DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare Strategically for the CompTIA Server+ Exam with SK0-005 Practice Tests

Preparing for the CompTIA Server+ SK0-005 exam requires access to reliable exam resources and practice materials. Utilizing up-to-date exam questions and answers aligned with the current exam objectives is crucial for identifying areas where you need further study. Practice test questions that mirror the format and difficulty level of the actual exam can help you gauge your readiness. Comprehensive study guides and video courses from reputable sources provide in-depth explanations of server hardware, virtualization, network services, and security concepts covered in the SK0-005 exam. Mock exams that simulate the real test environment allow you to practice time management and build confidence. By incorporating these exam preparation resources into your study plan, you increase your chances of successfully passing the CompTIA Server+ SK0-005 certification exam.
Take other online exams

Question #1
A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time.Which of the following server roles will the administrator MOST likely need to install?
A. essaging
B. pplication
C. rint
D. atabase
View answer
Correct Answer: D
Question #2
A server technician installs a new NIC on a server and configures the NIC for IP connectivity. The technician then tests the connection using the ping command. Given the following partial output of the ping and ipconfig commands:Which of the following caused the issue?
A. nspect the GPU that is being installed
B. nsure the GPU meets HCL guidelines
C. hut down the server
D. isconnect the power from the rack
View answer
Correct Answer: A
Question #3
A server administrator is exporting Windows system files before patching and saving them to the following location:\\server1\ITDept\Which of the following is a storage protocol that the administrator is MOST likely using to save this data?
A. SATA
B. CoE
C. IFS
D. AS
View answer
Correct Answer: C
Question #4
A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann's home directory permissions and discovers the following:dr-xr-xr-- /home/AnnWhich of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
A. hmod 777 /home/Ann
B. hmod 666 /home/Ann
C. hmod 711 /home/Ann
D. hmod 754 /home/Ann
View answer
Correct Answer: D
Question #5
A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is sucessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:ping ftp.acme.localThe IP address in the command output is different on each machine.Which of the following
A. nsider threat
B. orms
C. ansomware
D. pen ports
E. wo-person integrity
View answer
Correct Answer: D
Question #6
A technician is checking a server rack. Upon entering the room, the technician notices the tans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal.Which of the following is the MOST likely reason why the fans in that server are operating at full speed?
A. he server is In the process of shutting down, so fan speed operations have been defaulted to high
B. n incorrect fan size was inserted into the server, and the server has had to Increase the fan speed to compensate
C. fan failure has occurred, and the other fans have increased speed to compensate
D. he server is utilizing more memory than the other servers, so it has increased the fans to compensate
View answer
Correct Answer: C
Question #7
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed.Which of the following should the technician do NEXT, given the disk is hot swappable?
A. top sharing the volume
B. eplace the disk
C. hut down the SAN
D. top all connections to the volume
View answer
Correct Answer: B
Question #8
A company uses a hot-site, disaster-recovery model. Which of the following types of data replication is required?
A. Asynchronous
B. Incremental
C. Application consistent
D. Constant
View answer
Correct Answer: B
Question #9
Which of the following commands would MOST likely be used to register a new service on a Windows OS?
A. et-service
B. et
C. c
D. ervices
View answer
Correct Answer: C
Question #10
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server's console?
A. P KVM
B. NC
C. crash cart
D. DP
E. SH
View answer
Correct Answer: D
Question #11
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:># EnforcingWhich of the following commands should the administrator issue to configure MySQL successfully?
A. ifferential
B. napshot
C. ncremental
D. ynthetic full
View answer
Correct Answer: A
Question #12
A server room with many racks of servers is managed remotely with occasional on-site support.Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?
A. anagement port
B. rash cart
C. P KVM
D. VM
View answer
Correct Answer: C
Question #13
Hosting data in different regional locations but not moving it for long periods of time describes:
A. cold site
B. ata at rest
C. n-site retention
D. ff-site storage
View answer
Correct Answer: B
Question #14
A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used.Which of the following backup methods does this describe?
A. pen file
B. ynthetic full
C. ull incremental
D. ull differential
View answer
Correct Answer: B
Question #15
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?
A. SO
B. DAP
C. ACACS
D. FA
View answer
Correct Answer: A
Question #16
An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity.Which of the following is the MINIMUM number of disks needed for this application?
A.
B.
C.
D.
