CompTIA SK0-005 Exam Practice Questions (P. 3)
- Full Access (521 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following will correctly map a script to a home directory for a user based on username?
- A\\server\users$\username
- B\\server\%username%Most Voted
- C\\server\FirstInitialLastName
- D\\server\$username$
Correct Answer:
B
Reference:
https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9-08280a1ef25a/mapping-home-directory-with-username-variable? forum=w7itprogeneral
B
Reference:
https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9-08280a1ef25a/mapping-home-directory-with-username-variable? forum=w7itprogeneral
send
light_mode
delete
Question #22
A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue?
(Choose two.)
(Choose two.)
- AFaulty memoryMost Voted
- BData partition error
- CIncorrectly seated memoryMost Voted
- DIncompatible disk speed
- EUninitialized disk
- FOverallocated memory
Correct Answer:
AC
AC

Faulty or incorrectly seated memory can often cause blue screens of death (BSOD) following hardware upgrades. This issue often arises when the RAM isn’t properly installed, or if there's a hardware defect in the memory modules, potentially overlooked during the upgrade process. Always check that the memory is correctly installed and troubleshoot faulty units if BSOD persists.
send
light_mode
delete
Question #23
A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?
- APKIMost Voted
- BSSL
- CLDAP
- DDNS
Correct Answer:
A
Reference:
https://www.csoonline.com/article/3400836/what-is-pki-and-how-it-secures-just-about-everything-online.html
A
Reference:
https://www.csoonline.com/article/3400836/what-is-pki-and-how-it-secures-just-about-everything-online.html

send
light_mode
delete
Question #24
A technician is attempting to update a server's firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the
OS. Which of the following should the technician do NEXT to install the firmware?
OS. Which of the following should the technician do NEXT to install the firmware?
- APress F8 to enter safe mode
- BBoot from the media
- CEnable HIDS on the server
- DLog in with an administrative account
Correct Answer:
B
B

To successfully install firmware updates, it's essential that the server boots from the update media itself, not just the regular operating system. This typically requires altering the boot order settings or manually selecting the boot device during startup, often accessed through a function key like F12 or similar. This ensures the server initiates the firmware update process directly from the media on which it's contained, rather than booting into its standard operating system. Booting directly from the media is a common practice for firmware installation, safeguarding the update is applied correctly and efficiently.
send
light_mode
delete
Question #25
A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?
- Aecho /newdisk >> /etc/fstab
- Bnet use /newdisk
- Cmount ג€"o remount, rw /newdiskMost Voted
- Dmount ג€"a
Correct Answer:
C
Reference:
https://unix.stackexchange.com/questions/149399/how-to-remount-as-read-write-a-specific-mount-of-device
C
Reference:
https://unix.stackexchange.com/questions/149399/how-to-remount-as-read-write-a-specific-mount-of-device
send
light_mode
delete
Question #26
Which of the following BEST describes the concept of right to downgrade?
- AIt allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
- BIt allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
- CIt allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
- DIt allows a previous version of an OS to be installed and covered by the same license as the newer versionMost Voted
Correct Answer:
B
B

The concept of "right to downgrade" refers to having the capability, under the terms of a license, to use a previous version of an operating system without needing to purchase an additional license. This arrangement is especially beneficial in ensuring compatibility with older applications or systems until such time as these components can be updated to align with the newer version. The most precise explanation of this concept is found in option D. It’s essential to understand these licensing rights particularly when managing server environments to optimize both compliance and functionality.
send
light_mode
delete
Question #27
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open:
443
636
Which of the following open ports should be closed to secure the server properly? (Choose two.)
443
636
Which of the following open ports should be closed to secure the server properly? (Choose two.)
- A21Most Voted
- B22
- C23Most Voted
- D53
- E443
- F636
Correct Answer:
CD
CD

To enhance server security by allowing only secure traffic while maintaining DNS inquiries, Port 23 (Telnet) and Port 53 (DNS) should indeed be considered for closure. Port 23 is inherently insecure as it transmits data, including credentials, unencrypted. However, the function of Port 53 can be superseded by utilizing secure alternatives such as DNS over HTTPS (DoH) on Port 443, which encrypts DNS queries, maintaining functionality while enhancing security. This approach aligns well with modern security practices where encryption is prioritized to safeguard data integrity and privacy.
send
light_mode
delete
Question #28
A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?
- Anslookup
- Bnbtstat
- Ctelnet
- Dnetstat -aMost Voted
Correct Answer:
D
Reference:
https://linuxhint.com/netstat-a/
D
Reference:
https://linuxhint.com/netstat-a/
send
light_mode
delete
Question #29
Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
- AEncrypt the data that is leaving the SAN
- BEncrypt the data at restMost Voted
- CEncrypt the host servers
- DEncrypt all the network traffic
Correct Answer:
B
B

If data on the SAN is leaked, encrypting it at rest (Option B) is a crucial security measure. This approach ensures that even if unauthorized parties access the data, they cannot read or utilize it without the encryption keys. This security control is especially important in environments where sensitive or regulated data is stored, providing a robust defense against potential data breaches.
send
light_mode
delete
Question #30
A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using
PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is suׁcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.local
The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?
PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is suׁcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.local
The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?
- AA misconfigured firewall
- BA misconfigured hosts.deny file
- CA misconfigured hosts fileMost Voted
- DA misconfigured hosts.allow file
Correct Answer:
D
D

The correct answer hinges on recognizing that discrepancies in IP address results from the 'ping' command suggest an issue with local DNS resolution, often managed by the hosts file on individual systems. This file can override DNS settings and direct domain names to specific IP addresses, explaining why the 'ping' responses differed between the web server and the workstation. Misconfigured entries in the hosts file are the likely culprit for the FTP connection failure, as they would direct traffic to incorrect or unintended addresses.
send
light_mode
delete
All Pages