SK0-005 Practice Test Questions

347 Questions


A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?


A. Restore the server from a snapshot.


B. Restore the server from backup.


C. Swap the drive and initialize the disk.


D. Swap the drive and initialize the array.





C.
  Swap the drive and initialize the disk.


Explanation:

The next action that the administrator should take once the rebuild is finished is to swap the drive and initialize the disk. This is to replace the faulty disk that has a solid amber light, which indicates a predictive failure or a SMART error. Initializing the disk will prepare it for use by the RAID controller and add it to the array. The administrator should also monitor the array status and performance after swapping the drive.

Reference:

https://www.salvagedata.com/how-to-rebuild-a-failed-raid/

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?


A. RAIDO <br>


B. RAID1


C. RAID 5


D. RAID 6


E. RAID 10





E.
  RAID 10


Explanation:

RAID 10 is the best option to deploy a database server that provides the highest performance with fault tolerance. RAID 10 is a type of RAID level that combines RAID 1 (mirroring) and RAID 0 (striping) to create an array of mirrored stripes. RAID 10 offers high performance by distributing data across multiple disks in parallel (striping), which improves read/write speed and I/O operations. RAID 10 also offers fault tolerance by duplicating data across two or more disks in each stripe (mirroring), which provides redundancy and data protection in case of disk failure. RAID 10 requires at least four disks to implement and has a high storage overhead, as half of the disk space is used for mirroring.

References:

[CompTIA Server+ Certification Exam Objectives]

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?


A. Cancelled change request


B. Change request postponement


C. Emergency change request


D. Privilege change request


E. User permission change request





C.
  Emergency change request


Explanation:

An emergency change request is a type of change management activity that is used to address urgent issues that pose a significant risk to the organization, such as a system breach. An emergency change request requires immediate action and approval, and it may bypass some of the normal change management procedures, such as testing, documentation, or stakeholder communication12.

References = 1: Change Management Plans:

A Definitive Guide -Indeed

(https://www.indeed.com/career-advice/career-development/change-management-activities)

2: The 10 Best Change Management Activities - Connecteam

(https://connecteam.com/top-10-change-management-activities/)

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?


A. Installing the latest patches


B. Closing open ports


C. Enabling antivirus protection


D. Enabling a NIDS





A.
  Installing the latest patches


Explanation:

The best way to limit an attacker from exploiting a zero-day vulnerability that is impacting a service enabled on a server OS is to install the latest patches. Patches are updates that fix bugs, improve security, or add features to software. Installing patches can help prevent attackers from exploiting known vulnerabilities that have been fixed by the software vendor. A zero-day vulnerability is a vulnerability that is unknown to the vendor or the public until it is exploited by an attacker. Therefore, installing patches as soon as they are available can reduce the window of opportunity for attackers to exploit zero-day vulnerabilities.

Reference:

https://www.ibm.com/cloud/learn/patch-management

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?


A. Configure a RAID array.


B. Replace the current drives with higher-capacity disks.


C. Implement FCoE for more storage capacity.


D. Connect the server to a SAN





D.
  Connect the server to a SAN


Explanation:

A SAN (Storage Area Network) is a network of storage devices that can provide shared storage capacity to multiple servers. By connecting the server to a SAN, the administrator can increase the storage capacity of the server without adding any internal disks or expansion cards. This solution can be implemented quickly and without any downtime. Verified References: [What is a SAN and how does it differ from NAS?]

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?


A. Round robin


B. Link aggregation


C. Network address translation


D. Bridged networking





A.
  Round robin


Explanation:

Round robin is a load balancing technique that distributes requests among multiple web nodes in a circular order. It ensures that each web node receives an equal amount of requests and improves the availability and performance of the web application.

Verified References:

[Round robin], [Load balancing]

Which of the following actions should a server administrator take once a new backup scheme has been configured?


A. Overwrite the backups


B. Clone the configuration


C. Run a restore test


D. Check the media integrity





C.
  Run a restore test


Explanation:

The action that the server administrator should take once a new backup scheme has been configured is to run a restore test. A restore test is a process of verifying that the backup data can be successfully recovered and restored to its original location or a different location. A restore test can help ensure that the backup scheme is working properly, that the backup data is valid and consistent, and that there are no errors or issues during the recovery process. A restore test should be performed periodically and after any changes to the backup configuration or environment.

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?


A. VLAN


B. vNIC


C. Link aggregation


D. Failover





C.
  Link aggregation


Explanation:

Link aggregation is the best option to implement on the new server to ensure the least amount of network downtime but a good amount of network speed. Link aggregation is a technique of combining multiple physical network interfaces into one logical interface to increase bandwidth, redundancy, and load balancing. Link aggregation can improve the performance and availability of the server by allowing it to use more than one network path for data transmission and failover in case of link failure. Link aggregation can be implemented using various protocols, such as IEEE 802.3ad (LACP), Cisco EtherChannel, or Linux bonding.

References:

[CompTIA Server+ Certification Exam Objectives], Domain 4.0: Networking, Objective 4.1: Given a scenario, configure network settings for servers.

Which of the following should be created to understand how long data is stored and how frequently data backups should be scheduled?


A. Retention policies


B. Service-level agreement


C. Life-cycle management


D. Mean time to recover





A.
  Retention policies

An administrator is installing a new server and OS. After installing the OS, the administrator logs in and wants to quickly check the network configuration. Which of the following is the best command to use to accomplish this task?


A. tracert


B. telnet


C. ipconfig


D. ping





C.
  ipconfig

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed? (Select two).


A. 53


B. 80


C. 389


D. 443


E. 445


F. 3389


G. 8080





D.
  443

F.
  3389

Which of me following should be placed at the top of a Bash script to ensure it can be executed?


A. bash


B. !execute


C. #!


D. @eacho off





C.
  #!


Page 2 out of 29 Pages
Previous