View answer
Correct Answer: C
Question #17
Which of the following is typical of software licensing in the cloud?
A. er socket
B. erpetual
C. ubscription-based
D. ite-based
View answer
Correct Answer: C
Question #18
Which of me following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?
A. isable the heartbeat network
B. allback cluster services
C. et the cluster to active-active
D. ailover all VMs
View answer
Correct Answer: D
Question #19
Which of the following techniques can be configured on a server for network redundancy?
A. lustering
B. italizing
C. loning
D. eaming
View answer
Correct Answer: D
Question #20
A server shut down after an extended power outage.When power was restored, the system failed to start. A few seconds into booting, the Num Lock, Scroll Lock, and Caps Lock LEDs flashed several times, and the system stopped.Which of the following is the MOST likely cause of the issue?
A. he keyboard is defective and needs to be replaced
B. he system failed before the display card initialized
C. he power supply is faulty and is shutting down the system
D. he NIC has failed, and the system cannot make a network connection
View answer
Correct Answer: B
Question #21
A server administrator needs to create a new folder on a file server that only specific users can access.Which of the following BEST describes how the server administrator can accomplish this task?
A. reate a group that includes all users and assign it to an ACL
B. ssign individual permissions on the folder to each user
C. reate a group that includes all users and assign the proper permissions
D. ssign ownership on the folder for each user
View answer
Correct Answer: C
Question #22
Which of the following server types would benefit MOST from the use of a load balancer?
A. NS server
B. ile server
C. HCP server
D. eb server
View answer
Correct Answer: D
Question #23
A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network.Which of the following should the technician do FIRST to return the server to service as soon as possible?
A. eplace the NIC
B. ake sure the NIC is on the HCL
C. eseat the NIC
D. owngrade the NIC firmware
View answer
Correct Answer: D
Question #24
A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?
A. DLP
B. A port scanner
C. Anti-malware
D. A sniffer
View answer
Correct Answer: B
Question #25
A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:
A. ardware is UEFI compliant
B. olume is formatted as GPT
C. olume is formatted as MBR
D. olume is spanned across multiple physical disk drives
View answer
Correct Answer: B
Question #26
A server technician notices a server is very low on disk space. Upon inspecting the disk utilization,the technician discovers server logs are taxing up a large amount of space. There is no central log server.Which of the following would help free up disk space?
A. og rotation
B. og shipping
C. og alerting
D. og analysis
View answer
Correct Answer: B
Question #27
Which of the following ensures a secondary network path is available if the primary connection fails?
A. ink aggregation
B. ost recently used
C. eartbeat
D. ault tolerance
View answer
Correct Answer: D
Question #28
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?
A. ncrypt all network traffic
B. mplement MFA on all the servers with encrypted data
C. lock the servers from using an encrypted USB
D. mplement port security on the switches
View answer
Correct Answer: D
Question #29
A company uses a hot-site, disaster-recovery model.Which of the following types of data replication is required?
A. synchronous
B. ncremental
C. pplication consistent
D. onstant
View answer
Correct Answer: D
Question #30
Which of the following policies would be BEST to deter a brute-force login attack?
A. assword complexity
B. assword reuse
C. ccount age threshold
D. ccount lockout threshold
View answer
Correct Answer: D
Question #31
A technician is attempting to log in to a Linux server as root but cannot remember the administrator password.Which of the following is the LEAST destructive method of resetting the administrator password?
A. oot using a Linux live CD and mount the hard disk to /mnt
B. einstall the OS in overlay mode
C. djust the GRUB boot parameters to boot into single-user mode
D. oot using a Linux live CD and mount the hard disk to /mnt
View answer
Correct Answer: C
Question #32
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
A. cope-based
B. ole-based
C. ocation-based
D. ule-based
View answer
Correct Answer: B
Question #33
Which of the following BEST describes the concept of right to downgrade?
A. t allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
B. t allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
C. t allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
D. t allows a previous version of an OS to be installed and covered by the same license as the newer version
View answer
Correct Answer: D
Question #34
Which of the following can be used to map a network drive to a user profile?
A. ystem service
B. etwork service
C. ogin script
D. ickstart script
View answer
Correct Answer: C
Question #35
When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?
A. ridged
B. AT
C. ost only
D. Switch
View answer
Correct Answer: B
Question #36
Which of the following BEST describes the concept of right to downgrade?
