ExamGecko
Home Home / CompTIA / SK0-005

CompTIA SK0-005 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

A.
DLP
A.
DLP
Answers
B.
A port scanner
B.
A port scanner
Answers
C.
Anti-malware
C.
Anti-malware
Answers
D.
A sniffer
D.
A sniffer
Answers
Suggested answer: B

Explanation:

The tool that the administrator should use to check for unnecessary running services across 12 servers is a port scanner. A port scanner is a tool that scans a network device for open ports and identifies the services or applications that are running on those ports. A port scanner can help detect any unauthorized or unwanted services that may pose a security risk or consume network resources. A port scanner can also help troubleshoot network connectivity issues or verify firewall rules.

Reference: https://www.getsafeonline.org/business/articles/unnecessary-services/

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

A.
Install security cameras
A.
Install security cameras
Answers
B.
Utilize security guards
B.
Utilize security guards
Answers
C.
Install bollards
C.
Install bollards
Answers
D.
Install a mantrap
D.
Install a mantrap
Answers
Suggested answer: C

Explanation:

The best strategy to ensure wayward vehicle traffic does not interfere with datacenter operations is to install bollards. Bollards are sturdy posts that are installed around a perimeter to prevent vehicles from entering or crashing into a protected area. Bollards can provide physical security and deterrence for datacenters that are located near busy roads or parking lots. Bollards can also prevent accidental damage or injury caused by vehicles that lose control or have faulty brakes.

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A.
Stop sharing the volume
A.
Stop sharing the volume
Answers
B.
Replace the disk
B.
Replace the disk
Answers
C.
Shut down the SAN
C.
Shut down the SAN
Answers
D.
Stop all connections to the volume
D.
Stop all connections to the volume
Answers
Suggested answer: B

Explanation:

The next thing that the technician should do, given the disk is hot swappable, is to replace the disk. A hot swappable disk is a disk that can be removed and replaced without shutting down the system or affecting its operation. A hot swappable disk is typically used in a storage array that has RAID (Redundant Array of Independent Disks) configuration that provides fault tolerance and redundancy. If a disk fails in a RAID array, it can be replaced by a new disk without interrupting the service or losing any data. The new disk will automatically rebuild itself using the data from the other disks in the array.

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

A.
Cable management
A.
Cable management
Answers
B.
Rail kits
B.
Rail kits
Answers
C.
A wireless connection
C.
A wireless connection
Answers
D.
A power distribution unit
D.
A power distribution unit
Answers
Suggested answer: A

Explanation:

The server administrator should use cable management to prevent network connectivity loss when pulling a server from the rack during maintenance. Cable management is a practice of organizing and securing the cables that connect various devices and components in a system. Cable management can help improve airflow, reduce clutter, prevent tangling, and avoid accidental disconnection or damage of cables. Cable management can be done using various tools and techniques, such as cable ties, cable trays, cable labels, cable organizers, or cable ducts.

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

A.
Scope-based
A.
Scope-based
Answers
B.
Role-based
B.
Role-based
Answers
C.
Location-based
C.
Location-based
Answers
D.
Rule-based
D.
Rule-based
Answers
Suggested answer: B

Explanation:

The access control methodology that can be described best as allowing a user the least access based on the jobs the user needs to perform is role-based access control (RBAC). RBAC is an access control method that assigns permissions to users based on their roles or functions within an organization. RBAC provides fine-grained and manageable access control by defining what actions each role can perform and what resources each role can access. RBAC follows the principle of least privilege, which means that users are only granted the minimum level of access required to perform their tasks. RBAC can reduce security risks, simplify administration, and enforce compliance policies.

