DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest CompTIA Server+ SK0-005 Exam Questions for Effective Preparation

Preparing for the CompTIA Server+ SK0-005 exam? Let us guide you with our comprehensive collection of exam questions and answers, meticulously crafted test questions, and essential exam resources. Our study materials are designed to cover all exam objectives, from server hardware installation to troubleshooting and maintenance. Dive deep into server architecture, storage solutions, and virtualization technologies with confidence. Practice is key to success, and our mock exams are designed to simulate the real exam experience. Test your knowledge, identify areas for improvement, and refine your skills to pass the exam successfully. With our expert guidance and top-notch study materials, you'll be well-prepared to tackle the CompTIA Server+ SK0-005 exam and demonstrate your server administration skills with confidence. Start your preparation today and ace the exam with ease!
Take other online exams

Question #1
A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?
A. D card
B. AS drive
C. ATA drive
D. AS drive
View answer
Correct Answer: A

View The Updated SK0-005 Exam Questions

SPOTO Provides 100% Real SK0-005 Exam Questions for You to Pass Your SK0-005 Exam!

Question #2
A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it.Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?
A. einstall the OS
B. ipe the drives
C. egauss the drives
D. pdate the IP schema
View answer
Correct Answer: B
Question #3
An administrator is configuring a server that will host a high-performance financial application.Which of the following disk types will serve this purpose?
A. AS SSD
B. ATA SSD
C. AS drive with 10000rpm
D. ATA drive with 15000rpm
View answer
Correct Answer: A
Question #4
A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server.Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)
A. pgrade the application package
B. ighten the rules on the firewall
C. nstall antivirus software
D. atch the server OS
View answer
Correct Answer: CF
Question #5
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working.Which of the following would MOST likely cause this issue? (Choose two.)
A. ncrypt all network traffic
B. mplement MFA on all the servers with encrypted data
C. lock the servers from using an encrypted USB
D. mplement port security on the switches
View answer
Correct Answer: BF
Question #6
A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible.Which of the following is the BEST solution?
A. opy the fileshare to an LTO-4 tape drive
B. onfigure a new incremental backup job for the fileshare
C. reate an additional partition and move a copy of the fileshare
D. reate a snapshot of the fileshare
View answer
Correct Answer: D
Question #7
A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?
A. vdisplay
B. ount
C. f -h
D. disk -l
View answer
Correct Answer: C
Question #8
A technician is configuring a server that requires secure remote access.Which of the following ports should the technician use?
A. 1
B. 2
C. 3
D. 43
View answer
Correct Answer: B
Question #9
A server administrator is exporting Windows system files before patching and saving them to the following location:\\server1\ITDept\Which of the following is a storage protocol that the administrator is MOST likely using to save this data?
A. eSATA
B. FCoE
C. CIFS
D. SAS
View answer
Correct Answer: C
Question #10
Which of the following tools will analyze network logs in real time to report on suspicious log events?
A. yslog
B. LP
C. IEM
D. IPS
View answer
Correct Answer: C
Question #11
A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server.Which of the following is causing the issue?
A. ort 443 is not open on the firewall
B. he server is experiencing a downstream failure
C. he local hosts file is blank
D. he server is not joined to the domain
View answer
Correct Answer: D
Question #12
A server administrator wants to run a performance monitor for optimal system utilization.Which of the following metrics can the administrator use for monitoring? (Choose two.)
A. etwork port security
B. n improper VLAN configuration
C. misconfigured DHCP server
D. misconfigured NIC on the server
View answer
Correct Answer: AE
Question #13
After configuring IP networking on a newly commissioned server, a server administrator installs a straight-through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack
A. etwork port security
B. n improper VLAN configuration
C. misconfigured DHCP server
D. misconfigured NIC on the server
View answer
Correct Answer: D
Question #14
A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuild ing.Which of the following should the administrator do NEXT once the rebuild is finished?
A. estore the server from a snapshot
B. estore the server from backup
C. wap the drive and initialize the disk
D. wap the drive and initialize the array
View answer
Correct Answer: C
Question #15
An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer boot. There are two arrays on the failed server: a two-drive RAIO 0 set tor the OS, and an eight-drive RAID 10 set for dat
A. hich of the following failure scenarios MOST likely occurred?
B. drive failed in the OS array
C. drive failed and then recovered in the data array
D. drive failed in both of the arrays
E. drive failed in the data array
View answer
Correct Answer: A
Question #16
A systems administrator is trying to determine why users in the human resources department cannot access an application server. The systems administrator reviews the application logs but does not see any attempts by the users to access the application.Which of the following is preventing the users from accessing the application server?
