Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

SK0-005 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SK0-005 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA Server+ Certification Exam
  • Last Update: Oct 30, 2025
  • Questions and Answers: 493
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SK0-005 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SK0-005 Practice Exam Questions with Answers CompTIA Server+ Certification Exam Certification

Question # 6

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Full Access
Question # 7

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server notfoundmessage when trying to execute ping servername but no error messages when usingpingservername. Domain.com. Which ofthefollowing should the technician do to resolve the error?

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Full Access
Question # 8

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Full Access
Question # 9

Users are able to connect to the wireless network, but they are unable to access the internet. The network administrator verifies connectivity to all network devices, and there are no ISP outages. The server administrator removes the old address leases from the active leases pool, which allows users to access the internet. Which of the following is most likely causing the internet issue?

A.

THe DHCP exclusion needs to be removed.

B.

The DHCP scope is full.

C.

The DHCP scope options are misconfigured.

D.

The DHCP lease times are too short.

E.

The DHCP reservations need to be configured.

Full Access
Question # 10

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Full Access
Question # 11

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

A.

The UPS batteries were overcharged.

B.

Redundant power supplies require 220V power

C.

Both power supplies were connected to the same power feed

D.

The power supplies werenot cross-connected

Full Access
Question # 12

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Full Access
Question # 13

A server shut down after an extended power outage. When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped. Which of the following is the MOST likely cause of the issue?

A.

The keyboard is defective and needs to be replaced.

B.

The system failed before the display card initialized.

C.

The power supply is faulty and is shutting down the system.

D.

The NIC has failed, and the system cannot make a network connection.

Full Access
Question # 14

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Full Access
Question # 15

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Full Access
Question # 16

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 17

Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?

A.

Tabletcp

B.

Backup recovery test

C.

Lrverail over

D.

Hot-site visit audit

Full Access
Question # 18

An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an initiating from the file server for the print server, a different IP address is returned, which of the following is MOST Likely the cause?

A.

A firewall blockingthe ICMP echo reply.

B.

The DHCP scope option is incorrect

C.

The DNS entriesforthe print server are incorrect.

D.

The hosts file misconfigured.

Full Access
Question # 19

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Full Access
Question # 20

A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?

A.

Implement rollback procedures.

B.

Upgrade the drivers.

C.

Reinstall the OS.

D.

Reboot the server.

Full Access
Question # 21

Which ofthefollowingshouldatechnician verify FIRST before decommissioning and wipingafile server?

A.

Themedia destructionmethod

B.

Therecycling poke?

C.

Asset management documentation

D.

Non-utilization

Full Access
Question # 22

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Full Access
Question # 23

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Full Access
Question # 24

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 25

Which of the following licensing models was created by software companies in response to the increasing density of processors?

A.

Per-instance

B.

Per-server

C.

per-user

D.

per-core

Full Access
Question # 26

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

A.

Link aggregation

B.

Heartbeat

C.

Most recently used

D.

Active-active

Full Access
Question # 27

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Full Access
Question # 28

A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?

A.

Reinstall the OS.

B.

Wipe the drives.

C.

Degauss the drives.

D.

Update the IP schema.

Full Access
Question # 29

Which of the following backup types resets the archive bit each time it is run?

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthic full

Full Access
Question # 30

A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?

A.

Rack

B.

Virtual

C.

Tower

D.

Blade

Full Access
Question # 31

Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?

A.

Humidity control system

B.

Sensors

C.

Fire suppression

D.

Heating system

Full Access
Question # 32

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Full Access
Question # 33

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Full Access
Question # 34

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Full Access
Question # 35

Which of the following concepts is in use when dual power supplies are connected to different power sources?

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Full Access
Question # 36

Which of the following is the MOST secure method to access servers located in remote branch offices?

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Full Access
Question # 37

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an£s> prompt. When of the following is the MOST likely cause of this issue?

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Full Access
Question # 38

Which of the following describes a configuration inwinch both nodes of a redundant system respond to service requests whenever possible?

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Full Access
Question # 39

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

A.

0

B.

1

C.

5

D.

6

Full Access
Question # 40

A server administrator purchased a single license key to use for all the new servers that will be imaged this year. Which of the following MOST likely refers to the licensing type that will be used?

A.

Per socket

B.

Open-source

C.

Per concurrent user

D.

Volume

Full Access
Question # 41

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

A.

Fibre Channel

B.

