Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

SK0-005 CompTIA Server+ Certification Exam Questions and Answers

Questions 4

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

Options:

A.

Applying OS updates

B.

Disabling unused services

C.

Implementing HIDS

D.

Installing anti-malware

Buy Now
Questions 5

An administrator receives an alert that one of the virtual servers has suddenly crashed. The administrator confirms the data center does not have any power failures and then connects to the remote console of the crashed server After connecting to the server console, which of the following should the administrator complete first?

Options:

A.

Use the keyboard command AH+F12 to switch to the kernel log screen

B.

Perform a hard reboot on the server and monitor the server startup

C.

Collect a screenshot of the PSOD and note the details after the line detailing the OS version

D.

Collect a core dump from the server and store locally before rebooting the hardware

Buy Now
Questions 6

A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows:

eth0: flags=4163<UP, BROADCAST,RUNNING,MULTICAST> mtu 1500

inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

Options:

A.

The server is configured to use DHCP on a network that has multiple scope options

B.

The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask

C.

The server is configured to use DHCP on a network that does not have a DHCP server

D.

The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting

Buy Now
Questions 7

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?

Options:

A.

QSFP+

B.

10 GigE

C.

SFP

D.

SFP+

Buy Now
Questions 8

Which of the following would a systems administrator most likely implement to encrypt data in transit for remote administration?

Options:

A.

Telnet

B.

SSH

C.

TFTP

D.

rlogin

Buy Now
Questions 9

Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)

Options:

A.

The server has a faulty power supply

B.

The server has a CMOS battery failure

C.

The server requires OS updates

D.

The server has a malfunctioning LED panel

E.

The servers do not have NTP configured

F.

The time synchronization service is disabled on the servers

Buy Now
Questions 10

A server administrator needs to ensure proprietary data does not leave the company. Which of the following should the administrator implement to meet this requirement?

Options:

A.

A review of users' activities

B.

File-level monitoring

C.

A SIEM solution

D.

A DLP policy

Buy Now
Questions 11

A senior administrator was notified that a junior administrator installed software on a server that should not have new software installed on it. The senior administrator decides to restrict the server via a Group Policy. Which of the following can be used to elevate the permissions?

Options:

A.

Computer management

B.

AD

C.

Local users and groups

D.

UAC

Buy Now
Questions 12

A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?

Options:

A.

Inform the impacted users.

B.

Make the changes to the system.

C.

Determine the probable causes.

D.

Identify changes to the server.

Buy Now
Questions 13

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

Options:

A.

Network

B.

Embedded

C.

Optical

D.

USB

Buy Now
Questions 14

An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconf ig:

The application server is reading the following output from ipconf ig:

Which of the following most likely contains an error?

Options:

A.

IP address

B.

DHCP

C.

Gateway

D.

Subnet mask

Buy Now
Questions 15

A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann’s home directory permissions and discovers the following:

dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

Options:

A.

chmod777/home/Ann

B.

chmod666/home/Ann

C.

chmod711/home/Ann

D.

chmod754/home/Ann

Buy Now
Questions 16

Which of the following symbols is used to write a text description per line within a PowerShell script?

Options:

A.

%

B.

@

C.

&

D.

#

Buy Now
Questions 17

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely

configured?

Options:

A.

Delegation

B.

Role-based

C.

Rule-based

D.

Scope-based

Buy Now
Questions 18

An administrator is setting up a new server and has been asked to install an operating system that does not have a GUI because the server has limited resources. Which of the

following installation options should the administrator use?

Options:

A.

Bare metal

B.

Headless

C.

Virtualized

D.

Slipstreamed

Buy Now
Questions 19

A systems administrator notices that a SAN is running out of space. There is no additional funding in the budget to upgrade the storage space. Which of the following will significantly reduce the storage space with the least effort? (Select two).

Options:

A.

Configuring compression

B.

Deleting old and unused files

C.

Increasing the number of IOPS

D.

Decreasing the RAID level

E.

Enabling deduplication

F.

Upgrading the filesystem type

Buy Now
Questions 20

A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.240

D.

255.255.255.254

Buy Now
Questions 21

Which of the following licenses would MOST likely include vendor assistance?

Options:

A.

Open-source

B.

Version compatibility

C.

Subscription

D.

Maintenance and support

Buy Now
Questions 22

A technician notices that every time a server is powered on, it turns off after several minutes. After reviewing logs, the technician notices the server registers execution of the shutdown. Which of the following should the technician do to fix this issue?

Options:

A.

Reset the memory modules

B.

Check for fan failure

C.