A. AT
B. CMP
C. LAN
D. IDS
View answer
Correct Answer: C
Question #17
The management team has mandated the encryption of all server administration traffic.Which of the following should MOST likely be implemented?
A. SH
B. PN
C. ELinux
D. TPS
View answer
Correct Answer: A
Question #18
In which of the following media rotation schemes are daily, weekly, and monthly backup media utilized in a first-in, first-out method?
A. aterfall
B. ynthetic full
C. ower of Hanoi
D. randfather-father-son
View answer
Correct Answer: D
Question #19
A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications.Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?
A. napshot
B. eduplication
C. ystem Restore
D. emplate
View answer
Correct Answer: D
Question #20
Which of the following actions should a server administrator take once a new backup scheme has been configured?
A. verwrite the backups
B. lone the configuration
C. un a restore test
D. heck the media integrity
View answer
Correct Answer: C
Question #21
A server administrator receives the following output when trying to ping a local host:Which of the following is MOST likely the issue?
A. irewall
B. HCP
C. NS
D. LAN
View answer
Correct Answer: A
Question #22
A company is reviewing options for its current disaster recovery plan and potential changes to it. The security team will not allow customer data to egress to non-company equipment, and the company has requested recovery in the shortest possible time.Which of the following will BEST meet these goals?
A. warm site
B. hot site
C. loud recovery
D. cold site
View answer
Correct Answer: B
Question #23
Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
A. elnet
B. obocopy
C. COPY
D. CP
View answer
Correct Answer: D
Question #24
Which of me following should be placed at the top of a Bash script to ensure it can be executed?
A. ash
B. execute
C. !
D. eacho off
View answer
Correct Answer: C
Question #25
An administrator is troubleshooting performance issues on a server that was recently upgraded. The administrator met with users/stakeholders and documented recent changes in an effort to determine whether the server is better or worse since the changes.Which of the following would BEST help answer the server performance question9
A. erver performance thresholds
B. server baseline
C. hardware compatibility list
D. n application service-level agreement
View answer
Correct Answer: B
Question #26
A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business.Which of the following would be the BEST course of action to preserve business continuity?
A. erform scheduled chkdsk tests
B. urchase matching hardware and clone the disk
C. pgrade the hard disk to SSD
D. erform quarterly backups
View answer
Correct Answer: B
Question #27
A server administrator is deploying a new server that has two hard drives on which to install the OS.Which of the following RAID configurations should be used to provide redundancy for the OS?
A. AID 0
B. AID 1
C. AID 5
D. AID 6
View answer
Correct Answer: B
Question #28
An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address.Which of the following locally defined settings is MOST likely misconfigured?
A. HCP
B. INS
C. NS
D. CP
View answer
Correct Answer: C
Question #29
A technician is connecting a server's secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician performNEXT?
A. Restart the server
B. Configure the network on the server
C. Enable the port on the server
D. Check the DHCP configuration
View answer
Correct Answer: C
Question #30
An administrator receives an alert stating a S.MAR.T. error has been detected.Which of the following should the administrator run FIRST to determine the issue?
A. hard drive test
B. RAM test
C. power supply swap
D. firmware update
View answer
Correct Answer: A
Question #31
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)
A. he server has a faulty power supply
B. he server has a CMOS battery failure
C. he server requires OS updates
D. he server has a malfunctioning LED panel
E. he servers do not have NTP configured
F. he time synchronization service is disabled on the servers
View answer
Correct Answer: CF
Question #32
Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?
A. nd-to-end encryption
B. ncryption in transit
C. ncryption at rest
D. ublic key encryption
View answer
Correct Answer: C
Question #33
Which of the following is the MOST secure method to access servers located in remote branch offices?
A. se an MFAout-of-band solution
B. se a Telnet connection
C. se a password complexity policy
D. se a role-based access policy
View answer
Correct Answer: A
Question #34
A technician needs to provide a VM with high availability.Which of the following actions should the technician take to complete this task as efficiently as possible?