A. t allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
B. t allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
C. t allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
D. t allows a previous version of an OS to be installed and covered by the same license as the newer version
View answer
Correct Answer: D
Question #37
Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?
A. rivate
B. ybrid
C. ommunity
D. ublic
View answer
Correct Answer: B
Question #38
Which of the following technologies would allow an administrator to build a software RAID on a Windows server?
A. ogical volume management
B. ynamic disk
C. PT
D. EFI
View answer
Correct Answer: B
Question #39
A technician is installing a variety of servers in a rack.Which of the following is the BEST course of action for the technician to take while loading the rack?
A. lternate the direction of the airflow
B. nstall the heaviest server at the bottom of the rack
C. lace a UPS at the top of the rack
D. eave 1U of space between each server
View answer
Correct Answer: B
Question #40
Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off.Which of the following should the administrator do to prevent this situation in the future?
A. onnect the server to a KVM
B. se cable management
C. onnect the server to a redundant network
D. onnect the server to a UPS
View answer
Correct Answer: D
Question #41
A technician is laying out a filesystem on a new Linux server.Which of the following tools would work BEST to allow the technician to increase a partition's size in the future without reformatting it?
A. VM
B. iskPart
C. disk
D. ormat
View answer
Correct Answer: A
Question #42
A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load.Which of the following should the administrator implement FIRST to address the issue?
A. eparate circuits
B. n uninterruptible power supply
C. ncreased PDU capacity
D. edundant power supplies
View answer
Correct Answer: A
Question #43
The management team at a healthcare organization is concerned about being able to access the dairy vital records if there is an IT disaster that causes both servers and the network lo be offline.Which of the following backup types can the organization use to mitigate this risk?
A. ape
B. loud
C. isk
D. rint
View answer
Correct Answer: D
Question #44
A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
View answer
Correct Answer: A
Question #45
A newly installed server is accessible to local users, but remote users are unable to connect.Which of the following is MOST likely misconfigured?
A. he IP address
B. he default gateway
C. he VLAN
D. he subnet mask
View answer
Correct Answer: B
Question #46
A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead.Which of the following RAID levels should the technician configure for this drive array?
A. AID 0
B. AID 5
C. AID 6
D. AID 10
View answer
Correct Answer: C
Question #47
Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?
A. SSO
B. LDAP
C. TACACS
D. MFA
View answer
Correct Answer: A
Question #48
A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site.Which of the following are MOST likely causing the issue?(Choose two.)
A. 55
B. 55
C. 55
D. 55
View answer
Correct Answer: CF
Question #49
A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann's home directory permissions and discovers the following: dr-xr-xr-- /home/AnnWhich of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
A. hmod 777 /home/Ann
B. hmod 666 /home/Ann
C. hmod 711 /home/Ann
D. hmod 754 /home/Ann
View answer
Correct Answer: D
Question #50
A systems administrator is investigating a server with a RAID array that will not boot into the OS. The administrator notices all the hard drives are reporting to be offline. The administrator checks the RAID controller and verifies the configuration is correct. The administrator then replaces one of the drives with a known-good drive, but it appears to be unavailable as well. Next, the administrator takes a drive out of the server and places it in a spare server, and the drive is available and functional.W
A. he kernel is corrupt
B. esources are misallocated
C. he backplane has failed
D. he drives need to be reseated
View answer
Correct Answer: C
Question #51
A senior administrator instructs a technician to run the following script on a Linux server:for i in {1..65536); do echo Si; telnet localhost $i; done The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:Connected to localhostConnected to localhostWhich of the following actions should the technician perform NEXT?
A. ook for an unauthorized HTTP service on this server
B. ook for a virus infection on this server
C. ook for an unauthorized Telnet service on this server
D. ook for an unauthorized port scanning service on this server
View answer
Correct Answer: A
Question #52
An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author's name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server.Which of the following needs to be done to prevent this from h
A. mplement data loss prevention
B. onfigure intrusion detection
C. urn on User Account Control
D. isable anonymous access
View answer
Correct Answer: D
Question #53
A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used.Which of the following would BEST enable this correlation?
A. artitioning
B. eduplication
C. isk quotas
D. ompression
View answer
Correct Answer: C
Question #54
Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server.Which of the following would be the best step to perform NEXT?
A. un the tracert command from a workstation
B. xamine the DNS to see if the new server record exists
C. orrect the missing DHCP scope
D. pdate the workstation hosts file
View answer
Correct Answer: B
Question #55
A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings.Which of the following should the technician use to command a remote shutdown?
