Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

SK0-005 CompTIA Server+ Certification Exam Questions and Answers

Questions 4

The Chief Information Officer of a data center is concerned that transmissions from the building can be detected from the outside. Which of the

following would resolve this concern? (Select TWO).

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Buy Now
Questions 5

A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing. Which of the following should the administrator do NEXT once the rebuild is finished?

Options:

A.

Restore the server from a snapshot.

B.

Restore the server from backup.

C.

Swap the drive and initialize the disk.

D.

Swap the drive and initialize the array.

Buy Now
Questions 6

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Buy Now
Questions 7

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

Options:

A.

RAIDO

B.

RAID1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 8

A technician re working on a Linux server and re trying to access another server over the network. The technician gets server not found message when trying to execute ping servername but no error messages when using ping servername. Domain.com. Which of the following should the technician do to resolve the error?

Options:

A.

Configure the domain search variable

B.

Change the permissions on resolv. conf

C.

Configure the DNS address

D.

Modify nsswitch. Conf.

Buy Now
Questions 9

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Buy Now
Questions 10

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Buy Now
Questions 11

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

Options:

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Buy Now
Questions 12

A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth. Which of the following solutions would be the BEST option to increase the speed of this NIC?

Options:

A.

Link aggregation

B.

Heartbeat

C.

Most recently used

D.

Active-active

Buy Now
Questions 13

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?

Options:

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Buy Now
Questions 14

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

Options:

A.

RFID

B.

Proximity readers

C.

Signal blocking

D.

Camouflage

E.

Reflective glass

F.

Bollards

Buy Now
Questions 15

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?

Options:

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Buy Now
Questions 16

A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights. Which of the following is most likely the issue?

Options:

A.

A single-mode fiber cable is used in place of multimode.

B.

The switchport is on the wrong virtual SAN.

C.

The HBA driver needs to be installed on the server.

D.

The zoning on the fiber switch is wrong.

Buy Now
Questions 17

Winch of the following is a type of replication in which all files are replicated, all the time?

Options:

A.

Constant

B.

Application consistent

C.

Synthetic full

D.

Full

Buy Now
Questions 18

Which of the following actions should a server administrator take once a new backup scheme has been configured?

Options:

A.

Overwrite the backups

B.

Clone the configuration

C.

Run a restore test

D.

Check the media integrity

Buy Now
Questions 19

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Buy Now
Questions 20

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?

Options:

A.

VLAN

B.

vNIC

C.

Link aggregation

D.

Failover

Buy Now
Questions 21

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

Options:

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Buy Now
Questions 22

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?

Options:

A.

Encrypt all network traffic

B.

Implement MFA on all the servers with encrypted data

C.

Block the servers from using an encrypted USB

D.

Implement port security on the switches

Buy Now
Questions 23

A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?

Options:

A.

CIFS

B.

FTP

C.

SFTP

D.

NFS

Buy Now
Questions 24

A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?

Options:

A.

DLP

B.

A port scanner

C.

Anti-malware

D.

A sniffer

Buy Now
Questions 25

A technician is attempting to resolve an issue with a file server that is unable to download a file Given the following output:

SK0-005 Question 25

Which of the following would best allow this file to be read?

Options:

A.

chown

B.

sestatus

C.

setenforce

D.

getenforce

E.

chmod

Buy Now
Questions 26

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

Options:

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216,176,128.10

Buy Now
Questions 27

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

Options:

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Buy Now
Questions 28

A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?

Options:

A.

Variable

B.

Loop

C.

Comparator

D.

Conditional

Buy Now
Questions 29

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

Options:

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Buy Now
Questions 30

A systems administrator is setting up a server farm for a new company. The company has a public range of IP addresses and uses the addresses internally. Which of the following IP addresses best fits this scenario?

Options:

A.

10.3.7.27

B.

127.0.0.1

C.

192.168.7.1

D.

216.176.128.10

Buy Now
Questions 31

A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server’s host routing table to resolve the Internet connectivity issues.

INSTRUCTIONS

Perform the following steps:

1. Click on the proxy server to display its routing table.

2. Modify the appropriate route entries to resolve the Internet connectivity issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

SK0-005 Question 31

SK0-005 Question 31

Options:

Buy Now
Questions 32

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Buy Now
Questions 33

A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?

Options:

A.

A local firewall is blocking authentication requests.

