Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

SK0-005 CompTIA Server+ Certification Exam Questions and Answers

Questions 4

Which of the following backup types should be chosen for database servers?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Open file

Buy Now
Questions 5

A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?

Options:

A.

Install the latest patches.

B.

Disable unneeded hardware.

C.

Set the boot order.

D.

Enable a BIOS password.

Buy Now
Questions 6

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

Options:

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Buy Now
Questions 7

Which of the following commands would MOST likely be used to register a new service on a Windows OS?

Options:

A.

set-service

B.

net

C.

sc

D.

services.msc

Buy Now
Questions 8

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

Options:

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Buy Now
Questions 9

The management team has mandated the encryption of all server administration traffic. Which of the following should MOST likely be implemented?

Options:

A.

SSH

B.

VPN

C.

SELinux

D.

FTPS

Buy Now
Questions 10

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Buy Now
Questions 11

An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support. Which of the following licensing models would be the LOWEST cost solution?

Options:

A.

Open-source

B.

Per CPU socket

C.

Per CPU core

D.

Enterprise agreement

Buy Now
Questions 12

A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient

subnet mask for this connection?

Options:

A.

/28

B.

/29

C.

/30

D.

/32

Buy Now
Questions 13

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Buy Now
Questions 14

After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?

Options:

A.

Remove the original network card and attempt to boot using only the new network card.

B.

Check that the BIOS is configured to recognize the second network card.

C.

Ensure the server has enough RAM to run a second network card.

D.

Verify the network card is on the HCL for the OS.

Buy Now
Questions 15

A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?

Options:

A.

nslookup

B.

nbtstat

C.

telnet

D.

netstat -a

Buy Now
Questions 16

Which ofthefollowingshouldatechnician verify FIRST before decommissioning and wipingafile server?

Options:

A.

Themedia destructionmethod

B.

Therecycling poke?

C.

Asset management documentation

D.

Non-utilization

Buy Now
Questions 17

A technician has beer tasked to install a new CPU. Prior to the retaliation the server must be configured. Which of the following should the technician update?

Options:

A.

The RAID card

B.

The BIOS

C.

The backplane

D.

The HBA

Buy Now
Questions 18

An administrator discovers a Bash script file has the following permissions set in octal notation;

777

Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?

Options:

A.

chmod go-rw>:

B.

chmod u=rwx

C.

chmod u+wx

D.

chmod g-rwx

Buy Now
Questions 19

A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?

Options:

A.

RAID 0 was configured by mistake.

B.

RAID 5 was configured properly.

C.

JBOD was configured by mistake.

D.

RAID 10 was configured by mistake.

Buy Now
Questions 20

A server administrator just installed a new physical server and needs to harden the OS. Which of the following best describes the OS hardening method?

Options:

A.

Apply security updates.

B.

Disable unneeded hardware.

C.

Set a BIOS password.

D.

Configure the boot order.

Buy Now
Questions 21

A server administrator is racking new servers in a cabinet with multiple connections from the servers to power supplies and the network. Which of the following should the administrator recommend to the organization to best address this situation?

Options:

A.

Rack balancing

B.

Cable management

C.

Blade enclosure

D.

Rail kits

Buy Now
Questions 22

An application server's power cord was accidentally unplugged. After plugging the cord back in the server administrator notices some transactions were not written to the disk array. Which of the following is the MOST likely cause of the issue?

Options:

A.

Backplane failure

B.

CMOS failure

C.

Misconfigured RAID

D.

Cache battery failure

Buy Now
Questions 23

A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?

Options:

A.

NAT

B.

ICMP

C.

VLAN

D.

NIDS

Buy Now
Questions 24

A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?

Options:

A.

A full, weekly backup with daily open-file backups

B.

A full,weekly backup with daily archive backups

C.

A full, weekly backup with daily incremental backups

D.

A full, weekly backup with daily differential backups

Buy Now
Questions 25

An organization purchased six new 4TB drives for a server. An administrator is tasked with creating an efficient RAID given the minimum disk space requirement of 19TBs. Which of the following should the administrator choose to get the most efficient use of space?

