Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sixtybuddy

SK0-005 CompTIA Server+ Certification Exam Questions and Answers

Questions 4

Which of the following asset management documents is used to identify the location of a serves within a data center?

Options:

A.

Infrastructure diagram

B.

Workflow diagram

C.

Rack layout

D.

Service manual

Buy Now
Questions 5

The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline. Which of the following backup types can the organization use to mitigate this risk?

Options:

A.

Tape

B.

Cloud

C.

Disk

D.

Print

Buy Now
Questions 6

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Buy Now
Questions 7

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

Options:

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Buy Now
Questions 8

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

Options:

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Buy Now
Questions 9

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Buy Now
Questions 10

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

Options:

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Buy Now
Questions 11

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

Options:

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Buy Now
Questions 12

A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?

Options:

A.

Determine whether there is a common element in the symptoms causing multiple problems.

B.

Perform a root cause analysis.

C.

Make one change at a time and test.

D.

Document the findings, actions, and outcomes throughout the process.

Buy Now
Questions 13

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

Options:

A.

21

B.

22

C.

443

D.

3389

Buy Now
Questions 14

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

Options:

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Buy Now
Questions 15

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

Options:

A.

/root.ssh/sshd/config

B.

/etc.ssh/sshd_config

C.

/root/.ssh/ssh_config

D.

/etc.sshs_shd_config

Buy Now
Questions 16

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Buy Now
Questions 17

Which of the following authentication types defines credentials as "something you have"?

Options:

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Buy Now
Questions 18

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

Options:

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Buy Now
Questions 19

A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?

Options:

A.

Something you are

B.

Something you know

C.

Something you have

D.

Something you do

Buy Now
Questions 20

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

Options:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Buy Now
Questions 21

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Buy Now
Questions 22

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?

Options:

A.

pvdisplay

B.

mount

C.

df -h

D.

fdisk -l

Buy Now
Questions 23

A technician retailed a new 4TB hard drive in a Windows server. Which of the following should the technician perform FIRST to provision the new drive?

Options:

A.

Configure the drive as a base disk.

B.

Configure the drive as a dynamic disk.

C.

Partition the drive using MBR.

D.

Partition the drive using OPT.

Buy Now
Questions 24

A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?

Options:

A.

The VLAN Is improperly configured.

B.

The DNS configuration Is invalid.

C.

The OS version is not compatible with the network switch vendor.

D.

The HIDS is preventing the connection.

Buy Now
Questions 25

A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server most likely using to connect to the array?

Options:

A.

eSATA

B.

USB

C.

FC

D.

iSCSI

Buy Now
Questions 26

A systems administrator recently upgraded the memory in a server, and now the server does not turn on, and nothing is displayed on the screen.

Which of the following is the next step the administrator should take to diagnose the error without opening the machine?

Options:

A.

Perform a cold reboot.

B.

Listen for POST code beeps.

C.

Call technical support.

D.

Check the monitor connection.

Buy Now
Questions 27

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?

Options:

A.

Heartbeat

B.

Failback

C.

Redundancy

D.

Load balancing

Buy Now
Questions 28

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Buy Now
Questions 29

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

Options:

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Buy Now
Questions 30

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Buy Now
Questions 31

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Buy Now
Questions 32

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

Options:

A.

0

B.

1

C.

5

D.

6

Buy Now
Questions 33

Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?

Options:

A.

Pet site

B.

Per server

C.

Per user

D.

Per core

Buy Now
Questions 34

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Buy Now
Questions 35

Which of the following licensing models allows the greatest number of concurrent Windows VMS to run on a host for the lowest cost?

Options:

A.

per user

B.

per core

C.

Per instance

D.

Per concurrent user

Buy Now
Questions 36

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

Options:

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Buy Now
Questions 37

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?

Options:

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Buy Now
Questions 38

A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?

Options:

A.

VPN

B.

TFTP

C.

SSH

D.

HTTP

Buy Now
Questions 39

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

Options:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Buy Now
Questions 40

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

Options:

A.

Waterfall

B.

Synthetic full

C.

Tower of Hanoi

D.

Grandfather-father-son

Buy Now
Questions 41

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

Options:

A.

0

B.

1

C.

5

D.

6

E.

10

Buy Now
Questions 42

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Buy Now
Questions 43

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

Options:

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Buy Now
Questions 44

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

Options:

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Buy Now
Questions 45

After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?

Options:

A.

Remove the original network card and attempt to boot using only the new network card.

B.

Check that the BIOS is configured to recognize the second network card.

C.

Ensure the server has enough RAM to run a second network card.

D.

