
31 questions

Question 73

Report Export Collapse

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

Stop sharing the volume
Stop sharing the volume
Replace the disk
Replace the disk
Shut down the SAN
Shut down the SAN
Stop all connections to the volume
Stop all connections to the volume
Suggested answer: B
Explanation:

The next thing that the technician should do, given the disk is hot swappable, is to replace the disk. A hot swappable disk is a disk that can be removed and replaced without shutting down the system or affecting its operation. A hot swappable disk is typically used in a storage array that has RAID (Redundant Array of Independent Disks) configuration that provides fault tolerance and redundancy. If a disk fails in a RAID array, it can be replaced by a new disk without interrupting the service or losing any data. The new disk will automatically rebuild itself using the data from the other disks in the array.

asked 02/10/2024
Ahmed Khan
49 questions

Question 74

Report Export Collapse

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

Cable management
Cable management
Rail kits
Rail kits
A wireless connection
A wireless connection
A power distribution unit
A power distribution unit
Suggested answer: A
Explanation:

The server administrator should use cable management to prevent network connectivity loss when pulling a server from the rack during maintenance. Cable management is a practice of organizing and securing the cables that connect various devices and components in a system. Cable management can help improve airflow, reduce clutter, prevent tangling, and avoid accidental disconnection or damage of cables. Cable management can be done using various tools and techniques, such as cable ties, cable trays, cable labels, cable organizers, or cable ducts.

asked 02/10/2024
Jose Leonardo
31 questions

Question 75

Report Export Collapse

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Scope-based
Scope-based
Role-based
Role-based
Location-based
Location-based
Rule-based
Rule-based
Suggested answer: B
Explanation:

The access control methodology that can be described best as allowing a user the least access based on the jobs the user needs to perform is role-based access control (RBAC). RBAC is an access control method that assigns permissions to users based on their roles or functions within an organization. RBAC provides fine-grained and manageable access control by defining what actions each role can perform and what resources each role can access. RBAC follows the principle of least privilege, which means that users are only granted the minimum level of access required to perform their tasks. RBAC can reduce security risks, simplify administration, and enforce compliance policies.

asked 02/10/2024
Rehan Malik
54 questions

Question 76

Report Export Collapse

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

Reseating any expansion cards in the server
Reseating any expansion cards in the server
Replacing the failing hard drive
Replacing the failing hard drive
Reinstalling the heat sink with new thermal paste
Reinstalling the heat sink with new thermal paste
Restoring the server from the latest full backup
Restoring the server from the latest full backup
Suggested answer: C
Explanation:

The most likely solution to resolve the issue of the server crashing after running normally for approximately five minutes is to reinstall the heat sink with new thermal paste. A heat sink is a device that dissipates heat from a component, such as a processor or a graphics card, by transferring it to a cooling medium, such as air or liquid. A heat sink is usually attached to the component using thermal paste, which is a substance that fills the gaps between the heat sink and the component and improves thermal conductivity. Thermal paste can degrade over time and lose its effectiveness, resulting in overheating and performance issues. If a server crashes after running for a short period of time, it may indicate that the processor is overheating due to insufficient cooling. To resolve this issue, the technician should remove the heat sink, clean the old thermal paste, apply new thermal paste, and reinstall the heat sink.

asked 02/10/2024
Ragul Ponniah
46 questions

Question 77

Report Export Collapse

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

eSATA
eSATA
FCoE
FCoE
CIFS
CIFS
SAS
SAS
Suggested answer: C
Explanation:

The storage protocol that the administrator is most likely using to save data to the location \server1\ITDept\ is CIFS. CIFS (Common Internet File System) is a protocol that allows file sharing and remote access over a network. CIFS is based on SMB (Server Message Block), which is a protocol that enables communication between devices on a network. CIFS uses UNC (Universal Naming Convention) paths to identify network resources, such as files or folders. A UNC path has the format \servername\sharename\path\filename. In this case, server1 is the name of the server, ITDept is the name of the shared folder, and \ is the path within the shared folder.

asked 02/10/2024
patricia rosales
37 questions

Question 78

Report Export Collapse

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

the correct firewall zone is active
the correct firewall zone is active
the latest firmware was applied
the latest firmware was applied
NTP is running on the database system
NTP is running on the database system
the correct dependencies are installed
the correct dependencies are installed
Suggested answer: C
Explanation:

The first thing that the technician should ensure to correct the database synchronization errors is that NTP is running on the database system. NTP (Network Time Protocol) is a protocol that synchronizes the clocks of network devices with a reference time source, such as an atomic clock or a GPS receiver. NTP ensures that all devices on a network have accurate and consistent time settings, which can affect various functions and applications. Database synchronization is a process of maintaining data consistency and integrity across multiple database servers or instances. Database synchronization can depend on accurate time settings, as time stamps are often used to determine which data is newer or older, and which data should be updated or overwritten. If NTP is not running on the database system, it may cause time drift or discrepancy between different database servers or instances, which can result in synchronization errors or data conflicts.

asked 02/10/2024
So young Jang
33 questions

Question 79

Report Export Collapse

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

CIFS
CIFS
FTP
FTP
SFTP
SFTP
NFS
NFS
Suggested answer: D
Explanation:

The most appropriate native protocol to use for connecting a Linux server to a share on a NAS is NFS. NFS (Network File System) is a protocol that allows file sharing and remote access over a network. NFS is designed for Unix-like operating systems, such as Linux, and supports features such as symbolic links, hard links, file locking, and file permissions. NFS uses mount points to attach remote file systems to local file systems, making them appear as if they are part of the local file system. NFS can provide fast and reliable access to files stored on a NAS (Network Attached Storage), which is a device that provides centralized storage for network devices.

asked 02/10/2024
Idan Bar-On
44 questions

Question 80

Report Export Collapse

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Remote desktop
Remote desktop
Access via a crash cart
Access via a crash cart
Out-of-band management
Out-of-band management
A Secure Shell connection
A Secure Shell connection
Suggested answer: C
Explanation:

The best solution to investigate the failure of a server in a remote datacenter is out-of-band management. Out-of-band management is a method of accessing and controlling a server or a device using a dedicated channel that is separate from its normal network connection. Out-of-band management can use various technologies, such as serial ports, modems, KVM switches, or dedicated management cards or interfaces. Out-of-band management can provide remote access to servers or devices even when they are powered off, unresponsive, or disconnected from the network. Out-of-band management can enable troubleshooting, configuration, maintenance, or recovery tasks without requiring physical presence at the server location.

Reference:

https://www.lantronix.com/wp-content/uploads/pdf/Data_Center_Mgmt_WP.pdf

asked 02/10/2024
Steven Moran
38 questions
Total 530 questions
Go to page: of 53
Search

Related questions