Change the VM password

D.

Set credentials for the remote console

Buy Now
Questions 23

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Options:

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

Buy Now
Questions 24

An administrator is troubleshooting a failed NIC in an application server. The server uses DHCP to get all IP configurations, and the server must use a

specific IP address. The administrator replaces the NIC, but then the server begins to receive a different and incorrect IP address. Which of the following will enable the server to get the proper IP address?

Options:

A.

Modifying the MAC used on the DHCP reservation

B.

Updating the local hosts file with the correct IP address

C.

Modifying the WWNN used on the DHCP reservation

D.

Updating the NIC to use the correct WWNN

Buy Now
Questions 25

Two developers are working together on a project, and they have built out a set of snared servers that both developers can access over the internet. Which of the following cloud models is this an example of?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Community

Buy Now
Questions 26

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

Options:

A.

Cancelled change request

B.

Change request postponement

C.

Emergency change request

D.

Privilege change request

E.

User permission change request

Buy Now
Questions 27

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Options:

A.

VBS

B.

Shell

C.

Java

D.

PowerShell

E.

Batch

Buy Now
Questions 28

A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.224

D.

255.255.255.252

Buy Now
Questions 29

Users have noticed a server is performing below Baseline expectations. While diagnosing me server, an administrator discovers disk drive performance has degraded. The administrator checks the diagnostics on the RAID controller and sees the battery on me controller has gone bad. Which of the following is causing the poor performance on the RAID array?

Options:

A.

The controller has disabled the write cache.

B.

The controller cannot use all the available channels.

C.

The drive array is corrupt.

D.

The controller has lost its configuration.

Buy Now
Questions 30

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

Options:

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

Buy Now
Questions 31

Which of the following open ports should be closed to secure the server properly? (Choose two.)

Options:

A.

21

B.

22

C.

23

D.

53

E.

443

F.

636

Buy Now
Questions 32

A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform NEXT?

Options:

A.

Restart the server

B.

Configure the network on the server

C.

Enable the port on the server

D.

Check the DHCP configuration

Buy Now
Questions 33

A server room with many racks of servers is managed remotely with occasional on-site support. Which of the following would be the MOST cost-effective option to administer and troubleshoot network problems locally on the servers?

Options:

A.

Management port

B.

Crash cart

C.

IP KVM

D.

KVM

Buy Now
Questions 34

A systems administrator needs to configure a new server and external storage for a new production application environment. Based on end-user specifications, the new solution needs to adhere to the following basic requirements:

1. The OS must be installed in a separate disk partition. In case of hard drive failure, it cannot be affected.

2. Application data IOPS performance is a must.

3. Data availability is a high priority, even in the case of multiple hard drive failures.

Which of the following are the BEST options to comply with the user requirements? (Choose three.)

Options:

A.

Install the OS on a RAID 0 array.

B.

Install the OS on a RAID 1 array.

C.

Configure RAID 1 for the application data.

D.

Configure RAID 5 for the application data.

E.

Use SSD hard drives for the data application array.

F.

Use SATA hard drives for the data application array.

G.

Use a single JBOD for OS and application data.

Buy Now
Questions 35

Which of me following BEST describes a disaster recovery site with a target storage array that receives replication traffic and servers that are only powered on In the event of a disaster?

Options:

A.

Cloud

B.

Cold

C.

Hot

D.

Warm

Buy Now
Questions 36

A system administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?

Options:

A.

Installing the latest patches

B.

Closing open ports

C.

Enabling antivirus protection

D.

Enabling a NIDS

Buy Now
Questions 37

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Options:

A.

Restore the data from backup.

B.

Disclose the incident.

C.

Disable unnecessary ports.

D.

Run an antivirus scan.

E.

Identify the exploited vulnerability.

F.

Move the data to a different location.

Buy Now
Questions 38

Users ate experiencing issues when trying to access resources on multiple servers. The servers are virtual and run on an ESX server. A systems administrator is investigating but is unable to connect to any of the virtual servers. When the administrator connects to the host, a purple screen with while letters appears. Which of the following troubleshooting steps should the administrator perform FIRST?

Options:

A.

Check the power supplies

B.

Review the log files.

C.

Reinstall the ESX server.

D.

Reseat the processors.

Buy Now
Questions 39

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

Options:

A.

Snapshot a VM.

B.

Use a physical host.

C.

Perform a P2V conversion.

D.

Use a VM template.

Buy Now
Questions 40

A datacenter in a remote location lost power. The power has since been restored, but one ol the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?

Options:

A.

Crash cart

B.