B.

The users have expired passwords

C.

The system clock is off by more than five minutes

D.

The server has no access to the LDAP host

Buy Now
Questions 34

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Buy Now
Questions 35

Hosting data in different regional locations but not moving it for long periods of time describes:

Options:

A.

a cold site.

B.

data at rest.

C.

on-site retention.

D.

off-site storage.

Buy Now
Questions 36

A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?

Options:

A.

Perform scheduled chkdsk tests.

B.

Purchase matching hardware and clone the disk.

C.

Upgrade the hard disk to SSD.

D.

Perform quarterly backups.

Buy Now
Questions 37

IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Select three).

Options:

A.

Run a vulnerability scanner on the server.

B.

Repartition the hard drive that houses the database.

C.

Patch the vulnerability.

D.

Enable a host firewall.

E.

Reformat the OS on the server.

F.

Update the antivirus software.

G.

Remove the database software.

Buy Now
Questions 38

A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt. Which of the following should the technician have checked prior to installing the firmware?

Options:

A.

DLF configuration

B.

MBR failure

C.

ECC support

D.

MD5 checksum

Buy Now
Questions 39

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Buy Now
Questions 40

A company needs a media server set up that provides the highest availability with a minimum requirement of at least 10TB. The company purchased five HDDs, each with a 4TB

capacity. Which of the options would provide the highest fault tolerance and meet the requirements?

Options:

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Buy Now
Questions 41

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

  • HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Buy Now
Questions 42

Corporate policy mandates that logs from all servers be available for review regardless of the state of the server. Which of the following must be configured to comply with this policy?

Options:

A.

Aggregation

B.

Subscription

C.

Merging

D.

Collection

Buy Now
Questions 43

A user has been unable to authenticate to the company's external, web-based database after clicking a link in an email that required the user to change the account password. Which of the following steps should the company take next?

Options:

A.

Disable the user's account and inform the security team.

B.

Create a new log-in to the external database.

C.

Ask the user to use the link again to reset the password.

D.

Reset the user's password and ask the user to log in again.

Buy Now
Questions 44

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163 mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

Options:

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Buy Now
Questions 45

Which of the following is an example of load balancing?

Options:

A.

Round robin

B.

Active-active

C.

Active-passive

D.

Failover

Buy Now
Questions 46

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?

Options:

A.

Messaging

B.

Application

C.

Print

D.

Database

Buy Now
Questions 47

A server administrator recently installed a kernel update to test functionality Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly instated kernel version?

Options:

A.

Edit the bootloader configuration file and change the first Kernel stanza to reflect the file location for the last known-good kernel files.

B.

Perform a complete OS reinstall on the server using the same media that was used during the initial install.

C.

Edit the bootloader configuration file and move the newest kernel update stanza lo the end of the file.

D.

Set a BIOS password to prevent server technicians from making any changes to the system.

Buy Now
Questions 48

A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Buy Now
Questions 49

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?

Options:

A.

SD card

B.

Optical

C.

Network

D.

USB

Buy Now
Questions 50

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

Options:

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Buy Now
Questions 51

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

Options:

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Buy Now
Questions 52

A technician is sizing a new server and, for service reasons, needs as many hot-swappable components as possible. Which of the following server components can most commonly be replaced without downtime? (Select three).

Options:

A.

Drives

B.

Fans

C.

CMOSIC

D.

Processor

E.

Power supplies

F.

Motherboard

G.

Memory

Buy Now
Questions 53

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

Options:

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Buy Now
Questions 54

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an £s> prompt. When of the following is the MOST likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive

B.

The UEFI boot was interrupted by a missing Linux boot file

C.

The BIOS could not find a bootable hard disk

D.

The BIOS firmware needs to be upgraded

Buy Now
Questions 55

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

Options:

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Buy Now
Questions 56

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Buy Now
Questions 57

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

Options:

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

Buy Now
Questions 58

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?

Options:

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Buy Now
Questions 59

Which of the following is an architectural reinforcement that is used to attempt to conceal the exterior of an organization?

Options:

A.

Fencing

B.

Bollards

C.

Camouflage

D.

Reflective glass

Buy Now
Questions 60

Which of the following BEST describes a warm site?

Options:

A.

The site has all infrastructure and live data.

B.

The site has all infrastructure and some data

C.

