Practice Free SK0-005 Exam Online Questions
Which of the following commands should a systems administrator use to create a batch script to map multiple shares’?
- A . nbtstat
- B . netuse
- C . tracert
- D . netstst
B
Explanation:
The net use command is a Windows command that can be used to create a batch script to map multiple shares. The net use command can connect or disconnect a computer from a shared resource, such as a network drive or a printer, or display information about computer connections.
The syntax of the net use command is:
net use [devicename | *] [\computernamesharename[u0003volume] [password | *]]
[/user:[domainname]username] [/user:[dotted domain name]username]
[/user:[[username@dotted domain name] [/savecred] [/smartcard] [{/delete | /persistent:{yes |
no}}]
where:
devicename = the drive letter or printer port to assign to the shared resource computername = the name of the computer that provides access to the shared resource sharename = the name of the shared resource password = the password needed to access the shared resource /user = specifies a different username to make the connection /savecred = stores the provided credentials for future use /smartcard = uses a smart card for authentication /delete = cancels a network connection and removes the connection from the list of persistent connections /persistent = controls whether the connection is restored at logon
To create a batch script to map multiple shares, you can use the net use command with different drive letters and share names, for example:
net use W: \computer1share1 net use X: \computer2share2 net use Y: \computer3share3 You can also add other options, such as passwords, usernames, or persistence, as needed. To save the batch script, you can use Notepad or any text editor and save the file with a .bat extension12.
Reference:
1 https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/net-use
2 https://www.watchingthenet.com/create-a-batch-file-to-map-drives-folders.html
A server administrator purchased a single license key to use for all the new servers that will be imaged this year.
Which of the following MOST likely refers to the licensing type that will be used?
- A . Per socket
- B . Open-source
- C . Per concurrent user
- D . Volume
D
Explanation:
This is the most likely licensing type that will be used because volume licensing allows a single license key to be used for multiple installations of a software product. Volume licensing is typically used by organizations that need to deploy software to a large number of devices or users.
Reference: https://www.microsoft.com/en-us/licensing/licensing-programs/volume-licensing-programs
An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists.
Which of the following is the most likely reason for this issue?
- A . The server has high page utilization.
- B . The server has high disk latency.
- C . The application is single-threaded.
- D . The application cannot be virtualized.
C
Explanation:
A single-threaded application is an application that can only execute one task or process at a time. A single-threaded application can only utilize one CPU core, regardless of how many cores are available or assigned to the virtual machine. Therefore, adding more vCPU cores to the VM will not improve the performance of the application, as it will still be limited by the speed and capacity of one core12. To troubleshoot this issue, the administrator should check if the application is single-threaded or multi-threaded. This can be done by using tools such as Task Manager, Performance Monitor, or Process Explorer on Windows, or top, htop, or ps on Linux34.
If the application is single-threaded, the administrator should consider the following options:
Reduce the number of vCPU cores on the VM to match the number of threads that the application can use. This can help avoid CPU contention and co-stop issues that may arise from having too many vCPUs relative to the number of physical cores on the host5.
Upgrade the physical CPU on the host to a faster or newer model that can provide higher clock speed and performance for the single core that the application uses.
Optimize the application code or configuration to make it more efficient or multi-threaded, if possible. This can help the application take advantage of multiple cores and improve its performance.
An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator’s theory proved to be correct.
Which of the following should be the next step to troubleshoot the issue?
- A . Document the findings and actions.
- B . Escalate the issue to the management team.
- C . Implement the solution.
- D . Establish an action plan.
D
Explanation:
The next step to troubleshoot the issue after developing and testing a theory is to establish an action plan. This involves identifying the steps needed to implement the solution, estimating the time and resources required, and evaluating the potential risks and impacts of the solution. Documenting the findings and actions, escalating the issue to the management team, or implementing the solution are steps that should be done after establishing an action plan.
Reference: [CompTIA Server+ Certification Exam Objectives], Domain 6.0: Disaster Recovery, Objective 6.2: Explain troubleshooting theory and methodologies.
A server that recently received hardware upgrades has begun to experience random BSOD conditions.
Which of the following are likely causes of the issue? (Choose two.)
