CompTIA Server+(SK0-005) Sample Questions

  1. Home
  2. CompTIA Server+(SK0-005) Sample Questions
CompTIA Server+ (SK0-005) Sample Questions

Advanced Sample Questions

Which of the following is not a common RAID level used in server storage configurations?

  • a. RAID 0
  • b. RAID 1
  • c. RAID 5
  • d. RAID 10

Answer: a. RAID 0

Explanation: RAID 0 is not a fault-tolerant RAID level and does not provide redundancy. It is used for performance and striping data across multiple drives.

Which of the following protocols is commonly used for remote access to a server?

  • a. SSH
  • b. SMTP
  • c. FTP
  • d. SNMP

Answer: a. SSH

Explanation: SSH (Secure Shell) is a protocol used for secure remote access to a server, often used for command line access.

Which of the following tools is used to troubleshoot network connectivity issues?

  • a. ping
  • b. traceroute
  • c. nslookup
  • d. all of the above

Answer: d. all of the above

Explanation: ping, traceroute, and nslookup are all tools used to troubleshoot network connectivity issues.

Which of the following is not a common type of server operating system?

  • a. Windows Server
  • b. Linux
  • c. Unix
  • d. macOS

Answer: d. macOS

Explanation: macOS is not a common type of server operating system. It is used primarily as a desktop operating system.

Which of the following protocols is used for transferring files between servers and clients?

  • a. SSH
  • b. SMTP
  • c. FTP
  • d. SNMP

Answer: c. FTP

Explanation: FTP (File Transfer Protocol) is a protocol used for transferring files between servers and clients.

Which of the following is not a common type of virtualization technology used in server environments?

  • a. Hyper-V
  • b. VMware
  • c. KVM
  • d. DNS

Answer: d. DNS

Explanation: DNS (Domain Name System) is not a type of virtualization technology. The valid options are Hyper-V, VMware, and KVM.

Which of the following is a common server hardware component used for storing data?

  • a. RAM
  • b. CPU
  • c. SSD
  • d. Power supply

Answer: c. SSD

Explanation: SSD (Solid State Drive) is a common server hardware component used for storing data.

Which of the following is not a common type of server backup?

  • a. Incremental backup
  • b. Differential backup
  • c. Full backup
  • d. Real-time backup

Answer: d. Real-time backup

Explanation: Real-time backup is not a common type of server backup. The valid options are incremental backup, differential backup, and full backup.

Which of the following is a common network protocol used for managing servers and network devices?

  • a. HTTP
  • b. FTP
  • c. SNMP
  • d. DNS

Answer: c. SNMP

Explanation: SNMP (Simple Network Management Protocol) is a common network protocol used for managing servers and network devices.

Which of the following is not a common server security measure?

  • a. Firewalls
  • b. Antivirus software
  • c. User authentication
  • d. Port forwarding

Answer: d. Port forwarding

Explanation: Port forwarding is not a common server security measure. The valid options are firewalls, antivirus software, and user authentication.

Basic Sample Questions

Question 1. Linux servers that were accepting smaller files a few minutes ago can’t accept large files now. What command should a technician use to determine the problem?
  • A. pvdisplay
  • B. mount
  • C. df -h
  • D. fdisk-l

Correct Answer: C

Question 2. For optimal system utilization, a server administrator wants to run a performance monitor. Out of the following metrics, what can the administrator use for monitoring?
  • A. Memory
  • B. Page file
  • C. Services
  • D. Application
  • E. CPU
  • F. Heartbeat

Correct Answer: AE

Question 3. In the data center, a server has been constantly going offline and losing its configuration since a recent power outage. The users of the application have experienced access issues. While the server is online, the technician notices the date and time are incorrect. Other than this, all servers are working. Out of the following, what would MOST likely be the cause of this issue? (Choose two.)
  • A. A faulty power supply to the affected server
  • B. A CMOS battery failure in the affected server
  • C. The server needs OS updates
  • D. A malfunctioning LED panel in the affected server
  • E. NTP is not configured in the affected server 
  • F. The servers have the time synchronization disabled 

Correct Answer: CF

Question 4. Using the RFC 1918 address space, a systems administrator is configuring a server on a LAN. Out of the following IP addresses, what should the administrator use to comply with the standard?
  • A. 11.251.196.241
  • B. 171.245.198.241
  • C. 172.16.19.241
  • D. 193.168.145.241

Correct Answer:

Reference: https://whatis.techtarget.com/definition/RFC-1918

Question 5.  A server in a remote data center requires bare-metal maintenance. What should the administrator use to access the server’s console?
  • A. IP KVM
  • B. VNC
  • C. A crash cart
  • D. RDP
  • E. SSH

Correct Answer:

Reference: https://phoenixnap.com/blog/what-is-bare-metal-server

Question 6. Technicians need to provide high-availability VMs. In order to accomplish this task efficiently, which of the following actions should the technician take?
  • A. Take a snapshot of the original VM
  • B. Clone the original VM
  • C. Create a VM that uses dynamic disks
  • D. Perform a P2V of the original VM