The site has partially redundant infrastructure and no network connectivity

D.

The site has partial infrastructure and some data.

Buy Now
Questions 61

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Options:

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Buy Now
Questions 62

Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

Options:

A.

Midplane

B.

Active backplane

C.

Passive backplane

D.

Management module

Buy Now
Questions 63

A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?

Options:

A.

The server is In the process of shutting down, so fan speed operations have been defaulted to high.

B.

An incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate.

C.

A fan failure has occurred, and the other fans have increased speed to compensate.

D.

The server is utilizing more memory than the other servers, so it has increased the fans to compensate.

Buy Now
Questions 64

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Buy Now
Questions 65

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Options:

A.

Syslog

B.

DLP

C.

SIEM

D.

HIPS

Buy Now
Questions 66

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Buy Now
Questions 67

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Buy Now
Questions 68

Users report that the FinanceApp software is not running, and they need immediate

access. Issues with the FinanceApp software occur every week after the IT team

completes server system updates. The users, however, do not want to contact the

help desk every time the issue occurs. The users also report the new MarketApp

software is not usable when it crashes, which can cause significant downtime. The

technician who restarted the MarketApp software noticed it is running under a test

account, which is a likely cause of the crashes.

INSTRUCTIONS

Using the Services menu provided, modify the appropriate application services to

remedy the stated issues.

SK0-005 Question 68

Options:

Buy Now
Questions 69

An organization implements split encryption keys for sensitive files. Which of the following types of risks does this mitigate?

Options:

A.

Hardware failure

B.

Marware

C.

Data corruption

D.

Insider threat

Buy Now
Questions 70

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

Options:

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

Buy Now
Questions 71

SK0-005 Question 71

Which of the following actions should the server administrator perform on the server?

Options:

A.

Close ports 69 and 1010 and rerun the scan.

B.

Close ports 80 and 443 and rerun the scan.

C.

Close port 3389 and rerun the scan.

D.

Close all ports and rerun the scan.

Buy Now
Questions 72

A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?

Options:

A.

PKI

B.

SSL

C.

LDAP

D.

DNS

Buy Now
Questions 73

Which of the following techniques can be configured on a server for network redundancy?

Options:

A.

Clustering

B.

Vitalizing

C.

Cloning

D.

Teaming

Buy Now
Questions 74

A site is considered a warm site when it:

  • has basic technical facilities connected to it.

  • has faulty air conditioning that is awaiting service.

  • is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Buy Now
Questions 75

A remote, embedded loT server is having a Linux OS upgrade installed. Which of the following is the best method to stage the new media for the default boot device of the server?

Options:

A.

Copy and send an SSD to the site.

B.

Copy and send a DVD to the site.

C.

Copy and send a SATA drive to the site.

D.

Copy and send a microSD card to the site.

Buy Now
Questions 76

Which of the following is typical of software licensing in the cloud?

Options:

A.

Per socket

B.

Perpetual

C.

Subscription-based

D.

Site-based

Buy Now
Questions 77

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Options:

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Buy Now
Questions 78

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:

SK0-005 Question 78

Which of the following caused the issue?

Options:

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Buy Now
Questions 79

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

Options:

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Buy Now
Questions 80

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

Options:

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Buy Now
Questions 81

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

Options:

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Buy Now
Questions 82

Which of the following authentication types defines credentials as "something you have"?

Options:

A.

Swipe pattern

B.

PIN

C.

Fingerprint

D.

Smart card

Buy Now
Questions 83

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

Options:

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Buy Now
Questions 84

A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?

Options:

A.

Upgrade the application package

B.

Tighten the rules on the firewall

C.

Install antivirus software

D.

Patch the server OS

Buy Now
Questions 85

A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?

Options:

A.

Partitioning

B.

Deduplication

C.

Disk quotas

D.

Compression

Buy Now
Questions 86

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Buy Now
Questions 87

Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?

Options:

A.

Connect the server to a KVM

B.

Use cable management

C.

Connect the server to a redundant network

D.

Connect the server to a UPS

Buy Now
Questions 88

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Buy Now
Questions 89

A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?

Options:

A.

Reseating any expansion cards in the server

B.

Replacing the failing hard drive

C.

Reinstalling the heat sink with new thermal paste

D.

Restoring the server from the latest full backup

Buy Now
Questions 90

Which of the following licenses would MOST likely include vendor assistance?