FCoE

C.

iSCSI

D.

eSATA

Full Access
Question # 42

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Full Access
Question # 43

A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?

A.

Security guards

B.

Security cameras

C.

Bollards

D.

An access control vestibule

Full Access
Question # 44

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

A.

A full, weekly backup with daily open-file backups

B.

A full,weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Full Access
Question # 45

While running a local network security scan an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication lo be encrypted. Which of the following ports should be closed to stop the deartext communication?

A.

21

B.

22

C.

443

D.

3389

Full Access
Question # 46

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

A.

Print

B.

File

C.

Database

D.

Messaging

Full Access
Question # 47

A user logs in to a Linux server and attempts to run the following command:

sudo emacs /root/file

However the user gets the following message:

User userid is not allowed to execute Temacs' on this server. Which of the following would BEST allow the user to find out which commands can be used?

A.

visudo I grep userid

B.

sudo -1 -U userid

C.

cat /etc/passwd

D.

userlist I grep userid

Full Access
Question # 48

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Full Access
Question # 49

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?

A.

Messaging

B.

Application

C.

Print

D.

Database

Full Access
Question # 50

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Full Access
Question # 51

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Full Access
Question # 52

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Full Access
Question # 53

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Full Access
Question # 54

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Full Access
Question # 55

Which of the following describes the installation of an OS contained entirely within another OS installation?

A.

Host

B.

Bridge

C.

Hypervisor

D.

Guest

Full Access
Question # 56

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Full Access
Question # 57

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

Full Access
Question # 58

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

A.

25

B.

443

C.

3389

D.

8080

Full Access
Question # 59

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Full Access
Question # 60

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

A.

Configure a firewall

B.

Close the unneeded ports

C.

Install a HIDS

D.

Disable unneeded services.

Full Access
Question # 61

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

A.

Install security cameras

B.

Utilize security guards

C.

Install bollards

D.

Install a mantrap

Full Access
Question # 62

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Full Access
Question # 63

Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?

A.

Check the power supplies

B.

Review the log files.

C.

Reinstall the ESX server.

D.

Reseat the processors.

Full Access
Question # 64

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:

A.

hardware is UEFI compliant

B.

volume is formatted as GPT

C.

volume is formatted as MBR

D.

volume is spanned across multiple physical disk drives

Full Access
Question # 65

Which of the following policies would be BEST to deter a brute-force login attack?

A.

Password complexity

B.

Password reuse

C.

Account age threshold

D.

Account lockout threshold

Full Access
Question # 66

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

A.

SSO

B.

LDAP

C.

TACACS

D.

MFA

Full Access
Question # 67

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163<UP, BROADCAST,RUNNING,MULTICAST> mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Full Access
Question # 68

Which of the following, if properly configured, would prevent a user from installing an OS on a server? (Select TWO).

A.

Administrator password

B.

Group Policy Object

C.

Root password

D.

SELInux

E.

Bootloader password

F.

BIOS/UEFI password

Full Access
Question # 69

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Full Access
Question # 70

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Full Access
Question # 71

A technician is unable to access a server’s package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)

A.

The server has an architecture mismatch

B.

The system time is not synchronized

C.

The technician does not have sufficient privileges

D.

The external firewall is blocking access

E.

The default gateway is incorrect

F.

The local system log file is full

Full Access
Question # 72

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?

A.

Management port

B.

Crash cart

C.

IP KVM

D.

KVM

Full Access
Question # 73

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Full Access
Question # 74

A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution?

A.

Copy the fileshare to an LTO-4 tape drive

B.

Configure a new incremental backup job for the fileshare

C.

Create an additional partition and move a copy of the fileshare

D.

Create a snapshot of the fileshare

Full Access
Question # 75

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Full Access
Question # 76

Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

A.

Telnet

B.

Robocopy

C.

XCOPY

D.

SCP

Full Access
Question # 77

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Full Access
Question # 78

Which of the following techniques can be configured on a server for network redundancy?

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Full Access
Question # 79

Which of the following tools will analyze network logs in real time to report on suspicious log events?

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Full Access
Question # 80

A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?

A.

Determine whether there is a common element in the symptoms causing multiple problems.

B.

Perform a root cause analysis.

C.

Make one change at a time and test.

D.

Document the findings, actions, and outcomes throughout the process.

Full Access
Question # 81

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Full Access
Question # 82

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials.The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Full Access
Question # 83

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Full Access
Question # 84

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

SK0-005 question answer

Full Access
Question # 85

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Full Access
Question # 86

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Full Access
Question # 87

A server administrator must respond to tickets within a certain amount of time. The server administrator needs to adhere to the:

A.