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

A.
Reseating any expansion cards in the server
A.
Reseating any expansion cards in the server
Answers
B.
Replacing the failing hard drive
B.
Replacing the failing hard drive
Answers
C.
Reinstalling the heat sink with new thermal paste
C.
Reinstalling the heat sink with new thermal paste
Answers
D.
Restoring the server from the latest full backup
D.
Restoring the server from the latest full backup
Answers
Suggested answer: C

Explanation:

The most likely solution to resolve the issue of the server crashing after running normally for approximately five minutes is to reinstall the heat sink with new thermal paste. A heat sink is a device that dissipates heat from a component, such as a processor or a graphics card, by transferring it to a cooling medium, such as air or liquid. A heat sink is usually attached to the component using thermal paste, which is a substance that fills the gaps between the heat sink and the component and improves thermal conductivity. Thermal paste can degrade over time and lose its effectiveness, resulting in overheating and performance issues. If a server crashes after running for a short period of time, it may indicate that the processor is overheating due to insufficient cooling. To resolve this issue, the technician should remove the heat sink, clean the old thermal paste, apply new thermal paste, and reinstall the heat sink.

A server administrator is exporting Windows system files before patching and saving them to the following location:

\\server1\ITDept\

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

A.
eSATA
A.
eSATA
Answers
B.
FCoE
B.
FCoE
Answers
C.
CIFS
C.
CIFS
Answers
D.
SAS
D.
SAS
Answers
Suggested answer: C

Explanation:

The storage protocol that the administrator is most likely using to save data to the location \server1\ITDept\ is CIFS. CIFS (Common Internet File System) is a protocol that allows file sharing and remote access over a network. CIFS is based on SMB (Server Message Block), which is a protocol that enables communication between devices on a network. CIFS uses UNC (Universal Naming Convention) paths to identify network resources, such as files or folders. A UNC path has the format \servername\sharename\path\filename. In this case, server1 is the name of the server, ITDept is the name of the shared folder, and \ is the path within the shared folder.

A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:

A.
the correct firewall zone is active
A.
the correct firewall zone is active
Answers
B.
the latest firmware was applied
B.
the latest firmware was applied
Answers
C.
NTP is running on the database system
C.
NTP is running on the database system
Answers
D.
the correct dependencies are installed
D.
the correct dependencies are installed
Answers
Suggested answer: C

Explanation:

The first thing that the technician should ensure to correct the database synchronization errors is that NTP is running on the database system. NTP (Network Time Protocol) is a protocol that synchronizes the clocks of network devices with a reference time source, such as an atomic clock or a GPS receiver. NTP ensures that all devices on a network have accurate and consistent time settings, which can affect various functions and applications. Database synchronization is a process of maintaining data consistency and integrity across multiple database servers or instances. Database synchronization can depend on accurate time settings, as time stamps are often used to determine which data is newer or older, and which data should be updated or overwritten. If NTP is not running on the database system, it may cause time drift or discrepancy between different database servers or instances, which can result in synchronization errors or data conflicts.

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A.
CIFS
A.
CIFS
Answers
B.
FTP
B.
FTP
Answers
C.
SFTP
C.
SFTP
Answers
D.
NFS
D.
NFS
Answers
Suggested answer: D

Explanation:

The most appropriate native protocol to use for connecting a Linux server to a share on a NAS is NFS. NFS (Network File System) is a protocol that allows file sharing and remote access over a network. NFS is designed for Unix-like operating systems, such as Linux, and supports features such as symbolic links, hard links, file locking, and file permissions. NFS uses mount points to attach remote file systems to local file systems, making them appear as if they are part of the local file system. NFS can provide fast and reliable access to files stored on a NAS (Network Attached Storage), which is a device that provides centralized storage for network devices.

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.
Remote desktop
A.
Remote desktop
Answers
B.
Access via a crash cart
B.
Access via a crash cart
Answers
C.
Out-of-band management
C.
Out-of-band management
Answers
D.
A Secure Shell connection
D.
A Secure Shell connection
Answers
Suggested answer: C

Explanation:

The best solution to investigate the failure of a server in a remote datacenter is out-of-band management. Out-of-band management is a method of accessing and controlling a server or a device using a dedicated channel that is separate from its normal network connection. Out-of-band management can use various technologies, such as serial ports, modems, KVM switches, or dedicated management cards or interfaces. Out-of-band management can provide remote access to servers or devices even when they are powered off, unresponsive, or disconnected from the network. Out-of-band management can enable troubleshooting, configuration, maintenance, or recovery tasks without requiring physical presence at the server location.

Reference:

https://www.lantronix.com/wp-content/uploads/pdf/Data_Center_Mgmt_WP.pdf

Total 462 questions
Go to page: of 47