comptia sk0-004 practice test

CompTIA Server+

page 1 out of 54

Viewing questions 1-15 out of 798


Question 1

A server technician wishes to buy the best possible server for RAID 5. Which of the following types of servers is BEST suited
for RAID 5?

  • A. Tower servers
  • B. Redundant servers
  • C. Blade servers
  • D. Stand-alone servers
Answer:

B

Discussions
0 / 1000

Question 2

Users are trying to access the company time card website. They cannot access it by URL, but they can access it by IP
address. Which of the following protocols is MOST likely causing this issue?

  • A. DNS
  • B. DHCP
  • C. HTTPS
  • D. SFTP
Answer:

A

Discussions
0 / 1000

Question 3

During a reboot, a server displays an OS not found error message. Which of the following is the most likely cause?

  • A. Resource exhaustion
  • B. Excessive fragmentation
  • C. Degraded RAID array
  • D. Improper BIOS/UEFI boot order
Answer:

D

Discussions
0 / 1000

Question 4

A server technician was recently given a penetration testing report. The report states that VNC is running on server
192.168.1.25. Which of the following can the technician conclude about the statement?

  • A. The default TCP port for VNC is 3389, and the penetration test is implying the system cannot be remotely accessed.
  • B. The default TCP port for VNC is 3389, and the penetration test is implying the system can be remotely accessed.
  • C. The default TCP port for VNC is 5900, and the penetration test is implying the system can be remotely accessed.
  • D. The default TCP port for VNC is 5900, and the penetration test is implying the system cannot be remotely accessed.
Answer:

C

Discussions
0 / 1000

Question 5

Which of the following assists with airflow in a server? (Select TWO).

  • A. Riser cards
  • B. Water cooling
  • C. Shroud
  • D. Baffle
  • E. Heat sinks
Answer:

C D

Discussions
0 / 1000

Question 6

Which of the following best practices should an administrator use to build a database server?

  • A. The transaction log files should be on a separate volume.
  • B. The transaction log files should be on a journaling filesystem.
  • C. The transaction log files should be on the system volume.
  • D. The transaction log files should be compressed.
Answer:

B

Discussions
0 / 1000

Question 7

A server technician installs a new CPU and heat sink in a server and reconnects all of the cables. After powering on the
server, the technician discovers the server is now overheating. The technician ensures the fans in the server are all
operating properly. Which of the following power and cooling components is the next MOST likely cause of the temperature
issues?

  • A. The server is missing a fan shroud.
  • B. The power supply voltage is incorrect.
  • C. The thermal dissipation of the heat sink is insufficient.
  • D. The power consumption of the CPU is too high.
Answer:

A

Discussions
0 / 1000

Question 8

A systems administrator is setting up a new SAN. Which of the following protocols should be used to access and manage
the system?

  • A. WWN
  • B. NTP
  • C. DNS
  • D. SSH
Answer:

D

Discussions
0 / 1000

Question 9

The Chief Technology Officer (CTO) decided all backups should be taken at the storage array level rather than at the OS
level. Which of the following backup types would fulfill these requirements?

  • A. Snapshot
  • B. Incremental
  • C. Differential
  • D. Full
Answer:

A

Discussions
0 / 1000

Question 10

An administrator is installing a 2U server from a remote location in a rack with 4U of available rack space. The administrator
prepares the rack to accept the server. Which of the following is the MOST likely cause?

  • A. Not enough physical space
  • B. Mismatched rail kits
  • C. Wrong cable management arms
  • D. Broken rack rails
Answer:

B

Discussions
0 / 1000

Question 11

A system administrator has decided to create several VMs for a company. In which of the following locations would each of
the VMs reside?

  • A. Host
  • B. VNC
  • C. Guest
  • D. VPN
Answer:

A

Discussions
0 / 1000

Question 12

Which of the following BEST describes a benefit of RAID 0?

  • A. High fault tolerance
  • B. Ease of failure recovery
  • C. High performance
  • D. No configuration
Answer:

C

Discussions
0 / 1000

Question 13

Which of the following virtual network settings should be used if the IP addresses of the host is to be shared with the virtual
machine?

  • A. NAT
  • B. Bridged
  • C. Host-only
  • D. Custom virtual network
Answer:

B

Discussions
0 / 1000

Question 14

An administrator is editing permissions on a workstations file share. The administrator wishes to ensure that only marketing
and accounting can write to the share over the network. IT staff should be able to modify share contents, but no other groups
should have access to the network share. The existing permissions are:

Which of the following changes should be made to apply the share while preserving the access of local users? (Choose two.)

  • A. Under share permissions, change permissions to “Deny Read, Write” for Everyone.
  • B. Under share permissions, add “Full Control” for IT Staff.
  • C. Under share permissions, remove the Everyone group.
  • D. Under permissions, remove “Full Control” for Accounting.
  • E. Under permissions, change permissions to “Deny Read, Write” for Everyone.
Answer:

B E

Discussions
0 / 1000

Question 15

A user is unable to connect to the company's intranet server by FQDN, but can connect by IP address. Other users are not
having a problem. An administrator verifies that the user can successfully ping the server by IP address and can properly
resolve the FQDN using nslookup.
The problem is persisting after running ipconfig /flushdns.
Which of the following should the administrator do NEXT?

  • A. Examine the lmhost file.
  • B. Flush the cache on the DNS server.
  • C. Flush the cache on the WINS server.
  • D. Examine the hosts file.
Answer:

D

Discussions
0 / 1000
To page 2