Options:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Buy Now
Questions 26

The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:

Options:

A.

website traffic is protected while traversing the internet.

B.

files stored on the server are protected against physical theft.

C.

attachments that are emailed from this server cannot be intercepted.

D.

databases in use are protected from remote hackers.

Buy Now
Questions 27

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Buy Now
Questions 28

A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?

Options:

A.

Reinstall the OS and programs.

B.

Configure old drives to RAID.

C.

Reconfigure the RAID.

D.

Install from backup.

Buy Now
Questions 29

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Buy Now
Questions 30

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

Options:

A.

Print

B.

File

C.

Database

D.

Messaging

Buy Now
Questions 31

A systems administrator needs to create a data volume out of four disks with the MOST redundancy. Which of the following is the BEST solution?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Buy Now
Questions 32

A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the most secure method to copy the keys?

    HTTP

Options:

A.

FTP

B.

SCP

C.

USB

Buy Now
Questions 33

A server administrator is building a pair of new storage servers. The servers will replicate; therefore, no redundancy is required, but usable capacity

must be maximized. Which of the following RAID levels should the server administrator implement?

Options:

A.

0

B.

1

C.

5

D.

6

E.

10

Buy Now
Questions 34

Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?

Options:

A.

nbtstat

B.

netuse

C.

tracert

D.

netstst

Buy Now
Questions 35

An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?

Options:

A.

Replace one drive, wait for a rebuild, and replace the next drive.

B.

Shut down the server and replace the drives.

C.

Replace both failed drives at the same time.

D.

Replace all the drives in both degraded arrays.

Buy Now
Questions 36

Which of the following licensing models was created by software companies in response to the increasing density of processors?

Options:

A.

Per-instance

B.

Per-server

C.

per-user

D.

per-core

Buy Now
Questions 37

A senior administrator instructs a technician to run the following script on a Linux server:

for i in {1..65536); do echo Si; telnet localhost $i; done

The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:

80

Connected to localhost

443

Connected to localhost

Which of the following actions should the technician perform NEXT?

Options:

A.

Look for an unauthorized HTTP service on this server

B.

Look for a virus infection on this server

C.

Look for an unauthorized Telnet service on this server

D.

Look for an unauthorized port scanning service on this server.

Buy Now
Questions 38

A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an f prompt. Which of the following is the most likely cause of this issue?

Options:

A.

The system is booting to a USB flash drive.

B.

The UEFI boot was interrupted by a missing Linux boot file.

C.

The BIOS could not find a bootable hard disk.

D.

The BIOS firmware needs to be upgraded.

Buy Now
Questions 39

An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?

Options:

A.

RAID

B.

RAID 1

C.

RAIDS

D.

RAID 10

Buy Now
Questions 40

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

Options:

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Buy Now
Questions 41

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

Options:

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Buy Now
Questions 42

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

Options:

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Buy Now
Questions 43

A company's servers are all displaying the wrong time. The server administrator confirms the time source is correct. Which of the following is MOST likely preventing the servers from obtaining the correct time?

Options:

A.

A firewall

B.

An antivirus

C.

AHIDS

D.

User account control

Buy Now
Questions 44

A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)

Options:

A.

Memory

B.

Page file

C.

Services

D.

Application

E.

CPU

F.

Heartbeat

Buy Now
Questions 45

Which of the following life-cycle management phases deals with a server that is no longer in operation?

Options:

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Buy Now
Questions 46

A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?

Options:

A.

SD card

B.

NAS drive

C.

SATA drive

D.

SAS drive

Buy Now
Questions 47

A systems administrator recently installed a new virtual server. After completing the installation, the administrator was only able to reach a few of the servers on the network. While testing, the administrator discovered only servers that had similar IP addresses were reachable. Which of the following is the most likely cause of the issue?

Options:

A.

The jumbo frames are not enabled.

B.

The subnet mask is incorrect.

C.

There is an IP address conflict.

D.

There is an improper DNS configuration.

Buy Now
Questions 48

A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?

Options:

A.

Off-site backups

B.