A. irtual serial console
B. KVM
C. n IDRAC
D. crash cart
View answer
Correct Answer: C
Question #56
A server administrator is swapping out the GPU card inside a server.Which of the following actions should the administrator take FIRST?
A. I
B. TO
C. TTR
D. LA
View answer
Correct Answer: C
Question #57
A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash.Which of the following will MOST likely resolve the issue?
A. eseating any expansion cards in the server
B. eplacing the failing hard drive
C. einstalling the heat sink with new thermal paste
D. estoring the server from the latest full backup
View answer
Correct Answer: C
Question #58
A technician is setting up a small office that consists of five Windows 10 computers. The technician has been asked to use a simple IP configuration without manually adding any IP addresses.Which of the following will the technician MOST likely use for the IP address assignment?
A. tatic
B. outer-assigned
C. PIPA
D. HCP
View answer
Correct Answer: D
Question #59
A technician needs to deploy an operating system that would optimize server resources.Which of the following server installation methods would BEST meet this requirement?
A. ull
B. are metal
C. ore
D. UI
View answer
Correct Answer: C
Question #60
A technician is connecting a server's secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection.Which of the following should the technician perform NEXT?
A. estart the server
B. onfigure the network on the server
C. nable the port on the server
D. heck the DHCP configuration
View answer
Correct Answer: C
Question #61
The HIDS logs on a server indicate a significant number of unauthorized access attempts via USB devices at startup.Which of the following steps should a server administrator take to BEST secure the server without limiting functionality?
A. et a BIOS/UEFI password on the server
B. hange the boot order on the server and restrict console access
C. isable all the USB ports on the server
View answer
Correct Answer: B
Question #62
A snapshot is a feature that can be used in hypervisors to:
A. oll back firmware updates
B. estore to a previous version
C. oll back application drivers
D. erform a backup restore
View answer
Correct Answer: B
Question #63
An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot- swappable.Which of the following steps will be the MOST efficient?
A. eplace one drive, wait for a rebuild, and replace the next drive
B. hut down the server and replace the drives
C. eplace both failed drives at the same time
D. eplace all the drives in both degraded arrays
View answer
Correct Answer: C
Question #64
A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.2. Application data IOPS performance is a must.3. Data availability is a high priority, even in the case of multiple hard drive failures.Which of the following are the BEST op
A. uplicate IP address
B. ncorrect default gateway
C. HCP misconfiguration
D. ncorrect routing table
View answer
Correct Answer: BDE
Question #65
A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection.Which of the following connectivity options would BEST meet this requirement?
A. ibre Channel
B. CoE
C. SCSI
D. SATA
View answer
Correct Answer: A
Question #66
An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server's storage configuration.Which of the following technologies is the new connection using?
A. SCSI
B. SATA
C. FS
D. coE
View answer
Correct Answer: A
Question #67
A server that recently received hardware upgrades has begun to experience random BSOD conditions.Which of the following are likely causes of the issue? (Choose two.)
A. KI
B. SL
C. DAP
D. NS
View answer
Correct Answer: AC
Question #68
Which of the following describes the installation of an OS contained entirely within another OS installation?
A. ost
B. ridge
C. ypervisor
D. uest
View answer
Correct Answer: D
Question #69
A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off.Which of the following is the BEST method to power on the server remotely?
A. rash cart
B. ut-of-band console
C. P KVM
D. DP
View answer
Correct Answer: B
Question #70
A junior administrator needs to configure a single RAID 5 volume out of four 200GB drives attached to the server using the maximum possible capacity. Upon completion, the server reports that all drives were used, and the approximate volume size is 400GB. Which of the following BEST describes the result of this configuration?
A. AID 0 was configured by mistake
B. AID 5 was configured properly
C. BOD was configured by mistake
D. AID 10 was configured by mistake
View answer
Correct Answer: B
Question #71
Which of the following would be BEST to help protect an organization against social engineering?
A. ore complex passwords
B. ecurring training and support
C. ingle sign-on
D. n updated code of conduct to enforce social media
View answer
Correct Answer: B
Question #72
A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch.Which of the following connectors should the administrator use?
A. FP+
B. BIC
C. FP
D. SFP+
View answer
Correct Answer: D
Question #73
Winch of the following is a type of replication in which all files are replicated, all the time?