Out-of-band console

C.

IP KVM

D.

RDP

Buy Now
Questions 41

Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?

Options:

A.

Cable management

B.

Rail kits

C.

A wireless connection

D.

A power distribution unit

Buy Now
Questions 42

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

Options:

A.

Perform a root cause analysis

B.

Develop a plan of action

C.

Document the findings

D.

Escalate the issue

E.

Scope the issue

F.

Notify the users

Buy Now
Questions 43

A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?

Options:

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

Buy Now
Questions 44

Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?

Options:

A.

Definition updates

B.

Driver updates

C.

OS security updates

D.

Application updates

Buy Now
Questions 45

Which of the following backup methods can be performed while a server is running, will not interrupt files in use, and can be used to fully restore the server if needed?

Options:

A.

Snapshot

B.

Archive

C.

Open file

D.

Differential

Buy Now
Questions 46

An administrator needs to disable root login over SSH. Which of the following tiles should be edited to complete this task?

Options:

A.

/root.ssh/sshd/config

B.

/etc.ssh/sshd_config

C.

/root/.ssh/ssh_config

D.

/etc.sshs_shd_config

Buy Now
Questions 47

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials.The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

Options:

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Buy Now
Questions 48

Which of the following would be BEST to help protect an organization against social engineering?

Options:

A.

More complex passwords

B.

Recurring training and support

C.

Single sign-on

D.

An updated code of conduct to enforce social media

Buy Now
Questions 49

A server in a remote datacenter is no longer responsive. Which of the following is the BEST solution to investigate this failure?

Options:

A.

Remote desktop

B.

Access via a crash cart

C.

Out-of-band management

D.

A Secure Shell connection

Buy Now
Questions 50

When a user plugs a USB drive into a workstation and attempts to transfer a file from the server, an error appears that indicates the file cannot be copied. However, the user can copy or create new files from the local workstation. Which of the following is part of this security strategy?

Options:

A.

HIDS

B.

SIEM

C.

ACL

D.

DLP

Buy Now
Questions 51

Multiple users have reported an issue accessing files on a specific server. Which of the following should be the first step in troubleshooting this issue?

Options:

A.

Notify the key stakeholders of an outage.

B.

Immediately execute a backup of the server.

C.

Identify changes made to the environment.

D.

Correct the permissions on the folder containing the files.

Buy Now
Questions 52

Which of the following should be created to understand how long data is stored and how frequently data backups should be scheduled?

Options:

A.

Retention policies

B.

Service-level agreement

C.

Life-cycle management

D.

Mean time to recover

Buy Now
Questions 53

A user is unable to access the database server from a workstation. All other workstations are able to access the database server. The technician issues the following command to check the workstation:

userGhost:!# nmap localhost

Nmap scan report for localhost (127.0.0.1)

Host is up (0.001 ms latency).

Not shown: 1023 closed ports

PORT STATE SERVICE

3306 open mysql

Which of the following should the technician perform next to allow access?

Options:

A.

Check the database server

B.

Change the database password

C.

Open port 3306 on the server

D.

Edit the network firewall rules

Buy Now
Questions 54

An administrator has been troubleshooting a server issue. The administrator carefully questioned the users and examined the available logs. Using this information, the administrator was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, the administrator's theory proved to be correct. Which of the following should be the next step to troubleshoot the issue?

Options:

A.

Document the findings and actions.

B.

Escalate the issue to the management team.

C.

Implement the solution.

D.

Establish an action plan.

Buy Now
Questions 55

A server administrator is reviewing the following specifications:

VM01 Host:

CPU: 2 Physical, 4 Cores

RAM: 16GB

Storage: 16TB

Server 1 on VM01:

CPU: 1 virtual socket, 1 core per socket

RAM: 4GB

Storage: 8TB

Server 2 on VM01:

CPU: 2 virtual sockets, 2 cores per socket

RAM: 8GB

Storage: 10TB

Which of the following is described given these specifications?

Options:

A.

Virtual switch

B.

Host vs. guest

C.

Overprovisioning

D.

Scalability

Buy Now
Questions 56

A technician is setting up a repurposed server. The minimum requirements are 2TB while ensuring the highest performance and providing support for one drive failure.The technician has the following six drives available:

Which of the following drive selections should the technician utilize to best accomplish this goal?

Options:

A.

1,2, 4, and 6

B.

1, 2, 3, 5, and 6

C.

1, 2, 4, 5, and 6

D.

1, 2, 3, 4, and 6

Buy Now
Questions 57

Three new servers that use similar types of resources need to be set up, installed with the same OS, and ready within a short time frame. Which of the following installation types would most likely be used?