A. ake a snapshot of the original VM
B. lone the original VM
C. onvert the original VM to use dynamic disks
D. erform a P2V of the original VM
View answer
Correct Answer: B
Question #35
A server administrator made a change in a server's BIOS in an attempt to fix an issue with the OS not turning on. However, the change did not successfully correct the issue.Which of the following should the server administrator do NEXT?
A. einstall the server OS in repair mode while maintaining the data
B. lash the BIOS with the most recent version
C. everse the latest change made to the server and reboot
D. estart the server into safe mode and roll back changes
View answer
Correct Answer: C
Question #36
An administrator is researching the upcoming licensing software requirements for an application that usually requires very little technical support.Which of the following licensing models would be the LOWEST cost solution?
A. pen-source
B. er CPU socket
C. er CPU core
D. nterprise agreement
View answer
Correct Answer: A
Question #37
A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254.Which of the following subnet masks would be appropriate for this setup?
A. nitialize the volume
B. ormat the volume
C. eplace the volume
D. ebuild the volume
View answer
Correct Answer: A
Question #38
Which of the following would be BEST to help protect an organization against social engineering?
A. More complex passwords
B. Recurring training and support
C. Single sign-on
D. An updated code of conduct to enforce social media
View answer
Correct Answer: D
Question #39
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration.Which of the following cluster features will allow Ann to complete this task?
A. eartbeat
B. ailback
C. edundancy
D. oad balancing
View answer
Correct Answer: B
Question #40
Due to a recent application migration, a company's current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users.Which of the following is the BEST solution for this Issue?
A. nstall local external hard drives for affected users
B. dd extra memory to the server where data is stored
C. ompress the data to increase available space
D. eploy a new Fibre Channel SAN solution
View answer
Correct Answer: D
Question #41
Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers.When the administrator connects to the host, a purple screen with while letters appears.Which of the following troubleshooting steps should the administrator perform FIRST?
A. heck the power supplies
B. eview the log files
C. einstall the ESX server
D. eseat the processors
View answer
Correct Answer: B
Question #42
Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?
A. ollards
B. eflective glass
C. ecurity guards
D. ecurity cameras
View answer
Correct Answer: A
Question #43
A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors.Which of the following is the MOST likely source of the issue?
A. local firewall is blocking authentication requests
B. he users have expired passwords
C. he system clock is off by more than five minutes
D. he server has no access to the LDAP host
View answer
Correct Answer: C
Question #44
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. 1
B. 71
C. 72
D. 93
View answer
Correct Answer: C
Question #45
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard.Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. P KVM
B. NC
C. crash cart
D. DP
E. SH
View answer
Correct Answer: C
Question #46
A technician is unable to access a server's package repository internally or externally.Which of the following are the MOST likely reasons? (Choose two.)
A. AID 0
B. AID 1
C. AID 5
D. AID 6
View answer
Correct Answer: DE
Question #47
A server administrator needs to check remotely for unnecessary running services across 12 servers.Which of the following tools should the administrator use?
A. LP
B. port scanner
C. nti-malware
D. sniffer
View answer
Correct Answer: B
Question #48
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server.Which of the following would MOST likely help the analyst determine if the applications are running?
A. ser account control
B. nti-malware
C. sniffer
D. port scanner
View answer
Correct Answer: D
Question #49
A technician is monitoring a server and notices there is only one NIC plugged in. but the server has two. The NIC is oversaturated, and the technician would like to increase the available bandwidth.Which of the following solutions would be the BEST option to increase the speed of this NIC?
A. ink aggregation
B. eartbeat
C. ost recently used
D. ctive-active
View answer
Correct Answer: A
Question #50
Which of the following is a system that scans outgoing email for account numbers, sensitive phrases,and other forms of Pll?
A. IEM
B. LP
C. IDS
D. PS
View answer
Correct Answer: B
Question #51
A technician is unable to access a server's package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)
A. The server has an architecture mismatch
B. The system time is not synchronized
C. The technician does not have sufficient privileges
D. The external firewall is blocking access
E. The default gateway is incorrect
F. The local system log file is full
View answer
Correct Answer: AB
Question #52
A server administrator encounters some issues with the server OS after applying monthly patches.Which of the following troubleshooting steps should the administrator perform?
A. mplement rollback procedures
B. pgrade the drivers
C. einstall the OS
D. eboot the server
View answer
Correct Answer: A
Question #53
Alter rack mounting a server, a technician must install four network cables and two power cables for the server.Which of the following is the MOST appropriate way to complete this task?
