CompTIA SK0-005 Dumps (V16.03) – A Comprehensive Preparation Guide to Prepare for the CompTIA Server+ Certification Exam

Earning the CompTIA Server+ certification not only helps you gain deeper technical knowledge but also opens up a wealth of career opportunities. To effectively prepare for the CompTIA Server+ SK0-005 exam, it’s essential to use top-quality study resources – and that’s where the updated SK0-005 dumps from DumpsBase come in. We updated the CompTIA Server+ SK0-005 dumps to V16.03, containing a wide range of questions that cover all the topics included in the exam, ensuring you have a well-rounded understanding. We offer immediate access to the SK0-005 exam dumps in a PDF format, making it easy for you to start your preparation without delay. This is especially helpful for candidates who need to prepare quickly. Additionally, we have an online testing engine that replicates the real exam environment. This feature allows you to practice under realistic conditions and identify areas where you need improvement. With the PDF format and testing engine software, DumpsBase’s SK0-005 dumps (V16.02) are a great choice to help you prepare quickly and effectively.

Below are the SK0-005 free dumps for checking online:

1. Which of the following is typical of software licensing in the cloud?

2. A server administrator wants to run a performance monitor for optimal system utilization.

Which of the following metrics can the administrator use for monitoring? (Choose two.)

3. After configuring IP networking on a newly commissioned server, a server administrator installs a straight- through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command.

The partial output of the ping and ipconfig commands are displayed below:

The administrator returns to the switch and notices an amber link light on the port where the server is connected.

Which of the following is the MOST likely reason for the lack of network connectivity?

4. A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago.

Which of the following commands should a technician use to identify the issue?

5. Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the data and time are incorrect when the server is online. All other servers are working.

Which of the following would MOST likely cause this issue? (Choose two.)

6. A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy.

Which of the following should the company also perform as a data loss prevention method?

7. A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard.

Which of the following IP addresses should the administrator use to be in compliance with the standard?

8. An administrator needs to perform bare-metal maintenance on a server in a remote datacenter.

Which of the following should the administrator use to access the server’s console?

9. A technician needs to provide a VM with high availability.

Which of the following actions should the technician take to complete this task as efficiently as possible?

10. A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server.

The administrator checks Ann’s home directory permissions and discovers the following: dr-xr-xr-- /home/Ann

Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?

11. Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?

12. A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server.

Which of the following is causing the issue?

13. A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load.

Which of the following should the administrator implement FIRST to address the issue?

14. Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

15. A technician is installing a variety of servers in a rack.

Which of the following is the BEST course of action for the technician to take while loading the rack?

16. A technician is configuring a server that requires secure remote access.

Which of the following ports should the technician use?

17. A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server.

Which of the following should the administrator check FIRST?

18. Which of the following is an example of load balancing?

19. Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

20. Which of the following tools will analyze network logs in real time to report on suspicious log events?

21. Which of the following will correctly map a script to a home directory for a user based on username?

22. A server that recently received hardware upgrades has begun to experience random BSOD conditions.

Which of the following are likely causes of the issue? (Choose two.)

23. A server administrator has configured a web server.

Which of the following does the administrator need to install to make the website trusted?

24. A technician is attempting to update a server’s firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS.

Which of the following should the technician do NEXT to install the firmware?

25. A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk.

It was later determined that users were unable to create directories or files on the new mount point.

Which of the following commands would successfully mount the drive with the required parameters?

26. A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point.

Which of the following commands would successfully mount the drive with the required parameters?

27. Which of the following BEST describes the concept of right to downgrade?

28. A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries.

A port scan reports the following ports are open:

29. Which of the following open ports should be closed to secure the server properly? (Choose two.)

30. Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

31. A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is suсcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.local

The IP address in the command output is different on each machine.

Which of the following is the MOST likely reason for the connection failure?

32. A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly.

Which of the following is the MOST likely system vulnerability?

33. A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server.

Which of the following would MOST likely help the analyst determine if the applications are running?

34. A server is performing slowly, and users are reporting issues connecting to the application on that

server. Upon investigation, the server administrator notices several unauthorized services running on

that server that are successfully communicating to an external site.

Which of the following are MOST likely causing the issue? (Choose two.)

35. A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254.

Which of the following subnet masks would be appropriate for this setup?

36. A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume.

Which of the following best describes the NEXT step that should be completed to restore the volume?

37. A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server.

Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)

38. A company is running an application on a file server. A security scan reports the application has a known vulnerability.

Which of the following would be the company’s BEST course of action?

39. A technician runs top on a dual-core server and notes the following conditions:

top C- 14:32:27, 364 days, 14 users load average 60.5 12.4 13.6

Which of the following actions should the administrator take?

40. A technician needs to set up a server backup method for some systems. The company’s management team wants to have quick restores but minimize the amount of backup media required.

Which of the following are the BEST backup methods to use to support the management’s priorities? (Choose two.)

41. Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster’s functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration.

Which of the following cluster features will allow Ann to complete this task?

42. Which of the following policies would be BEST to deter a brute-force login attack?

43. A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS.

On which of the following drive types should the technician install the hypervisor?

44. A technician is trying to determine the reason why a Linux server is not communicating on a network.

The returned network configuration is as follows:

eth0: flags=4163<UP, BROADCAST, RUNNING, MULTICAST> mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1

Which of the following BEST describes what is happening?

45. A server technician is deploying a server with eight hard drives. The server specifications call for a RAID configuration that can handle up to two drive failures but also allow for the least amount of drive space lost to RAID overhead.

Which of the following RAID levels should the technician configure for this drive array?

46. Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?

47. Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off.

Which of the following should the administrator do to prevent this situation in the future?

48. Which of the following describes the installation of an OS contained entirely within another OS installation?

49. A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume.

To ensure the partition is available to the OS, the technician must verify the:

50. An administrator is configuring a server that will host a high-performance financial application.

Which of the following disk types will serve this purpose?

51. Which of the following DR testing scenarios is described as verbally walking through each step of the DR plan in the context of a meeting?

52. When configuring networking on a VM, which of the following methods would allow multiple VMs to share the same host IP address?

53. A technician recently upgraded several pieces of firmware on a server. Ever since the technician rebooted the server, it no longer communicates with the network.

Which of the following should the technician do FIRST to return the server to service as soon as possible?

54. A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used.

Which of the following would BEST enable this correlation?

55. A server administrator needs to keep a copy of an important fileshare that can be used to restore the share as quickly as possible.

Which of the following is the BEST solution?

56. Which of the following can be BEST described as the amount of time a company can afford to be down during recovery from an outage?

57. Which of the following actions should a server administrator take once a new backup scheme has been configured?

58. A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter.

Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)

59. A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing

Which of the following commands should the administrator issue to configure MySQL successfully?

60. Which of the following backup types only records changes to the data blocks on a virtual machine?

61. Which of the following server types would benefit MOST from the use of a load balancer?

62. A company uses a hot-site, disaster-recovery model.

Which of the following types of data replication is required?

63. A technician is unable to access a server’s package repository internally or externally.

Which of the following are the MOST likely reasons? (Choose two.)

64. A server administrator was asked to build a storage array with the highest possible capacity.

Which of the following RAID levels should the administrator choose?

65. A server administrator was asked to build a storage array with the highest possible capacity.

Which of the following RAID levels should the administrator choose?

66. A technician needs to deploy an operating system that would optimize server resources.

Which of the following server installation methods would BEST meet this requirement?

67. A company’s IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company’s SOC administrator has asked a technician to harden this server.

Which of the following would be the BEST way to complete this request?

68. Which of the following would be BEST to help protect an organization against social engineering?

69. A technician is connecting a server’s secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection.

Which of the following should the technician perform NEXT?

70. Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

71. A server administrator needs to check remotely for unnecessary running services across 12 servers.

Which of the following tools should the administrator use?

72. A company is building a new datacenter next to a busy parking lot.

Which of the following is the BEST strategy to ensure wayward vehicle traffic does not interfere with datacenter operations?

73. A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed.

Which of the following should the technician do NEXT, given the disk is hot swappable?

74. Network connectivity to a server was lost when it was pulled from the rack during maintenance.

Which of the following should the server administrator use to prevent this situation in the future?

75. Which of the following access control methodologies can be described BEST as allowing a user the least access based on the jobs the user needs to perform?

76. A datacenter technician is attempting to troubleshoot a server that keeps crashing. The server runs normally for approximately five minutes, but then it crashes. After restoring the server to operation, the same cycle repeats. The technician confirms none of the configurations have changed, and the load on the server is steady from power-on until the crash.

Which of the following will MOST likely resolve the issue?

77. A server administrator is exporting Windows system files before patching and saving them to the following location: \server1ITDept

Which of the following is a storage protocol that the administrator is MOST likely using to save this data?

78. A server technician has received reports of database update errors. The technician checks the server logs and determines the database is experiencing synchronization errors.

To attempt to correct the errors, the technician should FIRST ensure:

79. A technician is connecting a Linux server to a share on a NAS.

Which of the following is the MOST appropriate native protocol to use for this task?

80. A server in a remote datacenter is no longer responsive.

Which of the following is the BEST solution to investigate this failure?

81. A server is reporting a hard drive S.M.A.R.T. error. When a technician checks on the drive, however, it appears that all drives in the server are functioning normally.

Which of the following is the reason for this issue?

82. A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications.

Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?

83. Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

84. Which of the following allows for a connection of devices to both sides inside of a blade enclosure?

85. A snapshot is a feature that can be used in hypervisors to:

86. A server administrator needs to deploy five VMs, all of which must have the same type of configuration.

Which of the following would be the MOST efficient way to perform this task?

87. A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries.

Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

88. The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside.

Which of the following would resolve this concern? (Choose two.)

89. A server administrator is configuring the IP address on a newly provisioned server in the testing environment.

The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24

Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful.

Which of the following IP address/default gateway combinations should the administrator have used for the new server?

90. A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time.

Which of the following server roles will the administrator MOST likely need to install?

91. Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration.

Which of the following is the BEST way to protect the data from leaking?

92. A server administrator needs to create a new folder on a file server that only specific users can access.

Which of the following BEST describes how the server administrator can accomplish this task?

93. A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously.

Which of the following BEST represents what the technician should investigate during troubleshooting?

94. Which of the following would a systems administrator implement to ensure all web traffic is secure?

95. An administrator is configuring a server to communicate with a new storage array. To do so, the administrator enters the WWPN of the new array in the server’s storage configuration.

Which of the following technologies is the new connection using?


 

CompTIA CAS-004 Exam Dumps (V15.02) - Boost Your CompTIA Advanced Security Practitioner (CASP+) Exam Success with DumpsBase
SY0-701 Dumps Updated (V13.02) - Help You Prepare for the Exam and Achieve Success in CompTIA Security+ Certification

Add a Comment

Your email address will not be published. Required fields are marked *