Options:

A.

Physical clones

B.

Bare metal

C.

Virtualized

D.

USB

Buy Now
Questions 58

A virtual host has four NICs and eight VMs. Which of the following should the technician configure to enable uplink redundancy?

Options:

A.

VM

B.

vNIC

C.

vSwitch

D.

vCPU

E.

vHBA

Buy Now
Questions 59

A server recently started sending error messages about running out of memory while in use. After a maintenance period during which more memory was added, the server is still unable to consistently remain powered on. Which of the following should the technician check first?

Options:

A.

Memory compatibility

B.

Memory speed

C.

Memory slots

D.

Boot order

Buy Now
Questions 60

A server administrator implemented a new backup solution and needs to configure backup methods for remote sites. These remote sites have low bandwidth and backups must not

interfere with the network during normal business hours. Which of the following methods can be used to meet these requirements? (Select two).

Options:

A.

Open file

B.

Archive

C.

Cloud

D.

Snapshot

E.

Differential

F.

Synthetic full

Buy Now
Questions 61

A security analyst completed a port scan of the corporate production-server network. Results of the scan were then provided to a systems administrator for immediate action. The following table represents the requested changes:

The systems administrator created local firewall rules to block the ports indicated above. Immediately, the service desk began receiving calls about the internet being down. The systems administrator then reversed the changes, and the internet became available again. Which of the following ports on DNSSrv must remain open when the firewall rules are reapplied?

Options:

A.

20

B.

21

C.

22

D.

23

E.

53

Buy Now
Questions 62

An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:

The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 63

An administrator is patching a file and print server After rebooting the server, it begins acting strangely. The administrator tries to open Print Management, but it will not open Upon inspection, the spooler service has been disabled. The administrator then notices the server has services that should be enabled but are disabled. Which of the following actions should the administrator take next to resolve the issue as quickly as possible?

Options:

A.

Roll back the installed updates

B.

Set the services to restart automatically and reboot the server

C.

Enable the spooler service.

D.

Reboot the server into safe mode

Buy Now
Questions 64

Which of the following licensing models was created by software companies in response to the increasing density of processors?

Options:

A.

Per-instance

B.

Per-server

C.

per-user

D.

per-core

Buy Now
Questions 65

Which of the following benefits of virtualization is most important during a data center migration?

Options:

A.

Portability

B.

Orchestration

C.

Overprovisioning

D.

Scalability

Buy Now
Questions 66

A company recently implemented VolP across a multicampus environment with ten locations. The company uses many network technologies, including fiber,

copper, and wireless. Users calling between three of the locations have reported that voices sound strange. Which of the following should be monitored to

narrow down the issue?

Options:

A.

Disk IOPS

B.

CPU utilization

C.

RAM utilization

D.

Network latency

Buy Now
Questions 67

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

Options:

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Buy Now
Questions 68

A server administrator is swapping out the GPU card inside a server. Which of the following actions should the administrator take FIRST?

Options:

A.

Inspect the GPU that is being installed.

B.

Ensure the GPU meets HCL guidelines.

C.

Shut down the server.

D.

Disconnect the power from the rack.

Buy Now
Questions 69

An administrator is troubleshooting a server that is rebooting and crashing. The administrator notices that the server is making sounds that are louder than usual. Upon closer inspection, the administrator

discovers that the noises are coming from the front of the chassis. Which of the following is the most likely reason for this behavior?

Options:

A.

One of the fans has failed.

B.

The power supply has failed.

C.

The RAM is malfunctioning.

D.

The CPU is overheating.

Buy Now
Questions 70

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

Options:

A.

File

Buy Now
Questions 71

Which of the following should a server administrator configure to ensure access to motherboard software is restricted?

Options:

A.

Biometric lock

B.

Data-at-rest encryption

C.

BIOS password

D.

Bootloader authentication

Buy Now
Questions 72

A systems engineer is configuring a new VLAN for expansion of a campus network. The engineer configures a new DHCP scope on the existing Windows DHCP server cluster and activates the scope for the clients. However, new clients in the area report they are not receiving any DHCP address information. Which of the following should the engineer do first?

Options:

A.

Confirm the client PCs are using the correct speed on the NIC

B.

Confirm the network uses the same NTP server as the clients

C.

Confirm the network has a helper address for the DHCP server

D.

Confirm the DHCP server is authorized in Active Directory

Buy Now
Questions 73

A server technician notices several of the servers in a data center are making loud noises. The servers are still working correctly, and no indicator lights show any issues. Which of the following should the technician do first to ensure the issues are corrected and the servers remain online?