Full backups

C.

Differential backups

D.

Incremental backups

Buy Now
Questions 49

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Buy Now
Questions 50

An administrator is configuring a server that will host a high-performance financial application. Which of the following disk types will serve this purpose?

Options:

A.

SAS SSD

B.

SATA SSD

C.

SAS drive with 10000rpm

D.

SATA drive with 15000rpm

Buy Now
Questions 51

A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible. Which of the following is the BEST solution?

Options:

A.

Copy the fileshare to an LTO-4 tape drive

B.

Configure a new incremental backup job for the fileshare

C.

Create an additional partition and move a copy of the fileshare

D.

Create a snapshot of the fileshare

Buy Now
Questions 52

Alter rack mounting a server, a technician must install four network cables and two power cables for the server. Which of the following is the MOST appropriate way to complete this task?

Options:

A.

Wire the four network cables and the two power cables through the cable management arm using appropriate-length cables.

B.

Run the tour network cables up the left side of the rack to the top of the rack switch. Run the two power cables down the right side of the rack toward the UPS.

C.

Use the longest cables possible to allow for adjustment of the server rail within the rack.

D.

Install an Ethernet patch panel and a PDU to accommodate the network and power cables.

Buy Now
Questions 53

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Buy Now
Questions 54

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Buy Now
Questions 55

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Buy Now
Questions 56

A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?

Options:

A.

Separate circuits

B.

An uninterruptible power supply

C.

Increased PDU capacity

D.

Redundant power supplies

Buy Now
Questions 57

A server technician is installing a new server OS on legacy server hardware. Which of the following should the technician do FIRST to ensure the OS will work as intended?

Options:

A.

Consult the HCL to ensure everything is supported.

B.

Migrate the physical server to a virtual server.

C.

Low-level format the hard drives to ensure there is no old data remaining.

D.

Make sure the case and the fans are free from dust to ensure proper cooling.

Buy Now
Questions 58

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

Options:

A.

/root.ssh/sshd/config

B.

/etc.ssh/sshd_config

C.

/root/.ssh/ssh_config

D.

/etc.sshs_shd_config

Buy Now
Questions 59

When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

Options:

A.

Bridged

B.

NAT

C.

Host only

D.

vSwitch

Buy Now
Questions 60

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

Options:

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Buy Now
Questions 61

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?

Options:

A.

A misconfigured firewall

B.

A misconfigured hosts.deny file

C.

A misconfigured hosts file

D.

A misconfigured hosts.allow file

Buy Now
Questions 62

Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

Options:

A.

Live failover

B.

Simulated failover

C.

Asynchronous

D.

Tabletop

Buy Now
Questions 63

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

Options:

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning

Buy Now
Questions 64

Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?

Options:

A.

Disable the heartbeat network.

B.

Fallback cluster services.

C.

Set the cluster to active-active.

D.

Failover all VMs.

Buy Now
Questions 65

A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?

Options:

A.

Virtual

B.

Blade

C.

Tower

D.

Rack mount

Buy Now
Questions 66

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

Options:

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Buy Now
Questions 67

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Buy Now
Questions 68

A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using thepingcommand. Given the following partial output of thepingandipconfigcommands:

SK0-005 Question 68

Which of the following caused the issue?

Options:

A.

Duplicate IP address

B.

Incorrect default gateway

C.

DHCP misconfiguration

D.

Incorrect routing table

Buy Now
Questions 69

A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Buy Now
Questions 70

A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure theserver remotely. Which of the following connection types is the server administrator using to access the server?

Options:

A.

Out-of-band management

B.

Crash cart access

C.

Virtual administrator console

D.

Local KVM setup

E.

RDP connection

Buy Now
Questions 71

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

Options:

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

Buy Now
Questions 72

A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorizedservices running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue?

(Choose two.)

Options:

A.

Adware is installed on the users’ devices

B.

The firewall rule for the server is misconfigured

C.

The server is infected with a virus

D.

Intrusion detection is enabled on the network

E.

Unnecessary services are disabled on the server

F.

