SK0-005 Exam Questions

Total 347 Questions

Last Updated Exam : 27-Dec-2024

A server administrator is replacing a faulty PSU. The management team has asked for a solution that prevents further downtime in the future. Which of the following can the server administrator implement?


A. Separate circuits


B. Load balancing


C. Server monitoring


D. Redundancy





D.
  Redundancy

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?


A. Deploying each server from a VM template


B. Using a kickstart file during installation


C. Configuring each server manually one at a time


D. Copying/pasting configuration commands into each server through SSH sessions


E. Configuring a single server and then creating clones of it





B.
  Using a kickstart file during installation

A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?


A. VLAN


B. vNIC


C. Link aggregation


D. Failover





C.
  Link aggregation

A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely configured?


A. Delegation


B. Role-based


C. Rule-based


D. Scope-based





D.
  Scope-based

An upper management team is investigating a security breach of the company's filesystem. It has been determined that the breach occurred within the human resources department. Which of the following was used to identify the breach in the human resources department?


A. User groups


B. User activity reports


C. Password policy


D. Multifactor authentication





B.
  User activity reports

Which of the following describes when a site is considered a warm site?


A. It has basic technical facilities connected to it.


B. It has faulty air conditioning that is awaiting service.


C. It is almost ready to take over all operations from the primary site.


D. It is fully operational and continuously providing services.





C.
  It is almost ready to take over all operations from the primary site.

A security administrator ran a port scanning tool against a virtual server that is hosting a secure website. A list of open ports was provided as documentation. The management team has requested that non- essential ports be disabled on the firewall. Which of the following ports must remain open?


A. 25


B. 53


C. 443


D. 3389


E. 8080





C.
  443

An administrator is receiving reports that users in a remote office are unable to log in to the domain. The network appears to be up between the sites, which are in different states. Which of the following is the most likely cause of the issue?


A. The user accounts are locked out


B. The NTP on the client side is misconfigured


C. MFA is not working


D. The wrong time zone was set in the remote office





B.
  The NTP on the client side is misconfigured

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?


A. Close unneeded ports.


B. Disable unused services.


C. Set a BIOS password.


D. Apply driver updates.





C.
  Set a BIOS password.

A server administrator is setting up a disk with enforcement policies on how much data each home share can hold. The amount of data that is redundant on the server must also be minimized. Which of the following should the administrator perform on the server? (Select two).


A. Partitioning


B. Deduplication


C. Disk quotas


D. Compression


E. Cloning


F. Provisioning





B.
  Deduplication

C.
  Disk quotas


Page 11 out of 35 Pages
Previous