Options:

A.

Replace the drives.

B.

Upgrade the firmware.

C.

Establish a remote connection to the server.

D.

Replace the fans.

Buy Now
Questions 74

A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?

Options:

A.

Insider threat

B.

Worms

C.

Ransomware

D.

Open ports

E.

Two-person integrity

Buy Now
Questions 75

A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output:

># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

Options:

A.

setenforce 0

B.

setenforce permissive

C.

setenforce 1

D.

setenforce disabled

Buy Now
Questions 76

Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?

Options:

A.

Warranty

B.

Purchase order

C.

License

D.

Baseline document

Buy Now
Questions 77

Under which of the following should a technician implement scripting?

Options:

A.

Authenticating users

B.

Change management

C.

Business impact analysis

D.

Step-by-step tasks

Buy Now
Questions 78

A technician is preparing a deployment of servers to be used by staff at a remote location. Which of the following should the technician do to prevent access to the hardware configuration?

Options:

A.

Enable an administrator account

B.

Enable a UEFI password

C.

Disable WOL

D.

Enable encryption at rest

Buy Now
Questions 79

A server administrator is installing a new server that uses 40G0 network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

Options:

A.

SFP+

B.

GBIC

C.

SFP

D.

QSFP+

Buy Now
Questions 80

An administrator is installing a new file server that has four drive bays available. Which of the following RAID types would provide the MOST storage as well as disk redundancy?

Options:

A.

RAIDO

B.

RAID 1

C.

RAID 5

D.

RAID 10

Buy Now
Questions 81

A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center. Which of the following would address the request with minimal server downtime?

Options:

A.

Unplug the power cables from the redundant power supplies, leaving just the minimum required.

B.

Convert the physical servers to the hypervisors and retire the ten servers.

C.

Reimage the physical servers and retire all ten servers after the migration is complete.

D.

Convert the ten servers to power-efficient core editions.

Buy Now
Questions 82

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

Options:

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Buy Now
Questions 83

Which of the following distributes a load across all interfaces?

Options:

A.

Link aggregation group

B.

Most recently used algorithm

C.

Active-passive configuration

D.

Failover

Buy Now
Questions 84

Which of the following would a systems administrator implement to ensure all web traffic is secure?

Options:

A.

SSH

B.

SSL

C.

SMTP

D.

PGP

Buy Now
Questions 85

A company wants to deploy software to all users, Out very few of men will be using the software at any one point in time. Which of the following licensing models would be BEST lot the company?

Options:

A.

Per site

B.

Per concurrent user

C.

Per core

D.

Per instance

Buy Now
Questions 86

A company stores extremely sensitive data on an alt-gapped system. Which of the following can Be Implemented to increase security against a potential insider threat?

Options:

A.

Two-person Integrity

B.

SSO

C.

SIEM

D.

Faraday cage

E.

MFA

Buy Now
Questions 87

A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

Options:

A.

IP address: 192.168.10.2/24Default gateway: 192.168.10.1

B.

IP address: 192.168.1.2/24Default gateway: 192.168.10.1

C.

IP address: 192.168.10.3/24Default gateway: 192.168.20.1

D.

IP address: 192.168.10.24/24Default gateway: 192.168.30.1

Buy Now
Questions 88

Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

Options:

A.

SLA

B.

MTBF

C.

RTO

D.

MTTR

Buy Now
Questions 89

Which of me following should be placed at the top of a Bash script to ensure it can be executed?

Options:

A.

bash

B.

!execute

C.

#!

D.

@eacho off

Buy Now
Questions 90

A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network. Which of the following should the technician do FIRST to return the server to service as soon as possible?

Options:

A.

Replace the NIC

B.

Make sure the NIC is on the HCL

C.

Reseat the NIC

D.

Downgrade the NIC firmware

Buy Now
Questions 91

Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

Options:

A.

Scope-based

B.

Role-based

C.

Location-based

D.

Rule-based

Buy Now
Questions 92

A company is building a new datacenter next to a busy parking lot. Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

Options:

A.

Install security cameras

B.

Utilize security guards

C.

Install bollards

D.

Install a mantrap

Buy Now
Questions 93

Which of the following is used for fail over, providing access to all the services currently in use by an organization without having to physically move any servers or employees?

Options:

A.

The cloud

B.

A cold site

C.

A warm site

D.

An emergency operations center

Buy Now
Questions 94

An administrator needs to reconfigure a teamed network connection on a server in a remote data center. Which of the following will offer the most resilient connection while performing this change?

