Practice Free SK0-005 Exam Online Questions
A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used.
Which of the following would BEST enable this correlation?
- A . Partitioning
- B . Deduplication
- C . Disk quotas
- D . Compression
C
Explanation:
The best way to ensure that there is a more direct relationship between the number of users using the server and the amount of space that might be used is to implement disk quotas. Disk quotas are a feature that allows a server administrator to limit the amount of disk space that each user or group can use on a file server. Disk quotas can help manage storage utilization, prevent disk space exhaustion, and enforce fair usage policies. Disk quotas can also provide reports and alerts on disk space usage and quota status.
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?
- A . Bridged
- B . NAT
- C . Host only
- D . vSwitch
B
Explanation:
The method that would allow multiple VMs to share the same host IP address is NAT. NAT (Network Address Translation) is a technique that allows multiple devices to use a single public IP address by mapping their private IP addresses to different port numbers. NAT can be used for VM networking to enable multiple VMs on the same host to access the internet or other networks using the host’s IP address. NAT can also provide security benefits by hiding the VMs’ private IP addresses from external networks.
Reference: https://www.virtualbox.org/manual/ch06.html
A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running.
Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).
- A . The power supply
- B . The CPU
- C . The hard drive
- D . The GPU
- E . The cache
- F . The RAM
AC
Explanation:
The power supply and the hard drive are two components that can most likely be swapped out while the server is still running, if they support hot swapping or hot plugging. Hot swapping or hot plugging means that the device can be added or removed without shutting down the system. The operating system automatically recognizes the changes that have been made. This feature is useful for minimizing downtime and improving availability. The CPU, the GPU, the cache, and the RAM are not hot swappable and require the system to be powered off before replacing them.
Reference:
https://www.geeksforgeeks.org/what-is-hot-swapping/
https://www.howtogeek.com/268249/what-is-hot-swapping-and-what-devices-support-it/
A storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system.
Which of the following best describes the impact?
- A . The read and write performance will be impacted.
- B . The read performance will be impacted.
- C . The performance will not be impacted.
- D . The write performance will be impacted.
D
Explanation:
A RAID controller battery is used to protect the data in the cache memory of the controller in case of a power failure. The cache memory allows the controller to improve the write performance by buffering the data and writing it to the disk in an optimized way. However, if the battery fails, the controller will switch to write-through mode, which means it will write the data directly to the disk without caching. This will reduce the write performance and increase the latency of the system
A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall.
Which of the following ports must remain open?
- A . 25
- B . 443
- C . 3389
- D . 8080
B
Explanation:
The port that must remain open for a secure website is port 443. Port 443 is used by Hypertext Transfer Protocol Secure (HTTPS), which is an extension of HTTP that encrypts and authenticates the communication between a web server and a web browser. HTTPS ensures that the data transmitted over the web is protected from eavesdropping, tampering, or spoofing. Therefore, port 443 must remain open for a secure website to function properly.
Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 2, Lesson 2.2, Objective 2.2
A technician installed a kernel upgrade to a Linux server. The server now crashes regularly.
Which of the following is the most likely cause?
- A . Necessary dependencies were installed for multiple architectures.
- B . There is not enough hard drive space.
- C . The server is infected with a virus.
- D . Some modules are not compatible.
D
Explanation:
A kernel upgrade is a process of updating the core component of a Linux operating system that manages the hardware, memory, processes, and drivers. A kernel upgrade can improve the performance, security, and compatibility of the system, but it can also introduce errors if some modules are not compatible with the new kernel version. Modules are pieces of code that can be loaded and unloaded into the kernel to provide additional functionality or support for specific devices. If a module is not compatible with the kernel, it can cause crashes or instability.
Reference: CompTIA Server+ SK0-005 Certification Study Guide, Chapter 4, Lesson 4.2, Objective 4.2
A server administrator needs to deploy five VMs, all of which must have the same type of configuration.
Which of the following would be the MOST efficient way to perform this task?
- A . Snapshot a VM.
- B . Use a physical host.
- C . Perform a P2V conversion.
- D . Use a VM template.
D
Explanation:
Deploying a virtual machine from a template creates a virtual machine that is a copy of the template. The new virtual machine has the virtual hardware, installed software, and other properties that are configured for the template.
Reference: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vm_admin.doc/GUID-8254CD05-CC06-491D-BA56-A773A32A8130.html
The most efficient way to perform the task of deploying five VMs with the same type of configuration is to use a VM template. A template is a preconfigured virtual machine image that contains an operating system, applications, settings, and other components. A template can be used to create multiple identical or customized VMs quickly and easily, without having to install and configure each VM from scratch. A template can save time and ensure consistency across VMs.
Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?
- A . End-to-end encryption
- B . Encryption in transit
- C . Encryption at rest
- D . Public key encryption
C
Explanation:
Encryption at rest is a type of encryption methodology that would most likely be used to ensure encrypted data cannot be retrieved if a device is stolen. Encryption at rest is a process of encrypting stored data on a device such as a hard drive, SSD, USB flash drive, or mobile device. This way, if the device is lost or stolen, the data cannot be accessed without the encryption key or password. Encryption at rest can be implemented using software tools such as BitLocker on Windows or FileVault on Mac OS, or hardware features such as self-encrypting drives or Trusted Platform Module chips. End-to-end encryption is a type of encryption methodology that ensures encrypted data cannot be intercepted or modified by third parties during transmission over a network. Encryption in transit is a type of encryption methodology that protects encrypted data while it is moving from one location to another over a network. Public key encryption is a type of encryption algorithm that uses a pair of keys: a public key that can be shared with anyone and a private key that is kept secret by the owner.
Reference:
https://www.howtogeek.com/196541/bitlocker-101-what-it-is-how-it-works-and-how-to-use-it/
https://www.howtogeek.com/443611/how-to-encrypt-your-macs-system-drive-removable-devices-and-individual-files/
https://www.howtogeek.com/428483/what-is-end-to-end-encryption-and-why-does-it-matter/
https://www.howtogeek.com/195877/what-is-encryption-and-how-does-it-work/
Network connectivity to a server was lost when it was pulled from the rack during maintenance.
Which of the following should the server administrator use to prevent this situation in the future?
- A . Cable management
- B . Rail kits
- C . A wireless connection
- D . A power distribution unit
A
Explanation:
The server administrator should use cable management to prevent network connectivity loss when pulling a server from the rack during maintenance. Cable management is a practice of organizing and securing the cables that connect various devices and components in a system. Cable management can help improve airflow, reduce clutter, prevent tangling, and avoid accidental disconnection or damage of cables. Cable management can be done using various tools and techniques, such as cable ties, cable trays, cable labels, cable organizers, or cable ducts.
A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it.
Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?
- A . Reinstall the OS.
- B . Wipe the drives.
- C . Degauss the drives.
- D . Update the IP schema.
B
Explanation:
Wiping the drives is the most appropriate step to recycle and reuse the system drives. Wiping the drives means erasing all the data on the drives and overwriting them with random or meaningless data. This can help prevent data leakage, comply with regulations, and prepare the drives for a new installation or configuration. Wiping the drives is different from deleting or formatting the drives, which only remove the references to the data but not the data itself.
Reference: https://www.comptia.org/training/resources/exam-objectives/comptia-server-sk0-005-exam-objectives (Objective 1.3)
