Practice Free SK0-005 Exam Online Questions
Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?
- A . RTO
- B . SLA
- C . MTBF
- D . MTTR
A
Explanation:
RTO stands for Recovery Time Objective and it is a metric that defines the maximum acceptable amount of time that a system or service can be unavailable after a disaster or disruption. RTO is part of the business continuity planning and disaster recovery planning processes. RTO ensures a guarantee of the amount of time it will take to restore a downed service by setting a target or goal for recovery. RTO can vary depending on the criticality and priority of the service.
Reference: https://www.comptia.org/training/resources/exam-objectives/comptia-server-sk0-005-exam-objectives (Objective 3.3)
A company needs a media server set up that provides the highest availability with a minimum requirement of at least 10TB. The company purchased five HDDs, each with a 4TB capacity.
Which of the options would provide the highest fault tolerance and meet the requirements?
- A . RAID 0
- B . RAID 5
- C . RAID 6
- D . RAID 10
C
Explanation:
RAID 6 is a RAID level that uses disk striping with two parity blocks distributed across all member disks. It can tolerate the failure of up to two disks without losing any data. RAID 6 can provide a minimum of 10TB of usable storage space with five 4TB disks, as the formula for calculating the RAID 6 capacity is (n-2) x Smin, where n is the number of disks and Smin is the smallest disk size. In this case, the RAID 6 capacity is (5-2) x 4TB = 12TB.
Reference: CompTIA Server+ Certification Exam Objectives1, page 8
RAID Levels and Types Explained: Advantages and Disadvantages2 RAID Levels & Fault Tolerance3
A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes.
Which of the following techniques would best accomplish this goal?
- A . V2V
- B . P2V
- C . V2P
- D . P2P
B
Explanation:
P2V (Physical to Virtual) refers to converting a physical server into a virtual machine, which can then be deployed to a remote cloud environment. This is the best method for duplicating a physical server to a virtual environment for disaster recovery.
P2V (Answer B): This is the process of converting a physical server to a virtual machine for migration to the cloud.
V2V (Option A): Refers to virtual-to-virtual migration, which is not applicable in this case.
V2P (Option C): Refers to converting a virtual machine back to physical, which is not needed here.
P2P (Option D): Physical-to-physical migration is not relevant for cloud-based disaster recovery.
CompTIA Server+
Reference: This topic relates to SK0-005 Objective 1. 3: Explain virtualization concepts.
An administrator is installing a new file server that has four drive bays available.
Which of the following RAID types would provide the MOST storage as well as disk redundancy?
- A . RAIDO
- B . RAID 1
- C . RAID 5
- D . RAID 10
C
Explanation:
RAID 5 is a RAID level that provides striping with parity, which means that data is distributed across all disks with one disk storing parity information for error correction. RAID 5 can tolerate one disk failure without losing data. RAID 5 provides the most storage as well as disk redundancy out of the four RAID levels given, since it only uses one disk for parity and the rest for data. For example, if four 200GB drives are used in a RAID 5 array, the total storage capacity would be 600GB (200GB x 3), while in RAID 0 it would be 800GB (200GB x 4), in RAID 1 it would be 200GB (200GB x 1), and in RAID 10 it would be 400GB (200GB x 2).
Reference: https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_5
An application server’s power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array.
Which of the following is the MOST likely cause of the issue?
- A . Backplane failure
- B . CMOS failure
- C . Misconfigured RAID
- D . Cache battery failure
D
Explanation:
A cache battery is a battery that provides backup power to the cache memory of a disk array controller. The cache memory stores data that is waiting to be written to the disk array. If the cache battery fails, the data in the cache memory may be lost or corrupted when the power is interrupted.
Verified Reference: [Cache battery], [Disk array controller]
A data center employee shows a driver’s license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door.
This is an example of.
- A . mantrap.
- B . a bollard
- C . geofencing
- D . RFID.
A
Explanation:
A mantrap is a security device that consists of a small space with two sets of interlocking doors, such that the first set of doors must close before the second one opens. A mantrap can be used to control access to a data center by verifying the identity and weight of the person entering. A bollard is a sturdy post that prevents vehicles from entering a restricted area. Geofencing is a technology that uses GPS or RFID to create a virtual boundary around a location and trigger an action when a device crosses it. RFID is a technology that uses radio waves to identify and track objects or people.
Reference:
https://www.techopedia.com/definition/16293/mantrap
https://www.techopedia.com/definition/1437/bollard
https://www.techopedia.com/definition/23961/geofencing
https://www.techopedia.com/definition/506/radio-frequency-identification-rfid
Which of the following security risks provides unauthorized access to an application?
- A . Backdoor
- B . Data corruption
- C . Insider threat
- D . Social engineering
A
Explanation:
A backdoor is a security risk that provides unauthorized access to an application. A backdoor is a hidden or undocumented way of bypassing the normal authentication or encryption mechanisms of an application, allowing an attacker to gain remote access, execute commands, or steal data. A backdoor can be created intentionally by the developer, maliciously by an attacker, or unintentionally by a programming error.
Reference: CompTIA Server+ Certification Exam Objectives, Domain 5.0: Security, Objective 5.2: Given a scenario, apply logical access control methods.
A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors.
To attempt to correct the errors, the technician should FIRST ensure:
- A . the correct firewall zone is active
- B . the latest firmware was applied
- C . NTP is running on the database system
- D . the correct dependencies are installed
C
Explanation:
The first thing that the technician should ensure to correct the database synchronization errors is that NTP is running on the database system. NTP (Network Time Protocol) is a protocol that synchronizes the clocks of network devices with a reference time source, such as an atomic clock or a GPS receiver. NTP ensures that all devices on a network have accurate and consistent time settings, which can affect various functions and applications. Database synchronization is a process of maintaining data consistency and integrity across multiple database servers or instances. Database synchronization can depend on accurate time settings, as time stamps are often used to determine which data is newer or older, and which data should be updated or overwritten. If NTP is not running on the database system, it may cause time drift or discrepancy between different database servers or instances, which can result in synchronization errors or data conflicts.
Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?
- A . Loop
- B . Variable
- C . Comparator
- D . Conditional
A
Explanation:
A loop is a programming construct used to repeat a block of code multiple times. In this case, if a function needs to run ten times, a loop (such as a for loop or while loop) would be the appropriate choice.
Loop (Answer A): This allows the function to be executed repeatedly without writing redundant code.
Variable (Option B): A variable is used to store data, but it doesn’t handle repetition.
Comparator (Option C): Comparators are used to compare values, not for repeating code. Conditional (Option D): Conditionals (if, else) are used for decision-making, not repeating actions multiple times.
CompTIA Server+
Reference: This topic is related to SK0-005 Objective 1. 1: Understand basic scripting and automation concepts.
A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time.
Which of the following server roles will the administrator MOST likely need to install?
- A . Messaging
- B . Application
- C . Print
- D . Database
D
Explanation:
Few people are expected to use the database at the same time and users don’t need to customize the design of the database.
Reference: https://support.microsoft.com/en-us/office/ways-to-share-an-access-desktop-database-03822632-da43-4d8f-ba2a-68da245a0446
The server role that the administrator will most likely need to install for a server that will hold large amounts of information and will need to be accessed by multiple users at the same time is database. A database is a collection of structured data that can be stored, queried, manipulated, and analyzed using various methods and tools. A database server is a server that hosts one or more databases and provides access to them over a network. A database server can handle large amounts of information and support concurrent requests from multiple users or applications.