BIA.

B.

RTO.

C.

MTTR.

D.

SLA.

Full Access
Question # 88

A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?

A.

Take a snapshot of the original VM

B.

Clone the original VM

C.

Convert the original VM to use dynamic disks

D.

Perform a P2V of the original VM

Full Access
Question # 89

A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?

A.

11.251.196.241

B.

171.245.198.241

C.

172.16.19.241

D.

193.168.145.241

Full Access
Question # 90

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

A.

The server has a faulty power supply

B.

The server has a CMOS battery failure

C.

The server requires OS updates

D.

The server has a malfunctioning LED panel

E.

The servers do not have NTP configured

F.

The time synchronization service is disabled on the servers

Full Access
Question # 91

A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?

A.

MTBF

B.

RPO

C.

MTTR

D.

RFC

Full Access
Question # 92

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Full Access
Question # 93

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

A.

IP address: 192.168.10.2/24Default gateway: 192.168.10.1

B.

IP address: 192.168.1.2/24Default gateway: 192.168.10.1

C.

IP address: 192.168.10.3/24Default gateway: 192.168.20.1

D.

IP address: 192.168.10.24/24Default gateway: 192.168.30.1

Full Access
Question # 94

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning

Full Access
Question # 95

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Full Access
Question # 96

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Full Access
Question # 97

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Full Access
Question # 98

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

Full Access
Question # 99

Which of the following should a server administrator use when writing a script with a function that needs to be run ten times?

A.

Loop

B.

Variable

C.

Comparator

D.

Conditional

Full Access
Question # 100

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Full Access
Question # 101

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 102

An administrator connects a server to an external gigabit switch, but the server can only get a speed of 100Mbps. Which of the following is the most likely cause of this issue?

A.

Defective network cable

B.

Port security

C.

Incorrect IP subnet

D.

Wrong VLAN

Full Access
Question # 103

A college is planning for disaster recovery and needs to have access at all times to student data, which contains PII (Personally Identifiable Information). Which of the following would be the most appropriate for the college?

A.

A warm site with private cloud backup

B.

A warm site with public cloud backup

C.

A cold site with public cloud backup

D.

A hot site with private cloud backup

Full Access
Question # 104

Which of the following technologies best describes Hyper-V Replica?

A.

High availability

B.

VMotion

C.

Live migration

D.

Disaster recovery

Full Access
Question # 105

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Full Access
Question # 106

A technician is troubleshooting a database server that has 12 external disk arrays. Multiple disks are in a degraded state. The server is in a remote colocation facility and has on-site support. The technician notices all of the external storage arrays are degraded, but the internal arrays are functional. Which of the following steps should the technician take next to quickly address this issue?

A.

Notify the users of the downtime and reboot the server from the RDP connection.

B.

Notify the management team about the issue and travel to the colocation site with spare disks and RAID controllers.

C.

Access the server with RDP and start the RAID utility software to rebuild the arrays.

D.

Restore the data for the affected disks and notify the users of the estimated recovery time.

Full Access
Question # 107

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Full Access
Question # 108

Which of the following should a technician verify first before decommissioning and wiping a file server?

A.

The media destruction method

B.

The recycling policy

C.

Asset management documentation

D.

Document retention policy

Full Access
Question # 109

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Full Access
Question # 110

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Full Access
Question # 111

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

A.

File

Full Access
Question # 112

A certain application initially uses 1TB of drive space, but this is expected to double each year for the next two years. Which of the following is the minimum number of 1TB drives that are needed in a RAID 5 configuration?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 113

A server in the data center reportedly has a BSOD and is not responding. The server needs to be rebooted. Which of the following is the best method to reboot the server remotely?

A.

Crash cart

B.

KVM

C.

IRMI

D.

shutdown -r

Full Access
Question # 114

Which of the following describes when a site is considered a warm site?

A.

It has basic technical facilities connected to it.

B.

It has faulty air conditioning that is awaiting service.

C.

It is almost ready to take over all operations from the primary site.

D.

It is fully operational and continuously providing services.

Full Access
Question # 115

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Full Access
Question # 116

Which of the following supports virtualization?

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

Full Access
Question # 117

A systems administrator notices that a SAN is running out of space. There is no additional funding in the budget to upgrade the storage space. Which of the following will significantly reduce the storage space with the least effort? (Select two).