SELinux is enabled on the server

Buy Now
Questions 73

A data center employee shows a driver's license to enter the facility Once the employee enters, the door immediately doses and locks, triggering a scale that then weighs the employee before granting access to another locked door. This is an example of.

Options:

A.

mantrap.

B.

a bollard

C.

geofencing

D.

RFID.

Buy Now
Questions 74

After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:

SK0-005 Question 74

The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?

Options:

A.

Network port security

B.

An improper VLAN configuration

C.

A misconfigured DHCP server

D.

A misconfigured NIC on the server

Buy Now
Questions 75

A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Select TWO).

Options:

A.

The power supply

B.

The CPU

C.

The hard drive

D.

The GPU

E.

The cache

F.

The RAM

Buy Now
Questions 76

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

Options:

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Buy Now
Questions 77

A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?

Options:

A.

Initialize the volume

B.

Format the volume

C.

Replace the volume

D.

Rebuild the volume

Buy Now
Questions 78

A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time. Which of the following will BEST meet these goals?

Options:

A.

A warm site

B.

A hot site

C.

Cloud recovery

D.

A cold site

Buy Now
Questions 79

A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server. Which of the following Installation methods is BEST suited to meet the company policy?

Options:

A.

GUI

B.

Core

C.

Virtualized

D.

Clone

Buy Now
Questions 80

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Buy Now
Questions 81

A snapshot is a feature that can be used in hypervisors to:

Options:

A.

roll back firmware updates.

B.

restore to a previous version.

C.

roll back application drivers.

D.

perform a backup restore.

Buy Now
Questions 82

Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?

Options:

A.

RTO

B.

MTBF

C.

PRO

D.

MTTR

Buy Now
Questions 83

A technician is laying out a filesystem on a new Linux server. Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?

Options:

A.

LVM

B.

DiskPart

C.

fdisk

D.

Format

Buy Now
Questions 84

An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration. Which of the following technologies is the new connection using?

Options:

A.

iSCSI

B.

eSATA

C.

NFS

D.

FcoE

Buy Now
Questions 85

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

Options:

A.

Encrypt the data that is leaving the SAN

B.

Encrypt the data at rest

C.

Encrypt the host servers

D.

Encrypt all the network traffic

Buy Now
Questions 86

A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?

Options:

A.

pvdisplay

B.

mount

C.

df -h

D.

fdisk -l

Buy Now
Questions 87

A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?

Options:

A.

Snapshot

B.

Deduplication

C.

System Restore

D.

Template

Buy Now
Questions 88

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

Options:

A.

Create a group that includes all users and assign it to an ACL.

B.

Assign individual permissions on the folder to each user.C Create a group that includes all users and assign the proper permissions.

C.

Assign ownership on the folder for each user.

Buy Now
Questions 89

Which of the following open ports should be closed to secure the server properly? (Choose two.)

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Buy Now
Questions 90

A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?

Options:

A.

Alternate the direction of the airflow

B.

Install the heaviest server at the bottom of the rack

C.

Place a UPS at the top of the rack

D.

Leave 1U of space between each server

Buy Now
Questions 91

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

Options:

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Buy Now
Questions 92

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Buy Now
Questions 93

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

Options:

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

Buy Now
Questions 94

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?

Options:

A.

Messaging

B.

Application

C.

Print

D.

Database

Buy Now
Questions 95

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials.The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

Options:

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Buy Now
Questions 96

An administrator restores several database files without error while participating in a mock disaster recovery exercise. Later, the administrator reports that the restored databases are

corrupt and cannot be used. Which of the following would best describe what caused this issue?

Options:

A.

The databases were not backed up to be application consistent.

B.

The databases were asynchronously replicated

C.

The databases were mirrored

D.

The database files were locked during the restoration process.

Buy Now
Questions 97

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

Options:

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Buy Now
Questions 98

A server technician is installing application updates on a Linux server. When the technician tries to install a MySQL update, the GUI displays the following error message: AVC denial. Which of the following should the technician do for the MySQL update to install?

Options:

A.

Download the update manually and run a checksum utility to verify file integrity.

