CompTIA Server+(SK0-005) Sample Questions
Which of the following is not a common RAID level used in server storage configurations?
- a. RAID 0
- b. RAID 1
- c. RAID 5
- d. RAID 10
Answer: a. RAID 0
Explanation: RAID 0 is not a fault-tolerant RAID level and does not provide redundancy. It is used for performance and striping data across multiple drives.
Which of the following protocols is commonly used for remote access to a server?
- a. SSH
- b. SMTP
- c. FTP
- d. SNMP
Answer: a. SSH
Explanation: SSH (Secure Shell) is a protocol used for secure remote access to a server, often used for command line access.
Which of the following tools is used to troubleshoot network connectivity issues?
- a. ping
- b. traceroute
- c. nslookup
- d. all of the above
Answer: d. all of the above
Explanation: ping, traceroute, and nslookup are all tools used to troubleshoot network connectivity issues.
Which of the following is not a common type of server operating system?
- a. Windows Server
- b. Linux
- c. Unix
- d. macOS
Answer: d. macOS
Explanation: macOS is not a common type of server operating system. It is used primarily as a desktop operating system.
Which of the following protocols is used for transferring files between servers and clients?
- a. SSH
- b. SMTP
- c. FTP
- d. SNMP
Answer: c. FTP
Explanation: FTP (File Transfer Protocol) is a protocol used for transferring files between servers and clients.
Which of the following is not a common type of virtualization technology used in server environments?
- a. Hyper-V
- b. VMware
- c. KVM
- d. DNS
Answer: d. DNS
Explanation: DNS (Domain Name System) is not a type of virtualization technology. The valid options are Hyper-V, VMware, and KVM.
Which of the following is a common server hardware component used for storing data?
- a. RAM
- b. CPU
- c. SSD
- d. Power supply
Answer: c. SSD
Explanation: SSD (Solid State Drive) is a common server hardware component used for storing data.
Which of the following is not a common type of server backup?
- a. Incremental backup
- b. Differential backup
- c. Full backup
- d. Real-time backup
Answer: d. Real-time backup
Explanation: Real-time backup is not a common type of server backup. The valid options are incremental backup, differential backup, and full backup.
Which of the following is a common network protocol used for managing servers and network devices?
- a. HTTP
- b. FTP
- c. SNMP
- d. DNS
Answer: c. SNMP
Explanation: SNMP (Simple Network Management Protocol) is a common network protocol used for managing servers and network devices.
Which of the following is not a common server security measure?
- a. Firewalls
- b. Antivirus software
- c. User authentication
- d. Port forwarding
Answer: d. Port forwarding
Explanation: Port forwarding is not a common server security measure. The valid options are firewalls, antivirus software, and user authentication.
Question 1. Linux servers that were accepting smaller files a few minutes ago can’t accept large files now. What command should a technician use to determine the problem?
- A. pvdisplay
- B. mount
- C. df -h
- D. fdisk-l
Correct Answer: C
Question 2. For optimal system utilization, a server administrator wants to run a performance monitor. Out of the following metrics, what can the administrator use for monitoring?
- A. Memory
- B. Page file
- C. Services
- D. Application
- E. CPU
- F. Heartbeat
Correct Answer: AE
Question 3. In the data center, a server has been constantly going offline and losing its configuration since a recent power outage. The users of the application have experienced access issues. While the server is online, the technician notices the date and time are incorrect. Other than this, all servers are working. Out of the following, what would MOST likely be the cause of this issue? (Choose two.)
- A. A faulty power supply to the affected server
- B. A CMOS battery failure in the affected server
- C. The server needs OS updates
- D. A malfunctioning LED panel in the affected server
- E. NTP is not configured in the affected server
- F. The servers have the time synchronization disabled
Correct Answer: CF
Question 4. Using the RFC 1918 address space, a systems administrator is configuring a server on a LAN. Out of the following IP addresses, what should the administrator use to comply with the standard?
- A. 11.251.196.241
- B. 171.245.198.241
- C. 172.16.19.241
- D. 193.168.145.241
Correct Answer: C
Reference: https://whatis.techtarget.com/definition/RFC-1918
Question 5. A server in a remote data center requires bare-metal maintenance. What should the administrator use to access the server’s console?
- A. IP KVM
- B. VNC
- C. A crash cart
- D. RDP
- E. SSH
Correct Answer: D
Reference: https://phoenixnap.com/blog/what-is-bare-metal-server
Question 6. Technicians need to provide high-availability VMs. In order to accomplish this task efficiently, which of the following actions should the technician take?
