CompTIA SK0-005 CompTIA Server+ Certification Exam Practice Test

Page: 1 / 14
Total 416 questions
Question 1

An IT administrator is configuring ten new desktops without an operating system. The infrastructure contains an imaging server and operating system loaded on a USB, a DVD, and an SD card. Which of the following options

would minimize the amount of time the administrator needs to load the operating system on every machine?



Answer : C

Using a network-based deployment, such as network booting (PXE - Preboot Execution Environment) or imaging through a server, is the most efficient way to load operating systems onto multiple machines simultaneously. This approach minimizes the manual intervention required for each device, as the administrator can initiate the operating system installation or imaging process across all desktops at once through the network. In contrast, using an SD card, DVD (Optical), or USB would require the administrator to physically move the media from one desktop to another, significantly increasing the setup time for each device.


Question 2

An administrator is setting up a new employee's read/write access to a document on the file server. Currently, the user can open the file, but edits cannot be saved. Which of the following should the administrator do so the user

can save the updated file while maintaining least-privilege access?



Answer : B

To enable a user to both read and write to a file, the administrator needs to provide 'modify' rights. This permission level allows the user not only to open and view the file (read) but also to make changes and save those changes back to the file (write). 'Read and execute' rights would allow the user to open and run the file but not make any changes. 'List folder contents' rights would enable the user to view the files within a folder but not make changes to them. 'Full control' rights would provide the user with complete control over the file, including the ability to change permissions and delete the file, which exceeds the principle of least-privilege access necessary for this task.


Question 3

Which of the following should a technician verify first before decommissioning and wiping a file server?



Answer : C

Before decommissioning and wiping a file server, it's crucial to verify the asset management documentation. This documentation provides detailed records of the server's lifecycle, including procurement, usage, maintenance, and decommissioning information. Ensuring that asset management documentation is up-to-date and accurate is essential before proceeding with the server's decommissioning to maintain proper inventory control, comply with regulatory and organizational policies, and facilitate any potential audits. While the media destruction method, recycling policy, and document retention policy are important considerations in the decommissioning process, verifying asset management documentation is the first step to ensure the server is correctly identified and accounted for in the organization's asset registry.


Question 4

A server administrator is tasked with upgrading the network on a server to 40Gbps. After installing the card, which of the following connectors should the administrator use?



Answer : A

QSFP+ (Quad Small Form-factor Pluggable Plus) connectors are used in high-density, high-speed networking solutions such as 40 Gigabit Ethernet (40GbE) interfaces. When upgrading a server's network to 40Gbps, QSFP+ is the appropriate choice due to its capability to support such high-speed data transfer rates. 10 GigE, SFP, and SFP+ connectors are used for lower speed connections (10Gbps and below for SFP+ and 10 GigE, and even less for SFP), making them unsuitable for a 40Gbps network upgrade.


Question 5

A new company policy requires that any data loss in excess of one hour is unacceptable in the event of a disaster. Which of the following concepts is being referred to in this policy?



Answer : C

The Recovery Point Objective (RPO) refers to the maximum tolerable period in which data might be lost from an IT service due to a major incident. The policy mentioned in the question highlights that data loss exceeding one hour is unacceptable, directly relating to the RPO concept. RPO is critical in disaster recovery and business continuity planning, indicating the age of the files that must be recovered from backup storage for normal operations to resume without significant losses. MTTR (Mean Time To Repair), RTO (Recovery Time Objective), and MTBF (Mean Time Between Failures) are related concepts but do not specifically address the amount of data loss that can be tolerated.


Question 6

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?



Answer : A

Load balancing is a technique used to distribute workloads evenly across multiple servers, ensuring no single server is overwhelmed. This is especially important in environments where high availability and reliability are critical, such as when multiple servers are serving the same website. By doing so, load balancing improves the responsiveness and availability of applications or websites.

Load balancing refers to the process of distributing network or application traffic across multiple servers to ensure no single server becomes overwhelmed, thereby improving responsiveness and availability of applications or websites. In the scenario described, where four servers are set up to each serve the same website, the concept of load balancing is applied. This setup aims to distribute incoming requests evenly among the servers to maximize speed and capacity utilization while ensuring no one server is overburdened, which can lead to improved overall performance of the website. Options B, C, and D do not accurately describe the scenario of distributing traffic for the same website across multiple servers.


Question 7

Which of the following authentication types defines credentials as "something you have"?



Answer : D

The concept of authentication is rooted in the principle of verifying identity, which is commonly broken down into three categories: 'something you know' (like a password or PIN), 'something you have' (such as a smart card or a security token), and 'something you are' (biometric data, for example, fingerprints). The question asks for the authentication type defined by 'something you have.'


Page:    1 / 14   
Total 416 questions