SK0-005 Practice Test Questions

347 Questions


Which of the following would be BEST to help protect an organization against social engineering?


A. More complex passwords


B. Recurring training and support


C. Single sign-on


D. An updated code of conduct to enforce social media





B.
  Recurring training and support

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?


A. IP KVM


B. VNC


C. A crash cart


D. RDP


E. SSH





A.
  IP KVM

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)


A. RFID


B. Proximity readers


C. Signal blocking


D. Camouflage


E. Reflective glass


F. Bollards





C.
  Signal blocking

E.
  Reflective glass

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?


A. VBS


B. Shell


C. Java


D. PowerShell


E. Batch





B.
  Shell

Which of the following actions should a server administrator take once a new backup scheme has been configured?


A. Overwrite the backups


B. Clone the configuration


C. Run a restore test


D. Check the media integrity





C.
  Run a restore test

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?


A. A warm site


B. A hot site


C. Cloud recovery


D. A cold site





B.
  A hot site

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?


A. Alternate the direction of the airflow


B. Install the heaviest server at the bottom of the rack


C. Place a UPS at the top of the rack


D. Leave 1U of space between each server





B.
  Install the heaviest server at the bottom of the rack

Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?


A. Heartbeat


B. Failback


C. Redundancy


D. Load balancing





B.
  Failback

Which of the following techniques can be configured on a server for network redundancy?


A. Clustering


B. Vitalizing


C. Cloning


D. Teaming





D.
  Teaming

Which of the following policies would be BEST to deter a brute-force login attack?


A. Password complexity


B. Password reuse


C. Account age threshold


D. Account lockout threshold





D.
  Account lockout threshold

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?


A. RAID 0


B. RAID 1


C. RAID 5


D. RAID 6





A.
  RAID 0

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?


A. Management port


B. Crash cart


C. IP KVM


D. KVM





C.
  IP KVM


Page 3 out of 29 Pages
Previous