CompTIA Server+ SK0-005

CompTIA Server+ SK0-005 FAQs

Question #1

Which of the following is typical of software licensing in the cloud?

A. Per socket

B. Perpetual

C. Subscription-based

D. Site-based

Correct Answer: C

Question 2  

A systems administrator is setting up a server on a LAN that uses an address space that           follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A. 11.251.196.241

B. 171.245.198.241

C. 172.16.19.241

D. 193.168.145.241

Correct Answer: C

Question  3

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

A. Separate circuits

B. An uninterruptible power supply

C. Increased PDU capacity

D. Redundant power supplies

Correct Answer: A

Question 4

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

A. VBS

B. Shell

C. Java

D. PowerShell

E. Batch

Correct Answer: B

Question 5  

A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the

OS. Which of the following should the technician do NEXT to install the firmware?

A. Press F8 to enter safe mode

B. Boot from the media

C. Enable HIDS on the server

D. Log in with an administrative account

Correct Answer: B

Question 6  

A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?

A. nslookup

B. nbtstat

C. telnet

D. netstat -a

Correct Answer: D

Question 7  

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

A. User account control

B. Anti-malware

C. A sniffer

D. A port scanner

Correct Answer: D

Question 8  

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

A. Upgrade the application package

B. Tighten the rules on the firewall

C. Install antivirus software

D. Patch the server OS

Correct Answer: A

Question 9  

Which of the following policies would be BEST to deter a brute-force login attack?

A. Password complexity

B. Password reuse

C. Account age threshold

D. Account lockout threshold

Correct Answer: D

Question 10  

A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead. Which of the following RAID levels should the technician configure for this drive array?

A. RAID 0

B. RAID 5

C. RAID 6

D. RAID 10

Correct Answer: C

Question 11

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

A. Bridged

B. NAT

C. Host only

D. vSwitch

Correct Answer: B

Question 12  

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

A. SLA

B. MTBF

C. RTO

D. MTTR

Correct Answer: C

Question 13

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons?

(Choose two.)

A. The server has an architecture mismatch

B. The system time is not synchronized

C. The technician does not have sufficient privileges

D. The external firewall is blocking access

E. The default gateway is incorrect

F. The local system log file is full

Correct Answer: AB

Question 14  

Which of the following would be BEST to help protect an organization against social engineering?

A. More complex passwords

B. Recurring training and support

C. Single sign-on

D. An updated code of conduct to enforce social media

Correct Answer: D

Question 15  

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?

A. Stop sharing the volume

B. Replace the disk

C. Shut down the SAN

D. Stop all connections to the volume

Correct Answer: B

Question 16  

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

A. CIFS

B. FTP

C. SFTP

D. NFS

Correct Answer: A

Question 17  

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

A. Perform a root cause analysis

B. Develop a plan of action

C. Document the findings

D. Escalate the issue

E. Scope the issue

F. Notify the users

Correct Answer: CF

Question 18  

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24 –

Default gateway: 192.168.10.1 –

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

A. IP address: 192.168.10.2/24 Default gateway: 192.168.10.1

B. IP address: 192.168.1.2/24 Default gateway: 192.168.10.1

C. IP address: 192.168.10.3/24 Default gateway: 192.168.20.1

D. IP address: 192.168.10.24/24 Default gateway: 192.168.30.1

Correct Answer: B

Question 19

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

A. iSCSI

B. eSATA

C. NFS

D. FCoE

Correct Answer: A

Question 20

HOTSPOT –

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an

internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to

access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the

Internet connectivity issues.

INSTRUCTIONS –

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Hot Area:

Correct Answer:

Pages: 1 2 3