Options:

A.

Use of an 00B solution

B.

Use of a crash cart

C.

Use of a VNC console

D.

Use of an RDP console

Buy Now
Questions 95

Which of the following often-overlooked parts of the asset life cycle can cause the greatest number of issues in relation to Pll exposure?

Options:

A.

Usage

B.

End-of-life

C.

Procurement

D.

Disposal

Buy Now
Questions 96

Which of the following backup methods protects all the changes that have occurred since the last full backup?

Options:

A.

Incremental

B.

Archive

C.

Differential

D.

Snapshot

Buy Now
Questions 97

Which of the following refers to the requirements that dictate when to delete data backups?

Options:

A.

Retention policies.

B.

Cloud security impact

C.

Off-site storage

D.

Life-cycle management

Buy Now
Questions 98

Which of the following cloud models is BEST described as running workloads on resources that are owned by the company and hosted in a company-owned data center, as well as on rented servers in another company's data center?

Options:

A.

Private

B.

Hybrid

C.

Community

D.

Public

Buy Now
Questions 99

An administrator is troubleshooting an application performance issue on a virtual server with two vCPUs. The application performance logs indicate CPU contention. The administrator adds more vCPU cores to the VM, yet the issue persists. Which of the following is the most likely reason for this issue?

Options:

A.

The server has high page utilization.

B.

The server has high disk latency.

C.

The application is single-threaded.

D.

The application cannot be virtualized.

Buy Now
Questions 100

A storage administrator needs to implement SAN-based shared storage that can transmit at 16Gb over an optical connection. Which of the following connectivity options would BEST meet this requirement?

Options:

A.

Fibre Channel

B.

FCoE

C.

iSCSI

D.

eSATA

Buy Now
Questions 101

An administrate is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?

Options:

A.

rsync

B.

copy

C.

scp

D.

robocopy

Buy Now
Questions 102

An administrator has deployed a new virtual server from a template. After confirming access to the subnet's gateway, the administrator is unable to log on with the domain credentials. Which of the following is the most likely cause of the issue?

Options:

A.

The server has not been joined to the domain.

B.

An IP address has not been assigned to the server.

C.

The server requires a reboot to complete the deployment process.

D.

The domain credentials are invalid.

Buy Now
Questions 103

A site is considered a warm site when it:

    has basic technical facilities connected to it.

    has faulty air conditioning that is awaiting service.

    is almost ready to take over all operations from the primary site.

Options:

A.

is fully operational and continuously providing services.

Buy Now
Questions 104

Which ofthefollowingshouldatechnician verify FIRST before decommissioning and wipingafile server?

Options:

A.

Themedia destructionmethod

B.

Therecycling poke?

C.

Asset management documentation

D.

Non-utilization

Buy Now
Questions 105

An administrator receives an alert stating a S.MAR.T. error has been detected. Which of the following should the administrator run FIRST to determine the issue?

Options:

A.

A hard drive test

B.

A RAM test

C.

A power supply swap

D.

A firmware update

Buy Now
Questions 106

An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?

Options:

A.

Linked list

B.

String

C.

Loop

D.

Constant

Buy Now
Questions 107

Which of the following is the MOST secure method to access servers located in remote branch offices?

Options:

A.

Use an MFAout-of-band solution.

B.

Use a Telnet connection.

C.

Use a password complexity policy.

D.

Use a role-based access policy.

Buy Now
Questions 108

An administrator is troubleshooting a failure in the data center in which a server shut down/turned off when utility power was lost The server had redundant power supplies. Which of the following is the MOST likely cause of this failure?

Options:

A.

The UPS batteries were overcharged.

B.

Redundant power supplies require 220V power

C.

Both power supplies were connected to the same power feed

D.

The power supplies werenot cross-connected

Buy Now
Questions 109

A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which ofthefollowing should the developer use when designing the web application?

Options:

A.

Round robin

B.

Link aggregation

C.

Network address translation

D.

Bridged networking

Buy Now
Questions 110

Which of the following will correctly map a script to a home directory for a user based on username?

Options:

A.

\\server\users$\username

B.

\\server\%username%

C.

\\server\FirstInitialLastName

D.

\\server\$username$

Buy Now
Questions 111

Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?

Options:

A.

End-to-end encryption

B.

Encryption in transit

C.

Encryption at rest

D.

Public key encryption

Buy Now
Questions 112

A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taxing up a large amount of space. There is no central log server. Which of the following would help free up disk space?

Options:

A.

Log rotation

B.

Log shipping

C.