- A. Take a snapshot of the original VM
- B. Clone the original VM
- C. Create a VM that uses dynamic disks
- D. Perform a P2V of the original VM
Correct Answer: A
Reference: https://forsenergy.com/en-us/virtual_help/html/1325909c-5878-4674-a152-3fd3d4e8e3c6.htm
Question 7. When restoring operations after a non-planned interruption in IT infrastructure, which of the following documents would be useful?
- A. Service-level agreement
- B. Disaster recovery plan
- C. Business impact analysis
- D. Business continuity plan
Correct Answer: C
Question 8. What is a method that prevents motor vehicles from getting too close to entrances and exits of buildings?
- A. Bollards
- B. Reflective glass
- C. Security guards
- D. Security cameras
Correct Answer: A
Reference: https://en.wikipedia.org/wiki/Bollard
Question 9. During the configuration of a server, a technician needs secure remote access. The technician should use which of the following ports?
- A. 21
- B. 22
- C. 23
- D. 443
Correct Answer: D
Question 10. How would you choose the MOST appropriate scripting language to use for a Linux login script?
- A. VBS
- B. Shell
- C. Java
- D. PowerShell
- E. Batch
Correct Answer: A
Reference: https://redmondmag.com/articles/2016/02/09/logon-scripts-for-active-directory.aspx
Question 11. How can you map a script to a user’s home directory based on their username?
- A. \\server\users$\username
- B. \\server\%username%
- C. \\server\FirstInitialLastName
- D. \\server\$username$
Correct Answer: B
Question 12. BSODs have begun occurring randomly on a server that recently received hardware upgrades. Out of the following, what can be the likely causes of the issue?
- A. Faulty memory
- B. Data partition error
- C. Incorrectly seated memory
- D. Incompatible disk speed
- E. Uninitialized disk
- F. Overallocated memory
Correct Answer: AC
Question 13. The web server has been configured by a server administrator. To make the website trustworthy, what must the administrator install?
- A. PKI
- B. SSL
- C. LDAP
- D. DNS
Correct Answer: A
Question 14. A server administrator needs to allow only secure traffic and DNS inquiries on a server to harden it. According to a port scan, the following ports are open:
- A. 21
- B. 22
- C. 23
- D. 53
- E. 443
- F. 636
Correct Answer: D
Reference: https://tools.cisco.com/security/center/resources/dns_best_practices
Question 15. To secure the server properly, which open ports should be closed? (Choose two.)
- A. 21
- B. 22
- C. 23
- D. 53
- E. 443
- F. 636
Correct Answer: CD
Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html
Question 16. If data on the SAN is leaked, what should a server administrator do to prevent it from being compromised?
- A. Ensure that the data leaving the SAN is encrypted
- B. Encrypt the data at rest
- C. Encrypt the host servers
- D. Encrypt all the network traffic
Correct Answer: B
Question 17. Firewalls, antivirus, and anti-malware systems are installed by the company and are assumed to be working properly. Out of the following, what can be the MOST likely system vulnerability?
- A. Insider threat
- B. Worms
- C. Ransomware
- D. Open ports
- E. Two-person integrity
Correct Answer: A
Question 18. Reviewing the log files on a server reveals a large number of connections to port 80. There is a problem with the server’s operation as a web server. In order to prevent unauthorized access to your servers, which of the following measures should you take immediately? (Choose two.)
- A. All the group privileges and permissions should be audited
- B. A checksum tool should be run against all the files on the server
- C. All the unneeded services and block the ports on the firewall should be stopped
- D. Start a port scan on the server to find open ports
- E. Port forwarding on port 80 should be enabled
- F. A NIDS should be installed on the server to prevent network intrusions
Correct Answer: AD
Question 19. An application is running on a file server for a company. The application was found to have a known vulnerability after a security scan. How should the company proceed?
- A. Upgrade the application package
- B. Tighten the rules on the firewall
- C. Install antivirus software
- D. Patch the server OS
Correct Answer: D
Reference: https://www.sciencedirect.com/topics/computer-science/vulnerability-scanner
Question 20. As an administrator, Ann is setting up a two-node cluster. The active node is shut down to check the cluster’s functionality. In the cluster, everything is working as expected, and the passive node has been turned on. Ann turns on the server again and wants to restore its original configuration. Out of the following, what cluster features will let Ann finish this task?
- A. Heartbeat
- B. Failback
- C. Redundancy
- D. Load balancing
Correct Answer: B