Options:

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Buy Now
Questions 91

A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is MOST likely causing the issue?

Options:

A.

Telnet connections are disabled on the server.

B.

Role-based access control is misconfigured.

C.

There are misconfigured firewall rules.

D.

Group policies have not been applied.

Buy Now
Questions 92

A software developer is unable to reach an internal website. The developer's attempt to ping the FQDN returns the following IP address: 104.18.17.32. Which of the following is the most likely reason for this result?

Options:

A.

The NIC is set to DHCP.

B.

The default gateway is misconfigured.

C.

The primary DNS server is 8.8.8.8.

D.

There is a manual entry in the hosts file.

Buy Now
Questions 93

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

Options:

A.

Private

B.

Hybrid

C.

Community

D.

Public

Buy Now
Questions 94

Which of the following BEST describes overprovisioning in a virtual server environment?

Options:

A.

Committing more virtual resources to virtual machines than there are physical resources present

B.

Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion

C.

Allowing a virtual machine to utilize more resources than are allocated to it based on the server load

D.

Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure

Buy Now
Questions 95

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Buy Now
Questions 96

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

Options:

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Buy Now
Questions 97

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

Options:

A.

A firewall

B.

An antivirus

C.

AHIDS

D.

User account control

Buy Now
Questions 98

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

Options:

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Buy Now
Questions 99

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

Options:

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Buy Now
Questions 100

Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?

Options:

A.

SLA

B.

BIA

C.

RTO

D.

MTTR

Buy Now
Questions 101

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Options:

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

Buy Now
Questions 102

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Buy Now
Questions 103

A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?

Options:

A.

0

B.

1

C.

5

D.

6

Buy Now
Questions 104

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Buy Now
Questions 105

A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?

Options:

A.

Network connectivity on the server

B.

LVM status on the server

C.

Disk space in the /var directory

D.

YUM dependencies

Buy Now
Questions 106

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?

Options:

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Buy Now
Questions 107

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Buy Now
Questions 108

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Buy Now
Questions 109

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Buy Now
Questions 110

An administrator has been asked to disable CPU hyperthreading on a server to satisfy a licensing issue. Which of the following best describes how the administrator will likely perform this action?

Options:

A.

Use a RDP/VNC session.

B.

Modify the startup configuration.

C.

Use a PowerSheII/Bash script.

D.

Use the BIOS/UEFI setup.

Buy Now
Questions 111

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Buy Now
Questions 112

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Buy Now
Questions 113

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

Options:

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Buy Now
Questions 114

Which of the following backup types should be chosen for database servers?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Buy Now
Questions 115

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

Options:

A.

Firmware incompatibility

B.

CPU overheating

C.

LED indicators

D.

ESD issues

Buy Now
Questions 116

A systems administrator is attempting to install a package on a server. After downloading the package from the internet and trying to launch it, the installation is blocked by the antivirus on the server. Which of the following must be completed before launching the installation package again?

Options:

A.

Creating an exclusion to the antivirus for the application

B.

Disabling real-time scanning by the antivirus

C.

Validating the checksum for the downloaded installation package

D.

Checking for corruption of the downloaded installation package

Buy Now
Questions 117

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Buy Now
Questions 118

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Buy Now
Questions 119

A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?

Options:

A.

Asynchronous

B.

Incremental

C.

Application consistent

D.

Constant

Buy Now
Questions 120

Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?

Options:

A.

Run the tracert command from a workstation.

B.

Examine the DNS to see if the new server record exists.

C.

Correct the missing DHCP scope.

D.

Update the workstation hosts file.

Buy Now
Questions 121

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Buy Now
Questions 122

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Buy Now
Questions 123

Which of the following backup types resets the archive bit each time it is run?

Options:

A.

Differential

B.

Snapshot

C.

Incremental

D.

Synthic full

Buy Now
Questions 124

Which of the following is an architectural reinforcement that attempts to conceal the interior of an organization?

Options:

A.

Bollards

B.

Signal blocking

C.

Reflective glass

D.

Data center camouflage

Buy Now
Exam Code: SK0-005
Exam Name: CompTIA Server+ Certification Exam
Last Update: Apr 25, 2024
Questions: 414

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now SK0-005 testing engine

PDF (Q&A)

$35  $99.99
buy now SK0-005 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 26 Apr 2024