B.

Issue the setenforce 0 command.

C.

Create a firewall rule to allow port 3306 through the firewall.

D.

Issue the yum -y update mysql command.

Buy Now
Questions 99

Which of the following is a benefit of failover NIC teaming?

Options:

A.

Decreased latency

B.

Increased transmission size

C.

Increased system resources

D.

Increased fault tolerance

Buy Now
Questions 100

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following ports should be allowed?

(Select two).

Options:

A.

53

B.

80

C.

389

D.

443

E.

445

F.

3389

G.

8080

Buy Now
Questions 101

An administrator notices a server is offline. Upon checking the console, the administrator discovers the server is stuck at:

Configuring Memory.............

After a reboot, the server still exhibits the same behavior. The administrator is able to log in to the OOB remote management but is unable to log in to the server. Which of the following is the most likely cause of this issue?

Options:

A.

A DIMM has failed

B.

The VRAM is insufficient

C.

The RAID cache has failed

D.

The BIOS needs to be updated

Buy Now
Questions 102

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?

Options:

A.

User groups

B.

User activity reports

C.

Password policy

D.

Multifactor authentication

Buy Now
Questions 103

A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:

SK0-005 Question 103

Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?

Options:

A.

IP address: 172.16.25.90/24 Default gateway: 172.16.25.254

B.

IP address: 172.16.25.101/16 Default gateway: 172.16.25.254

C.

IP address: 172.16.25.254/24 Default gateway: 172.16.25.1

D.

IP address: 172.16.26.101/24 Default gateway: 172.16.25.254

Buy Now
Questions 104

An analyst is planning a new point-to-point Ethernet connection between a university campus and a newly acquired space downtown that is about 5mi (8km) away. The analyst would like the fastest possible connection speed. Which of the following would best meet the analyst's needs?

Options:

A.

1000BASE-LX 1Gb single-mode plenum fiber connection

B.

10GBASE-T 10Gb copper plenum Ethernet connection

C.

1000BASE-T 1Gb copper non-plenum Ethernet connection

D.

10GBASE-SR 10Gb multimode plenum fiber connection

Buy Now
Questions 105

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Buy Now
Questions 106

An administrator is troubleshooting connectivity to a remote server. The goal is to remotely connect to the server to make configuration changes. To further troubleshoot, a port scan revealed the ports on the

server as follows:

Port 22: Closed

Port 23: Open

Port 990: Closed

Which of the following next steps should the administrator take?

Reboot the workstation and then the server.

Options:

A.

Open port 990 and close port 23.

B.

Open port 22 and close port 23.

C.

Open all of the ports listed.

D.

Close all of the ports listed.

Buy Now
Questions 107

Which of the following attacks is the most difficult to mitigate with technology?

Options:

A.

Ransomware

B.

Backdoor

C.

SQL injection

D.

Phishing

Buy Now
Questions 108

A technician set up a new multifunction printer. After adding the printer to the print server, the technician configured the printer on each user's machine. Several days later, users reported that they were no longer able to print, but scanning to email worked. Which of the following is most likely causing this issue?

Options:

A.

The gateway is no longer being reached.

B.

The network firewall was enabled.

C.

The printer's network interface failed.

D.

The printer had DHCP enabled.

Buy Now
Questions 109

Which of the following technologies best describes Hyper-V Replica?

Options:

A.

High availability

B.

VMotion

C.

Live migration

D.

Disaster recovery

Buy Now
Questions 110

A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?

Options:

A.

Check the firewall rules.

B.

Replace the CMOS battery in the server.

C.

Restart the time servers.

D.

Manually correct the time.

Buy Now
Questions 111

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

Options:

A.

Close unneeded ports.

B.

Disable unused services.

C.

Set a BIOS password.

D.

Apply driver updates.