A. ire the four network cables and the two power cables through the cable management arm using appropriate-length cables
B. un the tour network cables up the left side of the rack to the top of the rack switch
C. se the longest cables possible to allow for adjustment of the server rail within the rack
D. nstall an Ethernet patch panel and a PDU to accommodate the network and power cables
View answer
Correct Answer: B
Question #54
A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:nfsserver:/home /home nfs defaults 0 0However, a df -h /home command returns the following information:/dev/sda2 10G 1G 9G 10% /homeWhich of the following should the technician attempt FIRST to resolve the issue?
A. kdir /home
B. mount nfsserver:/home
C. mdir nfsserver:/home/dev/sda2
D. ount /home
View answer
Correct Answer: B
Question #55
A technician is deploying a single server to monitor and record me security cameras at a remote site, which of the following architecture types should be used to minimize cost?
A. irtual
B. lade
C. ower
D. ack mount
View answer
Correct Answer: C
Question #56
Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?
A. Cable management
B. Rail kits
C. A wireless connection
D. A power distribution unit
View answer
Correct Answer: A
Question #57
A company's IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company's SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?
A. Disable port 389 on the server
B. Move traffic from port 389 to port 443
C. Move traffic from port 389 to port 637
D. Enable port 389 for web traffic
View answer
Correct Answer: C
Question #58
A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity.Which of the following is the MOST likely reason for the lack of connectivity?
A. he VLAN Is improperly configured
B. he DNS configuration Is invalid
C. he OS version is not compatible with the network switch vendor
D. he HIDS is preventing the connection
View answer
Correct Answer: A
Question #59
A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time.Which of the following licensing models would be BEST lot the company?
A. er site
B. er concurrent user
C. er core
D. er instance
View answer
Correct Answer: B
Question #60
Which of the following commands should a systems administrator use to create a batch script to map multiple shares'?
A. btstat
B. etuse
C. racert
D. etstst
View answer
Correct Answer: B
Question #61
An administrator discovers a Bash script file has the following permissions set in octal notation; Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?
A. hmod go-rw>:
B. hmod u=rwx
C. hmod u+wx
D. hmod g-rwx
View answer
Correct Answer: A
Question #62
A technician wants to limit disk usage on a server.Which of the following should the technician implement?
A. ormatting
B. ompression
C. isk quotas
D. artitioning
View answer
Correct Answer: C
Question #63
A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships.Which of the following is MOST likely causing the issue?
A. elnet connections are disabled on the server
B. ole-based access control is misconfigured
C. here are misconfigured firewall rules
D. roup policies have not been applied
View answer
Correct Answer: C
Question #64
Which of the following BEST measures now much downtime an organization can tolerate Curing an unplanned outage?
A. LA
B. IA
C. TO
D. TTR
View answer
Correct Answer: C
Question #65
Which of the following testing exercises for disaster recovery is primarily used to discuss incident response strategies for critical systems without affecting production data?
A. abletcp
B. ackup recovery test
C. rverail over
D. ot-site visit audit
View answer
Correct Answer: A
Question #66
A company's IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company's SOC administrator has asked a technician to harden this server.Which of the following would be the BEST way to complete this request?
A. isable port 389 on the server
B. ove traffic from port 389 to port 443
C. ove traffic from port 389 to port 637
D. nable port 389 for web traffic
View answer
Correct Answer: A
Question #67
A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of dat
A. hich of the following RAID levels should the administrator choose?
B.
C.
D.
E.
View answer
Correct Answer: D
Question #68
Which of the following will correctly map a script to a home directory for a user based on username?
A. \\\server\\users$\\username
B. \\\server\\%username%
C. \\\server\\FirstInitialLastName
D. \\\server\\$username$
View answer
Correct Answer: B
Question #69
Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?
A. ive failover
B. imulated failover
C. synchronous
D. abletop
View answer
Correct Answer: D
Question #70
A server technician downloaded new firmware from the manufacturer's website. The technician then attempted to install the firmware on the server, but the installation failed, stating the file is potentially corrupt.Which of the following should the technician have checked prior to installing the firmware?