A.

Configuring compression

B.

Deleting old and unused files

C.

Increasing the number of IOPS

D.

Decreasing the RAID level

E.

Enabling deduplication

F.

Upgrading the filesystem type

Full Access
Question # 118

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Full Access
Question # 119

A technician is installing a large number of servers in a data center with limited rack space. Which of the following would accomplish this goal while using the least amount of space?

A.

Blade enclosure

B.

Rack balancing

C.

Rack mount

D.

Rail kits

Full Access
Question # 120

A technician is configuring a server rack that will hold ten blade servers. Which of the following safety concerns should be observed? (Select three).

A.

Floor load limitations

B.

Rack balancing

C.

Proper lifting techniques

D.

Power connector type

E.

KVM placement

F.

Cable management

G.

UPS power requirements

Full Access
Question # 121

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?

A.

Give the user "read and execute" rights to the file.

B.

Give the user "modify" rights to the file.

C.

Give the user "list folder contents" rights to the folder.

D.

Give the user "full control" rights to the folder.

Full Access
Question # 122

A systems administrator notices the fans are running at full speed in a newly upgraded server. Which of the following should be done to address this issue?

A.

Replace the PSU.

B.

Reseat the video card.

C.

Reseat the RAM.

D.

Reattach the heat sink.

Full Access
Question # 123

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

A.

RAIDO

B.

RAID1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Full Access
Question # 124

A bad actor leaves a USB drive with malicious code on it in a company's parking lot. Which of the following describes this scenario?

A.

Hacking

B.

Insider threat

C.

Phishing

D.

Social engineering

Full Access
Question # 125

An administrator notices a server is offline. Upon checking the console, the administrator discovers the server is stuck at:

Configuring Memory.............

After a reboot, the server still exhibits the same behavior. The administrator is able to log in to the OOB remote management but is unable to log in to the server. Which of the following is the most likely cause of this issue?

A.

A DIMM has failed

B.

The VRAM is insufficient

C.

The RAID cache has failed

D.

The BIOS needs to be updated

Full Access
Question # 126

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure.The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Full Access
Question # 127

A technician has moved a data drive from a new Windows server to an older Windows server. The hardware recognizes the drive, but the data is not visible to the OS. Which of the following is the most likely cause of the issue?

A.

The disk uses GPT.

B.

The partition is formatted with ext4.

C.

The partition is formatted with FAT32.

D.

The disk uses MBR.

Full Access
Question # 128

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Full Access
Question # 129

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

Full Access
Question # 130

Which of the following is a benefit of failover NIC teaming?

A.

Decreased latency

B.

Increased transmission size

C.

Increased system resources

D.

Increased fault tolerance

Full Access
Question # 131

Which of the following authentication types defines credentials as "something you have"?

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Full Access
Question # 132

A new 40GB NIC has just been installed in a server but is not detected within the Windows server OS. Which of the following would most likely fix the issue?

A.

Update the firmware on the NIC.

B.

Update the server OS.

C.

Update the remote management console.

D.

Update the switch firmware.

Full Access
Question # 133

An administrator reviews a new server that was received from a vendor and notes the OS has been installed to a two-drive array configured with RAID 0. Which of the following best describes what will happen if a drive in that array fails?

A.

The server will gracefully shut down.

B.

The server will immediately crash.

C.

The server will operate but in read-only mode.

D.

The server will continue to operate normally.

Full Access
Question # 134

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Full Access
Question # 135

A technician is configuring a server with eight available drive bays. The technician wants a combination of the most redundancy and the maximum available storage. Which of the following RAID levels should the technician use?

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 136

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Full Access
Question # 137

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Full Access
Question # 138

A Linux server was recently updated. The server now stops during the boot process with a blank screen and an fs> prompt. Which of the following is the most likely cause of this issue?

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Full Access
Question # 139

A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator most likely implement?

A.

Round robin

B.

Link aggregation

C.

Most recently used

D.

Heartbeat

Full Access
Question # 140

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

A.

Drive

B.

Database

C.

Folder

D.

File

Full Access
Question # 141

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

A.

0

B.

1

C.

5

D.

10

Full Access
Question # 142

Which of the following security risks provides unauthorized access to an application?

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Full Access
Question # 143

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Full Access
Question # 144

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Full Access
Question # 145

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Full Access
Question # 146

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Full Access
Question # 147

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

Full Access