Log alerting

D.

Log analysis

Buy Now
Questions 113

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server’s console?

Options:

A.

IP KVM

B.

VNC

C.

A crash cart

D.

RDP

E.

SSH

Buy Now
Questions 114

A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?

Options:

A.

Determine whether there is a common element in the symptoms causing multiple problems.

B.

Perform a root cause analysis.

C.

Make one change at a time and test.

D.

Document the findings, actions, and outcomes throughout the process.

Buy Now
Questions 115

A technician is configuring a new server with four disks for the development team. The requirements are disk redundancy and maximum usable disk capacity. Which of the following RAID levels should be used for this server?

Options:

A.

0

B.

1

C.

5

D.

10

Buy Now
Questions 116

Which of the following BEST describes a guarantee of the amount of time it will take to restore a downed service?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

MTTR

Buy Now
Questions 117

Which of the following concepts is in use when dual power supplies are connected to different power sources?

Options:

A.

Fault tolerance

B.

Active-passive

C.

Component redundancy

D.

Heartbeat

E.

Link aggregation

Buy Now
Questions 118

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

Options:

A.

Utilize privacy screens.

B.

Implement disk quotas.

C.

Install a DLP solution.

D.

Enforce the lock-screen feature.

Buy Now
Questions 119

A technician is working on a Linux server. The customer has reported that files in the home directory are missing. The /etc/ f stab file has the following entry:

nfsserver:/home /home nfs defaults 0 0

However, a df -h /home command returns the following information:

/dev/sda2 10G 1G 9G 10% /home

Which of the following should the technician attempt FIRST to resolve the issue?

Options:

A.

mkdir /home

B.

umount nfsserver:/home

C.

rmdir nfsserver:/home/dev/sda2

D.

mount /home

Buy Now
Questions 120

A server administrator is creating a script that will move files only if they were created before a date input by the user. Which of the following constructs will allow the script to apply this test until all available files are assessed?

Options:

A.

Variable

B.

Loop

C.

Comparator

D.

Conditional

Buy Now
Questions 121

An administrator is working on improving the security of a new domain controller. A report indicates several open ports on the server. Which of the following ports should the administrator disable?

Options:

A.

135

B.

636

C.

3268

D.

3389

Buy Now
Questions 122

An administrator is upgrading a group of legacy blade servers to the latest version of the hypervisor. After restarting the server, the upgrade is interrupted. The hypervisor is not available, and the update is not successful. Which of the following should the administrator do next to accomplish this upgrade?

Options:

A.

Change the upgrade to a new installation and overwrite the boot drive.

B.

Upgrade the blade server's firmware to support the new hypervisor.

C.

Increase the blade server’s onboard RAM.

D.

Upgrade the blade server's hardware.

Buy Now
Questions 123

An administrator has been asked to deploy a database server that provides the highest performance with fault tolerance. Which of the following RAID levels will fulfill this request?

Options:

A.

RAIDO

B.

RAID1

C.

RAID 5

D.

RAID 6

E.

RAID 10

Buy Now
Questions 124

A technician has received tickets responding a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?

Options:

A.

Log rotation

B.

Alerts

C.

Reports

D.

Log stopping

Buy Now
Questions 125

A company has a data center that is located at its headquarters, and it has a warm site that is located 20mi (32km) away, which serves as a DR location. Which of the following should the company design and implement to ensure its DR site is adequate?

Options:

A.

Set up the warm site as a DR cold site.

B.

Set up a DR site that is in the cloud and in the same region.

C.

Set up the warm site as a DR hot site.

D.

Set up a DR site that is geographically located in another region.

Buy Now
Questions 126

Which of the following is a system that scans outgoing email for account numbers, sensitive phrases, and other forms of Pll?

Options:

A.

SIEM

B.

DLP

C.

HIDS

D.

IPS

Buy Now
Questions 127

Which of the following security risks provides unauthorized access to an application?

Options:

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

Buy Now
Questions 128

Joe. a user m the IT department cannot save changes to a sensitive file on a Linux server. An 1s -1& snows the following listing;

Which of the following commands would BEST enable the server technician to allow Joe tohaveaccess without granting excessive access to others?

Options:

A.

chmod 777 filename

B.

chown Joe filename

C.

Chmod g+w filename

D.

chgrp IT filename

Buy Now
Questions 129

A company's security team has noticed employees seem to be blocking the door in the main data center when they are working on equipment to avoid having to gain access each time. Which of the following should be implemented to force the employees to enter the data center properly?

Options:

A.

A security camera

B.

A mantrap

C.