A. LF configuration
B. BR failure
C. CC support
D. D5 checksum
View answer
Correct Answer: D
Question #71
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:The administrator configures the IP address for the new server as follows:IP address: 192.168.1.1/24Default gateway: 192.168.10.1A ping sent to the default gateway is not successful.Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A. P address: 192
B. P address: 192
C. P address: 192
D. P address: 192
View answer
Correct Answer: A
Question #72
A company stores extremely sensitive data on an alt-gapped system.Which of the following can Be Implemented to increase security against a potential insider threat?
A. wo-person Integrity
B. SO
C. IEM
D. araday cage
E. FA
View answer
Correct Answer: A
Question #73
A server administrator purchased a single license key to use for all the new servers that will be imaged this year.Which of the following MOST likely refers to the licensing type that will be used?
A. er socket
B. pen-source
C. er concurrent user
D. olume
View answer
Correct Answer: D
Question #74
A server administrator is testing a disaster recovery plan. The test involves creating a downtime scenario and taking the necessary steps.Which of the following testing methods is the administrator MOST likely performing?
A. ackup recovery
B. imulated
C. abletop
D. ive failover
View answer
Correct Answer: D
Question #75
A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?
A. D card
B. AS drive
C. ATA drive
D. AS drive
View answer
Correct Answer: D
Question #76
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?
A. ake a snapshot of the original VM
B. lone the original VM
C. onvert the original VM to use dynamic disks
D. erform a P2V of the original VM
View answer
Correct Answer: A
Question #77
Which of the following relates to how much data loss a company agrees to tolerate in the event of a disaster?
A. TO
B. TBF
C. RO
D. TTR
View answer
Correct Answer: A
Question #78
A Linux administrator created a script that will run at startup. After successfully writing the script, the administrator received me following output when trying to execute the script:Bash ./startup,sh:Permission deniedWhich of the following commands would BEST resolve the error message?
A. hmod +w startup
B. hmod 444 startup
C. hmod+x startup
D. hmod 466 startUp,sh
View answer
Correct Answer: C
Question #79
Which of the following are measures that should be taken when a data breach occurs? (Select TWO).
A. ee Explanation section for answer
View answer
Correct Answer: BE
Question #80
Which of the following is an example of load balancing?
A. ound robin
B. ctive-active
C. ctive-passive
D. ailover
View answer
Correct Answer: A
Question #81
A security manager is concerned that a rogue employee could boot a server from an outside USB drive.Which of the following actions can be taken to reduce this risk? (Select TWO).
A. RU
B. CP
C. LP
D. PU
E. IC
View answer
Correct Answer: BC
Question #82
Which of the following refers to the requirements that dictate when to delete data backups?
A. etention policies
B. loud security impact
C. ff-site storage
D. ife-cycle management
View answer
Correct Answer: A
Question #83
A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?
A. Install security cameras
B. Utilize security guards
C. Install bollards
D. Install a mantrap
View answer
Correct Answer: C
Question #84
A company is building a new datacenter next to a busy parking lot.Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?
A. nstall security cameras
B. tilize security guards
C. nstall bollards
D. nstall a mantrap
View answer
Correct Answer: C
Question #85
A technician has several possible solutions to a reported server issue.Which of the following BEST represents how the technician should proceed with troubleshooting?
A. etermine whether there is a common element in the symptoms causing multiple problems
B. erform a root cause analysis
C. ake one change at a time and test
D. ocument the findings, actions, and outcomes throughout the process
View answer
Correct Answer: C
Question #86
A server is reporting a hard drive S.M.
A.
A. S
B. S
C. S
D. S
View answer
Correct Answer: A
Question #87
Which of the following backup types resets the archive bit each time it is run?
A. ifferential
B. napshot
C. ncremental
D. ynthic full
View answer
Correct Answer: C
Question #88
A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously.Which of the following BEST represents what the technician should investigate during troubleshooting?
A. irmware incompatibility
B. PU overheating
C. ED indicators
D. SD issues
View answer
Correct Answer: B
Question #89
A server administrator was asked to build a storage array with the highest possible capacity.Which of the following RAID levels should the administrator choose?
A. AID 0
B. AID 1
C. AID 5
D. AID 6
View answer
Correct Answer: A
Question #90
A server administrator is installing an OS on a new server. Company policy states no one is to log in directly to the server.Which of the following Installation methods is BEST suited to meet the company policy?
A. UI
B. ore
C. irtualized
D. lone
View answer
Correct Answer: B
Question #91
A server administrator has configured a web server.Which of the following does the administrator need to install to make the website trusted?
