Practice Free SK0-005 Exam Online Questions
An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes.
Which of the following would BEST help answer the server performance question9
- A . Server performance thresholds
- B . A server baseline
- C . A hardware compatibility list
- D . An application service-level agreement
B
Explanation:
A server baseline is a set of metrics that represents the normal performance and behavior of a server under a specific workload and configuration. A server baseline can help answer the server performance question by comparing the current performance with the previous performance before the upgrade. This can help identify any changes or issues that may have affected the server performance.
Reference: https://www.comptia.org/training/resources/exam-objectives/comptia-server-sk0-005-exam-objectives (Objective 4.2)
Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration.
Which of the following is the BEST way to protect the data from leaking?
- A . Utilize privacy screens.
- B . Implement disk quotas.
- C . Install a DLP solution.
- D . Enforce the lock-screen feature.
C
Explanation:
Components of a Data Loss Solution
Reference: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/
The best way to protect the data from leaking is to install a DLP solution. A DLP (Data Loss Prevention) solution is a software that helps businesses prevent confidential data from being leaked or stolen by unauthorized parties. A DLP solution can identify, monitor, and protect data as it moves across networks and devices, such as endpoints, email, web, cloud applications, or removable media. A DLP solution can also enforce security policies based on content and context for data in use, in motion, and at rest. A DLP solution can detect and prevent data breaches by using various techniques, such as content inspection, contextual analysis, encryption, blocking, alerting, warning, quarantining, or other remediation actions.
A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com.
Which of the following should the technician do to resolve the error?
- A . Configure the domain search variable
- B . Change the permissions on resolv. conf
- C . Configure the DNS address
- D . Modify nsswitch. Conf.
A
Explanation:
The domain search variable is used to specify a list of domains that are appended to a hostname when resolving it. If the servername is not fully qualified, the resolver will try each domain in the list until it finds a match or fails. By configuring the domain search variable, the technician can avoid typing the full domain name every time they want to ping a server.
Verified Reference: [How to configure DNS suffixes on Linux systems]
A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter.
Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
- A . Remote desktop
- B . IP KVM
- C . A console connection
- D . A virtual administration console
- E . Remote drive access
- F . A crash cart
DB
Explanation:
The methods that would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server are remote desktop and IP KVM. Remote desktop is a feature that allows a user to access and control another computer over a network using a graphical user interface (GUI). Remote desktop can enable remote administration, troubleshooting, and maintenance of servers without requiring physical presence at the server location. IP KVM (Internet Protocol Keyboard Video Mouse) is a device that allows a user to access and control multiple servers over a network using a single keyboard, monitor, and mouse. IP KVM can provide remote access to servers regardless of their operating system or power state, and can also support virtual media and serial console functions.
Reference: https://www.blackbox.be/en-be/page/27559/Resources/Technical-Resources/Black-Box-Explains/kvm/ Benefits-of-using-KVM-over-IP
A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application.
Which of the following is preventing the users from accessing the application server?
- A . NAT
- B . ICMP
- C . VLAN
- D . NIDS
C
Explanation:
This is the most likely cause of preventing the users from accessing the application server because a VLAN is a logical segmentation of a network that isolates traffic based on certain criteria. If the human resources department and the application server are on different VLANs, they will not be able to communicate with each other unless there is a router or a switch that can route between VLANs.
Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/inter-vlan-routing/41860-howto-L3-intervlanrouting.html
Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
- A . Telnet
- B . Robocopy
- C . XCOPY
- D . SCP
D
Explanation:
The administrator should use SCP to transfer log files from a Linux server to a Windows workstation. SCP (Secure Copy Protocol) is a protocol that allows secure file transfer between two devices using SSH (Secure Shell) encryption. SCP can transfer files between different operating systems, such as Linux and Windows, as long as both devices have an SSH client installed. SCP can also preserve file attributes, such as permissions and timestamps, during the transfer.
An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards.
Which of the following would best facilitate the copy process?
- A . Robocopy
- B . SCP
- C . Drag and drop
- D . FTP
A
Explanation:
Robocopy (Robust File Copy) is a command-line tool in Windows that is designed for reliable copy or mirroring of files, and it can handle a broader range of file names and paths, including those that do not conform to traditional Windows file-naming standards. It’s specifically designed to handle complex file copy demands and offers a wide range of options that can be tailored for different scenarios, which makes it suitable for the task mentioned. SCP (Secure Copy Protocol), Drag and Drop, and FTP (File Transfer Protocol) are all methods that can be used to copy files, but they might not handle non-standard Windows file names as well as Robocopy.
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration.
Which of the following technologies is the new connection using?
- A . iSCSI
- B . eSATA
- C . NFS
- D . FcoE
A
Explanation:
Reference: https://docs.oracle.com/cd/E26996_01/E18549/html/BABHBFHA.html
Which of the follwing, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).
- A . Administrator password
- B . Group Policy Object
- C . Root password
- D . SELInux
- E . Bootloader password
- F . BIOS/UEFI password
EF
Explanation:
These are two methods that can prevent a user from installing an OS on a server if properly configured. A bootloader password is a password that protects the bootloader from unauthorized access or modification. The bootloader is a program that loads the operating system into memory when the system boots up. If a user does not know the bootloader password, they cannot change the boot order or boot from another device such as a CD-ROM or USB drive that contains an OS installation media. A BIOS/UEFI password is a password that protects the BIOS (Basic Input Output System) or UEFI (Unified Extensible Firmware Interface) from unauthorized access or modification. The BIOS or UEFI is a firmware that initializes and configures the hardware components of the system before loading
A staff member who a monitoring a data center reports one rack is experiencing higher temperatures than the racks next to it, despite the hardware in each rack being the same.
Which of the following actions would MOST likely remediate the heal issue?
- A . Installing blanking panels in all the empty rack spaces
- B . installing an additional POU and spreading out the power cables
- C . Installing servers on the shelves instead of sliding rails
- D . installing front bezels on all the server’s m the rack
A
Explanation:
Blanking panels are metal or plastic plates that are installed in the empty spaces of a rack to prevent hot air from recirculating back to the front of the rack. This can improve the airflow and cooling efficiency of the rack and reduce the heat generated by the servers.
Verified Reference: [Blanking panel], [Rack cooling]