Buy Now
Questions 112

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure. The technician has the following six drives available:

    500GB, 10,000rpm

    600GB, 10,000rpm

    500GB, 7,200rpm

    500GB, 10,000rpm

    600GB, 15,000rpm

    600GB, 10,000rpm

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1, 2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Buy Now
Questions 113

A storage administrator is configuring a new array to provide storage to a virtual cluster. The array has a built-in backup agent to allow data that is stored on the array to be backed up. The storage administrator wants the virtual cluster to use a file-based storage protocol so the backup agent can just back up the files that change and not the whole data store. Which of the following storage protocols should the administrator use?

Options:

A.

iSCSI

B.

FC

C.

FCoE

D.

NFS

Buy Now
Questions 114

A systems administrator is selecting an authentication system for a data center. The company’s security policy requires that the system support MFA. Which of the following options should the administrator deploy to meet the policy requirements?

Options:

A.

A retinal scan and a fingerprint reader

B.

A key fob and an employee badge

C.

An RFID chip and a PIN code

D.

An alphanumeric, case-sensitive password with symbols

Buy Now
Questions 115

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure.The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Buy Now
Questions 116

A junior administrator reported that the website used for anti-malware updates is not working. The senior administrator then discovered all requests to the anti-malware site are being redirected to a malicious site. Which of the following tools should the senior administrator check first to identify the potential cause of the issue?

Options:

A.

Data loss prevention

B.

File integrity monitor

C.

Port scanner

D.

Sniffer

Buy Now
Questions 117

A technician is troubleshooting a database server that has 12 external disk arrays. Multiple disks are in a degraded state. The server is in a remote colocation facility and has on-site support. The technician notices all of the external storage arrays are degraded, but the internal arrays are functional. Which of the following steps should the technician take next to quickly address this issue?

Options:

A.

Notify the users of the downtime and reboot the server from the RDP connection.

B.

Notify the management team about the issue and travel to the colocation site with spare disks and RAID controllers.

C.

Access the server with RDP and start the RAID utility software to rebuild the arrays.

D.

Restore the data for the affected disks and notify the users of the estimated recovery time.

Buy Now
Questions 118

An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconf ig:

The application server is reading the following output from ipconf ig:

Which of the following most likely contains an error?

Options:

A.

IP address

B.

DHCP

C.

Gateway

D.

Subnet mask

Buy Now
Questions 119

An employee who was dismissed did not return company-issued equipment. Which of the following is the most important information the IT department needs to give to the legal department?

Options:

A.

Labeling

B.

Serial number

C.

Warranty

D.

Asset tag

Buy Now
Questions 120

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Buy Now
Questions 121

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Buy Now
Questions 122

A video card in an application server was recently replaced. The server administrator is now able to log in locally and view the screen with no issues; however, the administrator notices other performance issues, including the server's slow response time. The administrator reboots the server, but the issues persist. The server's cooling fans are running as normal, and the BIOS shows the dual power supplies are each working at 30%. Which of the following is most likely causing the performance issues?

Options:

A.

A cable on the motherboard became unseated.

B.

The firmware is incompatible with the video card.

C.

A PSU is having power issues.

D.

A CMOS battery failed.

E.

Environmental temperature issues are being experienced.

Buy Now
Questions 123

An administrator has been asked to copy files from a Windows server that may not conform to Windows file-naming standards. Which of the following would best facilitate the copy process?

Options:

A.

Robocopy

B.

SCP

C.

Drag and drop

D.

FTP

Buy Now
Questions 124

Which of the following would allow a server administrator to ensure all maximum available resources are being utilized?

Options:

A.

Overprovisioning

B.

Scalability

C.

Thin clients

D.

Resource Monitor

Buy Now
Questions 125

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

Options:

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Buy Now
Questions 126

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-

essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

53

C.

443

D.

3389

E.

8080

Buy Now
Questions 127

A server located in an IDF of a paper mill reboots every other day at random times. Which of the following should the technician perform on the server first?

Options:

A.

Check the power cables

B.

Clean the fans.

C.

Replace the RAM.

D.

Reattach the CPU heat sink

Buy Now
Questions 128

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?

Options:

A.

Give the user "read and execute" rights to the file.

B.

Give the user "modify" rights to the file.

C.

Give the user "list folder contents" rights to the folder.

D.