- A . Faulty memory
- B . Data partition error
- C . Incorrectly seated memory
- D . Incompatible disk speed
- E . Uninitialized disk
- F . Overallocated memory
AC
Explanation:
Faulty memory and incorrectly seated memory are likely causes of the random BSOD conditions on the server. Memory is one of the most common hardware components that can cause BSOD (Blue Screen of Death) errors on Windows systems. BSOD errors occur when the system encounters a fatal error that prevents it from continuing to operate normally. Memory errors can be caused by faulty or incompatible memory modules that have physical defects or manufacturing flaws. Memory errors can also be caused by incorrectly seated memory modules that are not properly inserted or locked into the memory slots on the motherboard. This can result in loose or poor connections between the memory modules and the motherboard.
Which of the following concepts refers to prioritizing a connection that had previously worked successfully?
- A . Round robin
- B . SCP
- C . MRU
- D . Link aggregation
C
Explanation:
MRU, or Most Recently Used, is a concept that refers to prioritizing a connection that had previously worked successfully. It is often used in load balancing algorithms to distribute the workload among multiple servers or paths. MRU assumes that the most recently used connection is the most likely to be available and efficient, and therefore assigns the next request to that connection. This can help reduce latency and improve performance12. The other options are incorrect because they do not refer to prioritizing a previous connection. Round robin is a concept that refers to distributing the workload equally among all available connections in a circular order12. SCP, or Secure Copy Protocol, is a concept that refers to transferring files securely between hosts using encryption3. Link aggregation is a concept that refers to combining multiple physical links into a single logical link to increase bandwidth and redundancy4.
Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?
- A . Overprovisioning
- B . Scalability
- C . Thin clients
- D . Resource Monitor
D
Explanation:
Resource Monitor is a tool that allows administrators to monitor the system’s CPU, memory, disk, and network usage in real-time, ensuring that maximum resources are being efficiently utilized. Resource Monitor (Answer D): This tool provides real-time insights into resource utilization and can help ensure resources are not under- or over-utilized.
Overprovisioning (Option A): Refers to allocating more resources than physically available but doesn’t directly monitor resource usage.
Scalability (Option B): Refers to the ability to increase or decrease resources based on demand.
Thin clients (Option C): Refer to lightweight computers that depend on servers for processing power,
unrelated to resource utilization monitoring.
CompTIA Server+
Reference: This topic is related to SK0-005 Objective 2.4: Monitor server performance.
Which of the following BEST describes overprovisioning in a virtual server environment?
- A . Committing more virtual resources to virtual machines than there are physical resources present
- B . Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
- C . Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
- D . Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
B
Explanation:
This is the best definition of overprovisioning in a virtual server environment because it means allocating more CPU, memory, disk, or network resources to the virtual machines than what is actually available on the physical host. This can lead to performance issues and resource contention.
Reference: https://www.hpe.com/us/en/insights/articles/10-virtualization-mistakes-everyone-makes-1808.html
A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:
userGhost:!# nmap localhost
Nmap scan report for localhost (127.0.0.1)
Host is up (0.001 ms latency).
Not shown: 1023 closed ports
PORT STATE SERVICE
3306 open mysql
Which of the following should the technician perform next to allow access?
- A . Check the database server
- B . Change the database password
- C . Open port 3306 on the server
- D . Edit the network firewall rules
D
Explanation:
Since port 3306 (MySQL) is open on the local workstation as confirmed by the Nmap scan, the next logical step is to check network firewall rules. It’s possible that the workstation’s firewall or network-level security rules are blocking outbound or inbound traffic on port 3306, which is required for database access.
Edit the network firewall rules (Answer D): Ensuring the firewall allows traffic on port 3306 is the appropriate next step, especially since other workstations are not having the same issue.
Checking the database server (Option A): This is unnecessary because other workstations can access the server, confirming the server itself is functioning correctly.
Changing the database password (Option B): This would not resolve the issue of one workstation being unable to connect while others can.
Opening port 3306 on the server (Option C): The problem isn’t server-side since other machines can
connect without issue.
CompTIA Server+
Reference: This topic relates to SK0-005 Objective 2.4: Troubleshoot common server problems.
Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?
- A . Bolting door lock
- B . Combination door lock
- C . Electronic door lock
- D . Biometric door lock
C
Explanation:
Lock Type: The type of lock utilizing key fobs or key cards is an electronic door lock (Option C).
Electronic locks use electronic credentials (such as key cards) for access control.
Reference: CompTIA Server+ Guide, Chapter 5: Security, Section 5. 1. 2 (Access Control)