Verify the network card is on the HCL for the OS.

Buy Now
Questions 46

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

Options:

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Buy Now
Questions 47

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

Options:

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

Buy Now
Questions 48

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Buy Now
Questions 49

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Buy Now
Questions 50

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

Options:

A.

Check the power cables

B.

Clean the fans.

C.

Replace the RAM.

D.

Reattach the CPU heat sink

Buy Now
Questions 51

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

Options:

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Buy Now
Questions 52

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Buy Now
Questions 53

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

Options:

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Buy Now
Questions 54

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to

accomplish this task?

Options:

A.

tracert

B.

telnet

C.

ipconfig

D.

ping

Buy Now
Questions 55

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Buy Now
Questions 56

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Buy Now
Questions 57

A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the

replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?

Options:

A.

The read and write performance will be impacted.

B.

The read performance will be impacted.

C.

The performance will not be impacted.

D.

The write performance will be impacted.

Buy Now
Questions 58

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Buy Now
Questions 59

Which of the following BEST measures how much downtime an organization can tolerate during an unplanned outage?

Options:

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Buy Now
Questions 60

A technician has moved a data drive from a new Windows server to an order Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the MOST Likely cause of the issue?

Options:

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The -partition is formatted with FAT32.

D.

The disk uses MBn.

Buy Now
Questions 61

The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup. Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?

Options:

A.

Set a BIOS/UEFI password on the server.

B.

Change the boot order on the server and restrict console access.

C Configure the host OS to deny login attempts via USB.

C.

Disable all the USB ports on the server.

Buy Now
Questions 62

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Buy Now
Questions 63

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Buy Now
Questions 64

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Options:

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Buy Now
Questions 65

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

Options:

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Buy Now
Questions 66

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Buy Now
Questions 67

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

Options:

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Buy Now
Questions 68

A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?

Options:

A.

An ACL

B.

Antivirus

C.

DLP

D.

A firewall

Buy Now
Questions 69

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

Options:

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Buy Now
Questions 70

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

Options:

A.

53

B.

80

C.

389

D.

443

E.

445

F.

3389

G.

8080

Buy Now
Questions 71

A technician recently replaced a NIC that was not functioning. Since then, no device driver is found when starting the server, and the network card is not functioning. Which of the following should the technician check first?

Options:

A.

The boot log

B.

The BIOS

C.

The HCL

D.

The event log

Buy Now
Questions 72

The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.

One of the alerts contains the following information:

Exploit Alert

Attempted User Privilege Gain

2/2/07-3: 09:09 10.1.200.32

--> 208.206.12.9:80

This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two).

Options:

A.

Disable all services on the affected application server.

B.

Perform a vulnerability scan on all the servers within the cluster and patch accordingly.

C.

Block access to 208.206.12.9 from all servers on the network.

D.

Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.

E.

Enable GPO to install an antivirus on all the servers and perform a weekly reboot.

F.

Perform an antivirus scan on all servers within the cluster and reboot each server.

Buy Now
Questions 73

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Options:

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Buy Now
Questions 74

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

Options:

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Buy Now
Questions 75

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

Which of the following caused the issue?

Options:

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Buy Now
Questions 76

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

Options:

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Buy Now
Questions 77

A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?

Options:

A.

Variable

B.

Loop

C.

Comparator

D.

Conditional

Buy Now
Questions 78

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Buy Now
Questions 79

Hosting data in different regional locations but not moving it for long periods of time describes:

Options:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Buy Now
Questions 80

An administrator notices nigh traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

Options:

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Buy Now
Questions 81

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

Options:

A.

Remove all the data from the server drives using the least destructive method.

B.

Repurpose and recycle any usable server components.

C.

Remove all the components from the server.

D.

Review all company polices.

Buy Now
Questions 82

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Buy Now
Questions 83

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

Options:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Buy Now
Questions 84

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Buy Now
Questions 85

A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?

Options:

A.

Partition the drive.

B.

Create a new disk quota.

C.

Configure the drive as dynamic.

D.

Set the compression.

Buy Now
Questions 86

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

Options:

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Buy Now
Questions 87

A server administrator has a system requirement lo install the virtual OS on Dare metal hardware. Which of the following hypervisor virtualization technologies should the administrator use to BEST meet the system requirements? (Select TWO)

Options:

A.

Host

B.

Template

C.

Clone

D.

Type1

E.

Type2

F.

Guest

Buy Now
Questions 88

A technician runs top on a dual-core server and notes the following conditions:

top –- 14:32:27, 364 days, 14 usersload average 60.5 12.4 13.6

Which of the following actions should the administrator take?