A. ress F8 to enter safe mode
B. oot from the media
C. nable HIDS on the server
D. og in with an administrative account
View answer
Correct Answer: B
Question #92
A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter.Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
A. etenforce 0
B. etenforce permissive
C. etenforce 1
D. etenforce disabled
View answer
Correct Answer: AB
Question #93
A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server.Which of the following should the administrator check FIRST?
A. etwork connectivity on the server
B. VM status on the server
C. isk space in the /var directory
D. UM dependencies
View answer
Correct Answer: C
Question #94
A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed. Which of the following should the technician do NEXT, given the disk is hot swappable?
A. Stop sharing the volume
B. Replace the disk
C. Shut down the SAN
D. Stop all connections to the volume
View answer
Correct Answer: B
Question #95
Which of the following BEST describes overprovisioning in a virtual server environment?
A. ommitting more virtual resources to virtual machines than there are physical resources present
B. nstalling more physical hardware than is necessary to run the virtual environment to allow for future expansion
C. llowing a virtual machine to utilize more resources than are allocated to it based on the server load
D. nsuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
View answer
Correct Answer: A
Question #96
A technician is connecting a Linux server to a share on a NAS.Which of the following is the MOST appropriate native protocol to use for this task?
A. IFS
B. TP
C. FTP
D. FS
View answer
Correct Answer: D
Question #97
A server administrator needs to deploy five VMs, all of which must have the same type of configuration.Which of the following would be the MOST efficient way to perform this task?
A. napshot a VM
B. se a physical host
C. erform a P2V conversion
D. se a VM template
View answer
Correct Answer: D
Question #98
A user logs in to a Linux server and attempts to run the following command:sudo emacs /root/fileHowever the user gets the following message:User userid is not allowed to execute Temacs' on this server.Which of the following would BEST allow the user to find out which commands can be used?
A. isudo I grep userid
B. udo -1 -U userid
C. at /etc/passwd
D. serlist I grep userid
View answer
Correct Answer: B
Question #99
An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage Which of the following RAID levels will yield the BEST combination of available space and redundancy?
A. AID
B. AID 1
C. AIDS
D. AID 10
View answer
Correct Answer: D
Question #100
A company has a data center that is located at its headquarters, and it has a warm site that is located20mi (32km) away, which serves as a DR location.Which of the following should the company design and implement to ensure its DR site is adequate?
A. et up the warm site as a DR cold site
B. et up a DR site that is in the cloud and in the same region
C. et up the warm site as a DR hot site
D. et up a DR site that is geographically located in another region
View answer
Correct Answer: D
Question #101
A server administrator added a new drive to a server. However, the drive is not showing up as available.Which of the following does the administrator need to do to make the drive available?
A. artition the drive
B. reate a new disk quota
C. onfigure the drive as dynamic
D. et the compression
View answer
Correct Answer: A
Question #102
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:
A. 1
B. 2
C. 3
D. 3
E. 43
View answer
Correct Answer: D
Question #103
A server in a remote datacenter is no longer responsive.Which of the following is the BEST solution to investigate this failure?
A. emote desktop
B. ccess via a crash cart
C. ut-of-band management
D. Secure Shell connection
View answer
Correct Answer: C
Question #104
A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used.Which of the following backup methods does this describe?
A. pen file
B. ynthetic full
C. ull Incremental
D. ull differential
View answer
Correct Answer: B
Question #105
A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries.Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?
A. onfigure a firewall
B. lose the unneeded ports
C. nstall a HIDS
D. isable unneeded services
View answer
Correct Answer: A
Question #106
A hardware technician is installing 19 1U servers in a 42 the following unit sizes should be allocated per server?
A. U
B. U
C. U
D. U
View answer
Correct Answer: A
Question #107
Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
A. misconfigured firewall
B. misconfigured hosts
C. misconfigured hosts file
D. misconfigured hosts
View answer
Correct Answer: B
Question #108
A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS.Which of the following would work BEST to limit an attacker from exploiting this vulnerability?
A. nstalling the latest patches
B. losing open ports
C. nabling antivirus protection
D. nabling a NIDS
View answer
Correct Answer: A
Question #109
An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?
A. root
B. etc
C. root/
D. etc
View answer
Correct Answer: B

View The Updated CompTIA Exam Questions

SPOTO Provides 100% Real CompTIA Exam Questions for You to Pass Your CompTIA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: