Practice Free SK0-005 Exam Online Questions
A technician runs top on a dual-core server and notes the following conditions:
top C- 14:32:27, 364 days, 14 users load average 60.5 12.4 13.6
Which of the following actions should the administrator take?
- A . Schedule a mandatory reboot of the server
- B . Wait for the load average to come back down on its own
- C . Identify the runaway process or processes
- D . Request that users log off the server
C
Explanation:
The administrator should identify the runaway process or processes that are causing high load average on the server. Load average is a metric that indicates how many processes are either running on or waiting for the CPU at any given time. A high load average means that there are more processes than available CPU cores, resulting in poor performance and slow response time. A runaway process is a process that consumes excessive CPU resources without terminating or releasing them. A runaway process can be caused by various factors, such as programming errors, infinite loops, memory leaks, etc. To identify a runaway process, the administrator can use tools such as top, ps, or htop to monitor CPU usage and process status. To stop a runaway process, the administrator can use commands such as kill, pkill, or killall to send signals to terminate it.
Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?
- A . Usage
- B . End-of-life
- C . Procurement
- D . Disposal
D
Explanation:
Disposal is the part of the asset life cycle that can cause the greatest number of issues in relation to PII exposure. PII stands for personally identifiable information, which is any data that can be used to identify a specific individual, such as name, address, phone number, email, social security number, etc. PII exposure is the unauthorized access or disclosure of PII, which can result in identity theft, fraud, or other harms to the individuals whose data is compromised. Disposal is the process of getting rid of an asset that is no longer needed or useful, such as a server, a hard drive, or a mobile device. If the disposal is not done properly, the PII stored on the asset may still be accessible or recoverable by unauthorized parties, such as hackers, thieves, or competitors. Therefore, it is important to follow best practices for secure disposal of assets that contain PII, such as wiping, encrypting, shredding, or physically destroying the data storage media
A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk.
Which of the following options should the administrator use?
- A . VMFS
- B . ZFS
- C . GPT
- D . MBR
- E . LVM
C
Explanation:
Scenario: Installing Windows on an 8TB drive, aiming for a single 8TB partition.
Solution: Use the GPT (GUID Partition Table) option (Option C):
GPT supports larger partitions (up to 18.4 million TB) compared to MBR (limited to 2TB).
VMFS, ZFS, and LVM are unrelated to the partitioning scheme in Windows.
Reference: CompTIA Server+ Guide, Chapter 3: Hardware, Section 3.3.1 (Partitioning)
An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available.
Which of the following would be the FASTEST solution to implement with no downtime?
- A . Configure a RAID array.
- B . Replace the current drives with higher-capacity disks.
- C . Implement FCoE for more storage capacity.
- D . Connect the server to a SAN
D
Explanation:
A SAN (Storage Area Network) is a network of storage devices that can provide shared storage capacity to multiple servers. By connecting the server to a SAN, the administrator can increase the storage capacity of the server without adding any internal disks or expansion cards. This solution can be implemented quickly and without any downtime.
Verified Reference: [What is a SAN and how does it differ from NAS?]
An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available.
Which of the following would be the FASTEST solution to implement with no downtime?
- A . Configure a RAID array.
- B . Replace the current drives with higher-capacity disks.
- C . Implement FCoE for more storage capacity.
- D . Connect the server to a SAN
D
Explanation:
A SAN (Storage Area Network) is a network of storage devices that can provide shared storage capacity to multiple servers. By connecting the server to a SAN, the administrator can increase the storage capacity of the server without adding any internal disks or expansion cards. This solution can be implemented quickly and without any downtime.
Verified Reference: [What is a SAN and how does it differ from NAS?]
A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server.
Which of the following must be completed before launching the installation package again?
- A . Creating an exclusion to the antivirus for the application
- B . Disabling real-time scanning by the antivirus
- C . Validating the checksum for the downloaded installation package
- D . Checking for corruption of the downloaded installation package
C
Explanation:
A checksum is a value that is calculated from a data set to verify its integrity and authenticity. A checksum can be used to compare a downloaded installation package with the original source to ensure that the package has not been corrupted or tampered with during the download or transmission process. If the checksums match, then the package is safe to install. If the checksums do not match, then the package may be infected with malware or contain errors that could cause installation problems. Therefore, validating the checksum for the downloaded installation package is a necessary step before launching the installation again12
1: CompTIA Server+ Certification Exam Objectives
2: How to Verify File Integrity Using Checksums on Linux
A server administrator needs to create a new folder on a file server that only specific users can access.
Which of the following BEST describes how the server administrator can accomplish this task?
- A . Create a group that includes all users and assign it to an ACL.
- B . Assign individual permissions on the folder to each user.
- C . Create a group that includes all users and assign the proper permissions.
- D . Assign ownership on the folder for each user.
C
Explanation:
The top portion of the dialog box lists the users and/or groups that have access to the file or folder.
Reference: https://www.uwec.edu/kb/article/drives-establishing-windows-file-and-folder-level-permissions/
A company is implementing a check-in desk to heighten physical security.
Which of the following access controls would be the most appropriate to facilitate this implementation?
- A . Security guards
- B . Security cameras
- C . Bollards
- D . An access control vestibule
D
Explanation:
An access control vestibule, or mantrap, is a type of physical access control that provides a space between two sets of interlocking doors. It is designed to prevent unauthorized individuals from following authorized individuals into facilities with controlled access, such as a check-in desk. The vestibule can be configured to limit the number of individuals who enter the controlled area and to verify their authorization for physical access1. The other options are incorrect because they are not as effective as an access control vestibule in facilitating the implementation of a check-in
desk. Security guards, security cameras, and bollards are useful for monitoring, deterring, or preventing unauthorized access, but they do not provide the same level of control and verification as an access control vestibule
A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components.
Which of the following should the technician do to restore operations with minimal downtime?
- A . Reinstall the OS and programs.
- B . Configure old drives to RAID.
- C . Reconfigure the RAID.
- D . Install from backup.
C
Explanation:
RAID (Redundant Array of Independent Disks) is a technology that combines multiple hard drives into a logical unit that provides improved performance, reliability, or capacity. RAID can be implemented by hardware, software, or a combination of both. Hardware RAID uses a dedicated controller to manage the RAID array, while software RAID uses the operating system or a driver to do the same1. In this scenario, the technician noted that the RAID hard drives were functional while troubleshooting a motherboard failure. This means that the data on the drives was not corrupted or lost. However, the technician installed a spare motherboard with similar specifications and used the original components. This means that the new motherboard may not have the same RAID configuration as the old one, or it may not recognize the existing RAID array at all. Therefore, the technician needs to reconfigure the RAID in order to restore operations with minimal downtime.
Which of the following asset management documents is used to identify the location of a serves within a data center?
- A . Infrastructure diagram
- B . Workflow diagram
- C . Rack layout
- D . Service manual
C
Explanation:
A rack layout is a document that shows the physical location and arrangement of servers and other devices within a rack. It can include information such as server names, IP addresses, power consumption, and cable connections. A rack layout can help identify and locate servers easily and efficiently in a data center.
Verified Reference: [Rack layout], [Data center]