Options:

A.

Schedule a mandatory reboot of the server

B.

Wait for the load average to come back down on its own

C.

Identify the runaway process or processes

D.

Request that users log off the server

Buy Now
Questions 89

Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?

Options:

A.

Aggregation

B.

Subscription

C.

Merging

D.

Collection

Buy Now
Questions 90

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Buy Now
Questions 91

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

Options:

A.

SD card

B.

Optical

C.

Network

D.

USB

Buy Now
Questions 92

Which of the following license types most commonly describes a product that incurs a yearly cost regardless of how much it is used?

Options:

A.

Physical

B.

Subscription

C.

Open-source

D.

Per instance

E.

Per concurrent user

Buy Now
Questions 93

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Options:

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Buy Now
Questions 94

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

Options:

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Buy Now
Questions 95

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

Options:

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Buy Now
Questions 96

Following a recent power outage, a server in the data center has been constantly going offline and losing its configuration. Users have been experiencing access issues while using

the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would most

likely cause this issue? (Select two).

Options:

A.

The server has a faulty power supply.

B.

The server has a CMOS battery failure.

C.

The server requires OS updates.

D.

The server has a malfunctioning LED panel.

E.

The servers have NTP configured.

F.

CPU frequency scaling is set too high.

Buy Now
Questions 97

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

Which of the following would best allow this file to be read?

Options:

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Buy Now
Questions 98

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

Options:

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Buy Now
Questions 99

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

Options:

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Buy Now
Questions 100

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

Options:

A.

Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.

B.

Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.

C.

Use the longest cables possible to allow for adjustment of the server rail within the rack.

D.

Install an Ethernet patch panel and a PDU to accommodate the network and power cables.

Buy Now
Questions 101

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Buy Now
Questions 102

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

Options:

A.

DLP

B.

A port scanner

C.

Anti-malware

D.

A sniffer

Buy Now
Questions 103

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

Options:

A.

Unplug the power cables from the redundant power supplies, leaving just the minimum required.

B.

Convert the physical servers to the hypervisors and retire the ten servers.

C.

Reimage the physical servers and retire all ten servers after the migration is complete.

D.

Convert the ten servers to power-efficient core editions.

Buy Now
Questions 104

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

Options:

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Buy Now
Questions 105

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Buy Now
Questions 106

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Buy Now
Questions 107

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

Options:

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Buy Now
Questions 108

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Buy Now
Questions 109

The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internet drive bays available to keep both disks however the server does have USB 3 0 and eSATA ports available. Which of the following is the BEST way to accomplish the department's goals?

Options:

A.

Copy the existing data to an external USB 3 0 enclosure.

B.

Place the existing data on a DVD and use the internal DVD-ROM drive.

C.

Transfer the existing data to an external eSATA enclosure.

D.

Move the existing data to a new. larger internal hard drive.

Buy Now
Questions 110

Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?

Options:

A.

Humidity control system

B.

Sensors

C.

Fire suppression

D.

Heating system

Buy Now
Questions 111

Which of the following actions should the server administrator perform on the server?

Options:

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Buy Now
Questions 112

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

Options:

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Buy Now
Questions 113

An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconf ig:

The application server is reading the following output from ipconf ig:

Which of the following most likely contains an error?

Options:

A.

IP address

B.

DHCP

C.

Gateway

D.

Subnet mask

Buy Now
Questions 114

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

Options:

A.

Document the findings and actions.

B.

Escalate the issue to the management team.

C.

Implement the solution.

D.

Establish an action plan.

Buy Now
Questions 115

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Options:

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Buy Now
Questions 116

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Buy Now
Questions 117

A new company policy requires that any lost functionality must be restored within 24 hours in the event of a disaster. Which of the following describes this policy requirement?

Options:

A.

MTBF

B.

RTO

C.

MTTR

D.

RPO

Buy Now
Questions 118

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

Options:

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Buy Now
Questions 119

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

Options:

Buy Now
Questions 120

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?

Options:

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Buy Now
Questions 121

Which of the following open ports should be closed to secure the server properly? (Choose two.)

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Buy Now
Questions 122

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Buy Now
Questions 123

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Buy Now
Questions 124

IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three).

Options:

A.

Run a vulnerability scanner on the server.

B.

Repartition the hard drive that houses the database.

C.

Patch the vulnerability.

D.

Enable a host firewall.

E.

Reformat the OS on the server.

F.

Update the antivirus software.

G.

Remove the database software.

Buy Now
Exam Code: SK0-005
Exam Name: CompTIA Server+ Certification Exam
Last Update: Apr 20, 2024
Questions: 414

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90