A. onstant
B. pplication consistent
C. ynthetic full
D. ull
View answer
Correct Answer: A
Question #74
A server technician is installing a new server OS on legacy server hardware.Which of the following should the technician do FIRST to ensure the OS will work as intended?
A. onsult the HCL to ensure everything is supported
B. igrate the physical server to a virtual server
C. ow-level format the hard drives to ensure there is no old data remaining
D. ake sure the case and the fans are free from dust to ensure proper cooling
View answer
Correct Answer: A
Question #75
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy.Which of the following should the company also perform as a data loss prevention method?
A. 1
B. 71
C. 72
D. 93
View answer
Correct Answer: B
Question #76
Which of the following open ports should be closed to secure the server properly? (Choose two.)
A. ncrypt the data that is leaving the SAN
B. ncrypt the data at rest
C. ncrypt the host servers
D. ncrypt all the network traffic
View answer
Correct Answer: AC
Question #77
A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point.Which of the following commands would successfully mount the drive with the required parameters?
A. cho /newdisk >> /etc/fstab
B. et use /newdisk
C. ount \xado remount, rw /newdisk
D. ount \xada
View answer
Correct Answer: C
Question #78
A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors. To attempt to correct the errors, the technician should FIRST ensure:
A. he correct firewall zone is active
B. he latest firmware was applied
C. TP is running on the database system
D. he correct dependencies are installed
View answer
Correct Answer: C
Question #79
Which of the following should be configured in pairs on a server to provide network redundancy?
A. security camera
B. mantrap
C. security guard
D. proximity card
View answer
Correct Answer: E
Question #80
Which of the following BEST describes a warm site?
A. he site has all infrastructure and live data
B. he site has all infrastructure and some data
C. he site has partially redundant infrastructure and no network connectivity
D. he site has partial infrastructure and some data
View answer
Correct Answer: D
Question #81
A company is running an application on a file server. A security scan reports the application has a known vulnerability.Which of the following would be the company's BEST course of action?
A. chedule a mandatory reboot of the server
B. ait for the load average to come back down on its own
C. dentify the runaway process or processes
D. equest that users log off the server
View answer
Correct Answer: A
Question #82
Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?
A. TO
B. LA
C. TBF
D. TTR
View answer
Correct Answer: A
Question #83
A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center.Which of the following would address the request with minimal server downtime?
A. nplug the power cables from the redundant power supplies, leaving just the minimum required
B. onvert the physical servers to the hypervisors and retire the ten servers
C. eimage the physical servers and retire all ten servers after the migration is complete
D. onvert the ten servers to power-efficient core editions
View answer
Correct Answer: B
Question #84
A server administrator wants to check the open ports on a server.Which of the following commands should the administrator use to complete the task?
A. slookup
B. btstat
C. elnet
D. etstat -a
View answer
Correct Answer: D
Question #85
An administrator is investigating a physical server mat will not Boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, out the OS does not load. The administrator verities the CPU and RAM are Doth seated correctly and checks the dual power supplies. The administrator then verifies all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly.Which of the following is causing the issue?
A. he page file is too small
B. he CPU has failed
C. here are multiple failed hard drives
D. here are mismatched RAM modules
E. AID 5 requires four drives
View answer
Correct Answer: C
Question #86
A technician needs to deploy an operating system that would optimize server resources. Which of the following server installation methods would BEST meet this requirement?
A. Full
B. Bare metal
C. Core
D. GUI
View answer
Correct Answer: C
Question #87
Users at a company work with highly sensitive dat
A. he security department implemented an administrative and technical control to enforce least- privilege access assigned to files
B. tilize privacy screens
C. mplement disk quotas
D. nstall a DLP solution
E. nforce the lock-screen feature
View answer
Correct Answer: C
Question #88
A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring?(Choose two.)
A. emory
B. age file
C. ervices
D. pplication
E. PU
F. eartbeat
View answer
Correct Answer: AE
Question #89
Users have noticed a server is performing below Baseline expectations.While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad.Which of the following is causing the poor performance on the RAID array?
A. he controller has disabled the write cache
B. he controller cannot use all the available channels
C. he drive array is corrupt
D. he controller has lost its configuration
View answer
Correct Answer: A
Question #90
An administrator is installing a new file server that has four drive bays available.Which of the following RAID types would provide the MOST storage as well as disk redundancy?