Give the user "full control" rights to the folder.

Buy Now
Questions 129

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

Options:

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Buy Now
Questions 130

A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?

Options:

A.

Enable an administrator account

B.

Enable a UEFI password

C.

Disable WOL

D.

Enable encryption at rest

Buy Now
Questions 131

A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?

Options:

A.

Determine whether there is a common element in the symptoms causing multiple problems.

B.

Perform a root cause analysis.

C.

Make one change at a time and test.

D.

Document the findings, actions, and outcomes throughout the process.

Buy Now
Questions 132

A server administrator notices drive C on a critical server does not have any available space, but plenty of unallocated space is left on the disk. Which of the following should the administrator perform to address the availability issue while minimizing downtime?

Options:

A.

Decrease the size of the page/swap file

B.

Reformat drive C to use all the disk space

C.

Enable whole disk encryption on the hard drive

D.

Enforce disk quotas on shares within that server

E.

Partition the unallocated space to provide more available space

Buy Now
Questions 133

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Options:

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Buy Now
Questions 134

Which of the following supports virtualization?

Options:

A.

Type 1 hypervisor

B.

Bare-metal installation

C.

Server-level redundancy

D.

Active-active load balancing

Buy Now
Questions 135

A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required. Which of the following are

the BEST backup methods to use to support the management’s priorities? (Choose two.)

Options:

A.

Differential

B.

Synthetic full

C.

Archive

D.

Full

E.

Incremental

F.

Open file

Buy Now
Questions 136

Which of the following benefits of virtualization is most important during a data center migration?

Options:

A.

Portability

B.

Orchestration

C.

Overprovisioning

D.

Scalability

Buy Now
Questions 137

Which of the following should a server administrator configure to ensure access to motherboard software is restricted?

Options:

A.

Biometric lock

B.

Data-at-rest encryption

C.

BIOS password

D.

Bootloader authentication

Buy Now
Questions 138

A server administrator is trying to determine the cause of a slowdown on a database server. Upon investigation, the administrator determines the issue is in the storage subsystem. Which of the following will most likely resolve this issue?

Options:

A.

Increasing IOPS by implementing flash storage

B.

Implementing deduplication on the storage

C.

Extending capacity by installing a 4TB SATA disk

D.

Reformatting the disk as FAT32

Buy Now
Questions 139

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

Options:

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Buy Now
Questions 140

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Buy Now
Questions 141

A technician wants to duplicate a physical server to a remote private cloud for disaster recovery purposes. Which of the following techniques would best accomplish this goal?

Options:

A.

V2V

B.

P2V

C.

V2P

D.

P2P

Buy Now
Questions 142

A data center environment currently hosts more than 100 servers that include homegrown and commercial software. The management team has asked the server administrator to find a way to eliminate all company-owned data centers. Which of the following models will the administrator most likely choose to meet this need?

Options:

A.

SaaS

B.

Private

C.

Public

D.

Hybrid

Buy Now
Questions 143

A certain application initially uses 1TB of drive space, but this is expected to double each year for the next two years. Which of the following is the minimum number of 1TB drives that are needed in a RAID 5 configuration?

Options:

A.

3

B.

4

C.

5

D.

6

Buy Now
Questions 144

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

Options:

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Buy Now
Questions 145

A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new

application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?

Options:

A.

Intrusion detection is blocking the port.

B.

The new application's DNS entry is incorrect.

C.

The application should be changed to use port 443.

D.

The core switch has a network issue.

Buy Now
Questions 146

In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?

Options:

A.

Waterfall

B.

Synthetic full

C.

Tower of Hanoi

D.

Grandfather-father-son

Buy Now
Questions 147

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non-essential ports be disabled on the firewall. Which of the following ports must remain open?

Options:

A.

25

B.

443

C.

3389

D.

8080

Buy Now
Exam Code: SK0-005
Exam Name: CompTIA Server+ Certification Exam
Last Update: Jun 9, 2025
Questions: 493

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now SK0-005 testing engine

PDF (Q&A)

$36.75  $104.99
buy now SK0-005 pdf