SK0-005 Practice Test Questions

347 Questions


A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?


A. Initialize the volume


B. Format the volume


C. Replace the volume


D. Rebuild the volume





D.
  Rebuild the volume

Winch of the following is a type of replication in which all files are replicated, all the time?


A. Constant


B. Application consistent


C. Synthetic full


D. Full





A.
  Constant

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?


A. Logical volume management


B. Dynamic disk


C. GPT


D. UEFI





B.
  Dynamic disk

Which of the following BEST describes the concept of right to downgrade?


A. It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS


B. It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license


C. It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased


D. It allows a previous version of an OS to be installed and covered by the same license as the newer version





D.
  It allows a previous version of an OS to be installed and covered by the same license as the newer version

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)


A. Perform a root cause analysis


B. Develop a plan of action


C. Document the findings


D. Escalate the issue


E. Scope the issue


F. Notify the users





C.
  Document the findings

F.
  Notify the users

Which of the following would a systems administrator implement to ensure all web traffic is secure?


A. SSH


B. SSL


C. SMTP


D. PGP





B.
  SSL

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?


A. Reseating any expansion cards in the server


B. Replacing the failing hard drive


C. Reinstalling the heat sink with new thermal paste


D. Restoring the server from the latest full backup





C.
  Reinstalling the heat sink with new thermal paste

A user logs in to a Linux server and attempts to run the following command: sudo emacs /root/file However the user gets the following message: User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?


A. visudo I grep userid


B. sudo -1 -U userid


C. cat /etc/passwd


D. userlist I grep userid





B.
  sudo -1 -U userid

The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.

One of the alerts contains the following information:

Exploit Alert

Attempted User Privilege Gain

2/2/07-3: 09:09 10.1.200.32

--> 208.206.12.9:80

This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two)


A. Disable all services on the affected application server.


B. Perform a vulnerability scan on all the servers within the cluster and patch accordingly.


C. Block access to 208.206.12.9 from all servers on the network.


D. Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.


E. Enable GPO to install an antivirus on all the servers and perform a weekly reboot.


F. Perform an antivirus scan on all servers within the cluster and reboot each server.





B.
  Perform a vulnerability scan on all the servers within the cluster and patch accordingly.

F.
  Perform an antivirus scan on all servers within the cluster and reboot each server.

An administrator discovers a Bash script file has the following permissions set in octal notation;

777


A. chmod go-rw>:


B. chmod u=rwx


C. chmod u+wx


D. chmod g-rwx





A.
  chmod go-rw>:

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?


A. Lockout


B. Length


C. Complexity


D. Minimum age





B.
  Length

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?


A. Midplane


B. Active backplane


C. Passive backplane


D. Management module





A.
  Midplane


Page 13 out of 29 Pages
Previous