A. AIDO
B. AID 1
C. AID 5
D. AID 10
View answer
Correct Answer: C
Question #91
Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?
A. LA
B. TBF
C. TO
D. TTR
View answer
Correct Answer: C
Question #92
Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)
A. idplane
B. ctive backplane
C. assive backplane
D. anagement module
View answer
Correct Answer: CF
Question #93
DRAG DROP (Drag and Drop is not supported)A recent power Outage caused email services to go down. A sever administrator also received alerts from the datacenter's UPS.After some investigation, the server administrator learned that each POU was rated at a maximum Of 12
A. NSTRUCTIONSEnsure power redundancy is implemented throughout each rack and UPS alarms are resolved
A. ardware failure
B. arware
C. ata corruption
D. nsider threat
View answer
Correct Answer: A
Question #94
An organization implements split encryption keys for sensitive files.Which of the following types of risks does this mitigate?
A. antrap
B. bollard
C. eofencing
D. FI
View answer
Correct Answer: D
Question #95
A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes.After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash. Which of the following will MOST likely resolve the issue?
A. Reseating any expansion cards in the server
B. Replacing the failing hard drive
C. Reinstalling the heat sink with new thermal paste
D. Restoring the server from the latest full backup
View answer
Correct Answer: C
Question #96
A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses.Which of the following subnet addresses will be the MOST efficient for this network?
A. 55
B. 55
C. 55
D. 55
View answer
Correct Answer: C
Question #97
After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:The administrator returns to the switch and notices an amber link light on the port where the server is connected.Which of the following is the MOST likely reason for the lack
A. vdisplay
B. ount
C. f -h
D. disk -l
View answer
Correct Answer: D
Question #98
A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely.Which of the following connection types is the server administrator using to access the server?
A. ut-of-band management
B. rash cart access
C. irtual administrator console
D. ocal KVM setup
E. DP connection
View answer
Correct Answer: A
Question #99
Network connectivity to a server was lost when it was pulled from the rack during maintenance.Which of the following should the server administrator use to prevent this situation in the future?
A. able management
B. ail kits
C. wireless connection
D. power distribution unit
View answer
Correct Answer: A
Question #100
Which of the following is typical of software licensing in the cloud?
A. er socket
B. erpetual
C. ubscription-based
D. ite-based
View answer
Correct Answer: C
Question #101
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?
A. ervice-level agreement
B. isaster recovery plan
C. usiness impact analysis
D. usiness continuity plan
View answer
Correct Answer: B
Question #102
A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location.Which of the following should the administrator configure to ensure this requirement is met?
A. lerting
B. etention
C. hipping
D. otation
View answer
Correct Answer: C
Question #103
Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?
A. Scope-based
B. Role-based
C. Location-based
D. Rule-based
View answer
Correct Answer: B
Question #104
Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?
A. loud
B. old
C. ot
D. arm
View answer
Correct Answer: D
Question #105
After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly.Which of the following should the technician do NEXT to troubleshoot this issue?
A. emove the original network card and attempt to boot using only the new network card
B. heck that the BIOS is configured to recognize the second network card
C. nsure the server has enough RAM to run a second network card
D. erify the network card is on the HCL for the OS
View answer
Correct Answer: D
Question #106
Which of the following licenses would MOST likely include vendor assistance?
A. pen-source
B. ersion compatibility
C. ubscription
D. aintenance and support
View answer
Correct Answer: D
Question #107
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. BS
B. hell
C. ava
D. owerShell
E. atch
View answer
Correct Answer: B
Question #108
HOTSPOT (Drag and Drop is not supported)A systems administrator deployed a new web proxy server onto the network. The proxy server has two interfaces: the first is connected to an internal corporate firewall, and the second is connected to an internet-facing firewall. Many users at the company are reporting they are unable to access the Internet since the new proxy was introduced. Analyze the network diagram and the proxy server's host routing table to resolve the Internet connectivity issues.INSTRUCTIONSPe
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #109
Which of the following would a systems administrator implement to ensure all web traffic is secure?
A. SH
B. SL
C. MTP
D. GP
View answer
Correct Answer: B
Question #110
A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:eth0: flags=4163 mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1Which of the following BEST describes what is happening?
A. he server is configured to use DHCP on a network that has multiple scope options
B. he server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
C. he server is configured to use DHCP on a network that does not have a DHCP server
D. he server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: