CompTIA Server+ Certification SK0-005 Exam Questions in PDF

Free CompTIA SK0-005 Dumps Questions (page: 11)

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

  1. Perform a root cause analysis
  2. Develop a plan of action
  3. Document the findings
  4. Escalate the issue
  5. Scope the issue
  6. Notify the users

Answer(s): A,C



A snapshot is a feature that can be used in hypervisors to:

  1. roll back firmware updates.
  2. restore to a previous version.
  3. roll back application drivers.
  4. perform a backup restore.

Answer(s): B



A server administrator needs to deploy five VMs, all of which must have the same type of configuration.
Which of the following would be the MOST efficient way to perform this task?

  1. Snapshot a VM.
  2. Use a physical host.
  3. Perform a P2V conversion.
  4. Use a VM template.

Answer(s): D

Explanation:

Deploying a virtual machine from a template creates a virtual machine that is a copy of the template. The new virtual machine has the virtual hardware, installed software, and other properties that are configured for the template.


Reference:

https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vm_admin.doc/GUID- 8254CD05-CC06-491D-BA56-A773A32A8130.html



A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries.
Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

  1. Configure a firewall
  2. Close the unneeded ports
  3. Install a HIDS
  4. Disable unneeded services

Answer(s): A

Explanation:

Monitors Network Traffic


Reference:

https://www.fortinet.com/resources/cyberglossary/benefits-of-firewall



The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside.
Which of the following would resolve this concern? (Choose two.)

  1. RFID
  2. Proximity readers
  3. Signal blocking
  4. Camouflage
  5. Reflective glass
  6. Bollards

Answer(s): C,E



A server administrator is configuring the IP address on a newly provisioned server in the testing environment.
The network VLANs are configured as follows:



The administrator configures the IP address for the new server as follows:

IP address: 192.168.1.1/24
Default gateway: 192.168.10.1

A ping sent to the default gateway is not successful.
Which of the following IP address/default gateway combinations should the administrator have used for the new server?

  1. IP address: 192.168.10.2/24
    Default gateway: 192.168.10.1
  2. IP address: 192.168.1.2/24
    Default gateway: 192.168.10.1
  3. IP address: 192.168.10.3/24
    Default gateway: 192.168.20.1
  4. IP address: 192.168.10.24/24
    Default gateway: 192.168.30.1

Answer(s): A



A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time.
Which of the following server roles will the administrator MOST likely need to install?

  1. Messaging
  2. Application
  3. Print
  4. Database

Answer(s): D

Explanation:

Few people are expected to use the database at the same time and users don't need to customize the design of the database.


Reference:

https://support.microsoft.com/en-us/office/ways-to-share-an-access-desktop-database-03822632- da43-4d8f-ba2a-68da245a0446



Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration.
Which of the following is the BEST way to protect the data from leaking?

  1. Utilize privacy screens.
  2. Implement disk quotas.
  3. Install a DLP solution.
  4. Enforce the lock-screen feature.

Answer(s): C

Explanation:

Components of a Data Loss Solution


Reference:

https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/



Share your comments for CompTIA SK0-005 exam with other users:

X
Xunil
6/12/2023 3:04:00 PM

great job whoever put this together, for the greater good! thanks!

L
Lakshmi
10/2/2023 5:26:00 AM

just started to view all questions for the exam

R
rani
1/19/2024 11:52:00 AM

helpful material

G
Greg
11/16/2023 6:59:00 AM

hope for the best

H
hi
10/5/2023 4:00:00 AM

will post exam has finished

V
Vmotu
8/24/2023 11:14:00 AM

really correct and good analyze!

H
hicham
5/30/2023 8:57:00 AM

excellent thanks a lot

S
Suman C
7/7/2023 8:13:00 AM

will post once pass the cka exam

R
Ram
11/3/2023 5:10:00 AM

good content

N
Nagendra Pedipina
7/13/2023 2:12:00 AM

q:32 answer has to be option c

T
Tamer Barakat
12/7/2023 5:17:00 PM

nice questions

D
Daryl
8/1/2022 11:33:00 PM

i really like the support team in this website. they are fast in communication and very helpful.

C
Curtis Nakawaki
6/29/2023 9:13:00 PM

a good contemporary exam review

X
x-men
5/23/2023 1:02:00 AM

q23, its an array, isnt it? starts with [ and end with ]. its an array of objects, not object.

A
abuti
7/21/2023 6:24:00 PM

cool very helpfull

K
Krishneel
3/17/2023 10:34:00 AM

i just passed. this exam dumps is the same one from prepaway and examcollection. it has all the real test questions.

R
Regor
12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?

A
asl
9/14/2023 3:59:00 PM

all are relatable questions

S
Siyya
1/19/2024 8:30:00 PM

might help me to prepare for the exam

T
Ted
6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.

P
Paul K
11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available

P
ph
6/16/2023 12:41:00 AM

very legible

S
sephs2001
7/31/2023 10:42:00 PM

is this exam accurate or helpful?

A
ash
7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days

S
Sneha
8/17/2023 6:29:00 PM

this is useful

S
sachin
12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected

T
tomAws
7/18/2023 5:05:00 AM

nice questions

R
Rahul
6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?

T
TeamOraTech
12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.

C
Curtis
7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.

S
sam
7/17/2023 6:22:00 PM

cannot evaluate yet

N
nutz
7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid

R
rajesh soni
1/17/2024 6:53:00 AM

good examplae to learn basic

T
Tanya
10/25/2023 7:07:00 AM

this is useful information

AI Tutor 👋 I’m here to help!