SK0-005 Practice Test Questions

347 Questions


Which of the following life-cycle management phases deals with a server that is no longer in operation?


A. End-of-life


B. Disposal


C. Usage


D. Procurement





A.
  End-of-life

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?


A. Lockout


B. Length


C. Complexity


D. Minimum age





B.
  Length

Which of the following BEST describes overprovisioning in a virtual server environment?


A. Committing more virtual resources to virtual machines than there are physical resources present


B. Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion


C. Allowing a virtual machine to utilize more resources than are allocated to it based on the server load


D. Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure





A.
  Committing more virtual resources to virtual machines than there are physical resources present

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?


A. 25


B. 443


C. 3389


D. 8080





B.
  443

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?


A. Telnet connections are disabled on the server.


B. Role-based access control is misconfigured.


C. There are misconfigured firewall rules.


D. Group policies have not been applied.





C.
  There are misconfigured firewall rules.

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?


A. Use a RDP/VNC session.


B. Modify the startup configuration.


C. Use a PowerSheII/Bash script.


D. Use the BIOS/UEFI setup.





D.
  Use the BIOS/UEFI setup.

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity must be maximized. Which of the following RAID levels should the server administrator implement?


A. 0


B. 1


C. 5


D. 6


E. 10





A.
  0

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?


A. Disable the user's account and inform the security team.


B. Create a new log-in to the external database.


C. Ask the user to use the link again to reset the password.


D. Reset the user's password and ask the user to log in again.





A.
  Disable the user's account and inform the security team.

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?


A. Have the facility inspect and inventory the tapes on a regular basis.


B. Have duplicate equipment available at the cold site.


C. Retrieve the tapes from the cold site and test them.


D. Use the test equipment at the cold site to read the tapes.





C.
  Retrieve the tapes from the cold site and test them.

Which of the following concepts is in use when dual power supplies are connected to different power sources?


A. Fault tolerance


B. Active-passive


C. Component redundancy


D. Heartbeat


E. Link aggregation





A.
  Fault tolerance

Which of the following describes a configuration in winch both nodes of a redundant system respond to service requests whenever possible?


A. Active-passive


B. Failover


C. Active-active


D. Fallback





C.
  Active-active

Which of the following backup methods protects all the changes that have occurred since the last full backup?


A. Incremental


B. Archive


C. Differential


D. Snapshot





C.
  Differential


Page 7 out of 29 Pages
Previous