comptia sk0-005 practice test

CompTIA Server+ Certification Exam

Last exam update: Nov 14 ,2024
Page 1 out of 20. Viewing questions 1-10 out of 196

Question 1

A user is unable to modify files on a Windows fileshare. A technician examines the system and determines the user is a member of Group A. Group A was granted full control over the files. Which of the following is MOST likely causing the access issues?

  • A. SIEM policies
  • B. IDS rules
  • C. Share permissions Most Votes
  • D. Firewall ports
Mark Question:
Answer:

c

User Votes:
A 1 votes
50%
B
50%
C 14 votes
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following load-balancing methods would be BEST described as each connection selecting the next path?

  • A. Least connection
  • B. Source hashed
  • C. Most recently used
  • D. Round robin Most Votes
Mark Question:
Answer:

d

User Votes:
A 1 votes
50%
B 1 votes
50%
C 1 votes
50%
D 11 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

A technician is connecting a server's secondary NIC to a separate network. The technician connects the cable to the switch but then does not see any link lights on the NIC. The technician confirms there is nothing wrong on the network or with the physical connection. Which of the following should the technician perform
NEXT?

  • A. Restart the server
  • B. Configure the network on the server
  • C. Enable the port on the server
  • D. Check the DHCP configuration
Mark Question:
Answer:

c

User Votes:
A 2 votes
50%
B 1 votes
50%
C 7 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

  • A. VBS
  • B. Shell
  • C. Java
  • D. PowerShell
  • E. Batch
Mark Question:
Answer:

a


Reference:
https://redmondmag.com/articles/2016/02/09/logon-scripts-for-active-directory.aspx

User Votes:
A 3 votes
50%
B 7 votes
50%
C
50%
D 1 votes
50%
E 1 votes
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
vnnghia03
2 months, 2 weeks ago

either B or E, cannot be A which is mainly for windows system

shane.connor
1 month, 2 weeks ago

i thought b (shell) as VBS doen't run natively on linux. Hmm


Question 5

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

  • A. User account control
  • B. Anti-malware
  • C. A sniffer
  • D. A port scanner
Mark Question:
Answer:

a


Reference:
https://www.sciencedirect.com/topics/computer-science/administrative-credential

User Votes:
A 4 votes
50%
B
50%
C 2 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
shane.connor
1 month, 2 weeks ago

port scanner would pick up a rogue server


Question 6

A systems administrator has several different types of hard drives. The administrator is setting up a NAS that will allow end users to see all the drives within the
NAS. Which of the following storage types should the administrator use?

  • A. RAID array
  • B. Serial Attached SCSI
  • C. Solid-state drive
  • D. Just a bunch of disks
Mark Question:
Answer:

d

User Votes:
A 2 votes
50%
B 3 votes
50%
C
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

A server administrator is installing a new server that uses 40Gb network connectivity. The administrator needs to find the proper cables to connect the server to the switch. Which of the following connectors should the administrator use?

  • A. SFP+
  • B. GBIC
  • C. SFP
  • D. QSFP+
Mark Question:
Answer:

d

User Votes:
A 1 votes
50%
B 1 votes
50%
C 1 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A technician is trying to reach abc.intranet.com but is unable to do so by name. The technician is able to reach it by IP address, though. Which of the following is
MOST likely misconfigured?

  • A. The VLAN
  • B. The DNS
  • C. The subnet mask
  • D. The default gateway
Mark Question:
Answer:

b

User Votes:
A
50%
B 6 votes
50%
C 1 votes
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown --now result in the loss of the SSH connection.
The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

  • A. A virtual serial console
  • B. A KVM
  • C. An iDRAC
  • D. A crash cart
Mark Question:
Answer:

c

User Votes:
A 1 votes
50%
B 2 votes
50%
C 4 votes
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following would MOST likely be part of the user authentication process when implementing SAML across multiple applications?

  • A. SSO
  • B. LDAP
  • C. TACACS
  • D. MFA
Mark Question:
Answer:

a


Reference:
https://www.onelogin.com/learn/how-single-sign-on-works

User Votes:
A 7 votes
50%
B 1 votes
50%
C
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2