A security guard

D.

A proximity card

Buy Now
Questions 130

Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?

Options:

A.

An access control vestibule

B.

Video surveillance

C.

Bollards

D.

Data center camouflage

Buy Now
Questions 131

An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do BEFORE donating the equipment?

Options:

A.

Remove all the data from the server drives using the least destructive method.

B.

Repurpose and recycle any usable server components.

C.

Remove all the components from the server.

D.

Review all company polices.

Buy Now
Questions 132

A server administrator has received calls regarding latency and performance issues with a file server. After reviewing all logs and server features the administrator discovers the server came with four Ethernet ports, out only one port is currently in use. Which of the following features will enable the use of all available ports using a single IP address?

Options:

A.

Network address translation

B.

in-band management

C.

Round robin

D.

NIC teaming

Buy Now
Questions 133

A server administrator is creating a new server that will be used to house customer sales records. Which of the following roles will MOST likely be Installed on the server?

Options:

A.

Print

B.

File

C.

Database

D.

Messaging

Buy Now
Questions 134

A technician is troubleshooting a server issue. The technician has determined several possible causes of the issue and has identified various solutions. Which of the following should the technician do next?

Options:

A.

Consult internet forums to determine which is the most common cause and deploy only that solution.

B.

Test each solution individually to determine the root cause, rolling back the changes in between each test.

C.

Implement the shortest solution first to identify the issue and minimize downtime.

D.

Test each solution in succession and restore the server from the latest snapshot.

Buy Now
Questions 135

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

Options:

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

Buy Now
Questions 136

Which of the following describes a configuration inwinch both nodes of a redundant system respond to service requests whenever possible?

Options:

A.

Active-passive

B.

Failover

C.

Active-active

D.

Fallback

Buy Now
Questions 137

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Whichof the following would be the FASTEST solution to implement with no downtime?

Options:

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

Buy Now
Questions 138

A technician is able to copy a Me to a temporary folder on another partition but is unable to copy it to a network share or a USB flash drive. Which of the following is MOST likely preventing the file from being copied to certain locations?

Options:

A.

An ACL

B.

Antivirus

C.

DLP

D.

A firewall

Buy Now
Questions 139

Which of the following backup types copies changed data from a server and then combines the backups on the backup target?

Options:

A.

Differential

B.

Incremental

C.

Synthetic full

D.

Snapshot

Buy Now
Questions 140

A technician recently applied a critical OS patch to a working sever. After rebooting, the technician notices the server Is unable to connect to a nearby database server. The technician validates a connection can be made to thedatabasefrom another host. Which of the following is the best NEXT step to restore connectivity?

Options:

A.

Enable HIDS.

B.

Change the service account permissions.

C.

Check the host firewall I rule.

D.

Roll back the applied patch.

Buy Now
Questions 141

An administrator has been asked to verify that all traffic egressing from a company is secured. The administrator confirms all the information that is sent over the network is encrypted. Which of the following describes the type of traffic being encrypted?

Options:

A.

Network encapsulation

B.

Off-site data

C.

Secure FTP

D.

Data in transit

Buy Now
Questions 142

An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?

Options:

A.

DHCP

B.

WINS

C.

DNS

D.

TCP

Buy Now
Questions 143

Users report they ate unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended it has now been recalled and removed from the website as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Select TWO)

Options:

A.

Uninstall recent updates.

B.

Reimage the server with a different OS.

C.

Run a port scan to verify open ports.

D.

Enable a GPO to uninstall the update.

E.

Scan and remove any malware.

F.

Reformat the server and restore the image from the latest backup.

Buy Now
Questions 144

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

Options:

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Buy Now
Questions 145

A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?

Options:

A.

The IP address

B.

The default gateway

C.

The VLAN

D.

The subnet mask

Buy Now
Questions 146

A technician is creating a network snare that will be used across both Unix and Windows clients at the same time. Users need read and write access to the files. Which of the following would be BEST for the technician to deploy?

Options:

A.

iSCSI

B.

CIFS

C.

HTTPS

D.

DAS

Buy Now
Questions 147

A systems administrator has several different types of hard drives. The administrator is setting up a MAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?

Options:

A.

RAID array

B.

Serial Attached SCSI

C.

Solid-state drive

D.

Just a bunch of disks

Buy Now
Exam Code: SK0-005
Exam Name: CompTIA Server+ Certification Exam
Last Update: Apr 21, 2025
Questions: 493

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now SK0-005 testing engine

PDF (Q&A)

$31.5  $104.99
buy now SK0-005 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 29 Apr 2025