Correct Answer:

Reference: https://forsenergy.com/en-us/virtual_help/html/1325909c-5878-4674-a152-3fd3d4e8e3c6.htm

Question 7. When restoring operations after a non-planned interruption in IT infrastructure, which of the following documents would be useful?
  • A. Service-level agreement
  • B. Disaster recovery plan
  • C. Business impact analysis
  • D. Business continuity plan

Correct Answer: C

Question 8. What is a method that prevents motor vehicles from getting too close to entrances and exits of buildings?
  • A. Bollards
  • B. Reflective glass
  • C. Security guards
  • D. Security cameras

Correct Answer:

Reference: https://en.wikipedia.org/wiki/Bollard

Question 9. During the configuration of a server, a technician needs secure remote access. The technician should use which of the following ports?
  • A. 21
  • B. 22
  • C. 23
  • D. 443

Correct Answer:

Reference: https://docs.microsoft.com/en-us/windows-server/remote/remote-access/ras/manage-remote-clients/install/step-1-configure-the-remote-access-infrastructure

Question 10. How would you choose the MOST appropriate scripting language to use for a Linux login script?
  • A. VBS
  • B. Shell
  • C. Java
  • D. PowerShell
  • E. Batch

Correct Answer:

Reference: https://redmondmag.com/articles/2016/02/09/logon-scripts-for-active-directory.aspx

Question 11. How can you map a script to a user’s home directory based on their username?
  • A. \\server\users$\username
  • B. \\server\%username%
  • C. \\server\FirstInitialLastName
  • D. \\server\$username$

Correct Answer:

Reference: https://social.technet.microsoft.com/Forums/windows/en-US/07cfcb73-796d-48aa-96a9-08280a1ef25a/mapping-home-directory-with-username-variable? forum=w7itprogeneral

Question 12. BSODs have begun occurring randomly on a server that recently received hardware upgrades. Out of the following, what can be the likely causes of the issue?
  • A. Faulty memory
  • B. Data partition error
  • C. Incorrectly seated memory
  • D. Incompatible disk speed
  • E. Uninitialized disk
  • F. Overallocated memory

Correct Answer: AC

Question 13. The web server has been configured by a server administrator. To make the website trustworthy, what must the administrator install?
  • A. PKI
  • B. SSL
  • C. LDAP
  • D. DNS

Correct Answer:

Reference: https://www.csoonline.com/article/3400836/what-is-pki-and-how-it-secures-just-about-everything-online.html

Question 14. A server administrator needs to allow only secure traffic and DNS inquiries on a server to harden it. According to a port scan, the following ports are open:
  • A. 21
  • B. 22
  • C. 23
  • D. 53
  • E. 443
  • F. 636

Correct Answer:

Reference: https://tools.cisco.com/security/center/resources/dns_best_practices

Question 15. To secure the server properly, which open ports should be closed? (Choose two.)
  • A. 21
  • B. 22
  • C. 23
  • D. 53
  • E. 443
  • F. 636

Correct Answer: CD 

Reference: https://www.csoonline.com/article/3191531/securing-risky-network-ports.html

Question 16. If data on the SAN is leaked, what should a server administrator do to prevent it from being compromised?
  • A. Ensure that the data leaving the SAN is encrypted
  • B. Encrypt the data at rest
  • C. Encrypt the host servers
  • D. Encrypt all the network traffic

Correct Answer: B

Question 17. Firewalls, antivirus, and anti-malware systems are installed by the company and are assumed to be working properly. Out of the following, what can be the MOST likely system vulnerability?
  • A. Insider threat
  • B. Worms
  • C. Ransomware
  • D. Open ports
  • E. Two-person integrity

Correct Answer: A

Question 18. Reviewing the log files on a server reveals a large number of connections to port 80. There is a problem with the server’s operation as a web server. In order to prevent unauthorized access to your servers, which of the following measures should you take immediately? (Choose two.)
  • A. All the group privileges and permissions should be audited
  • B. A checksum tool should be run against all the files on the server
  • C. All the unneeded services and block the ports on the firewall should be stopped
  • D. Start a port scan on the server to find open ports
  • E. Port forwarding on port 80 should be enabled
  • F. A NIDS should be installed on the server to prevent network intrusions

Correct Answer: AD

Question 19. An application is running on a file server for a company. The application was found to have a known vulnerability after a security scan. How should the company proceed?
  • A. Upgrade the application package
  • B. Tighten the rules on the firewall
  • C. Install antivirus software
  • D. Patch the server OS

Correct Answer:

Reference: https://www.sciencedirect.com/topics/computer-science/vulnerability-scanner

Question 20. As an administrator, Ann is setting up a two-node cluster. The active node is shut down to check the cluster’s functionality. In the cluster, everything is working as expected, and the passive node has been turned on. Ann turns on the server again and wants to restore its original configuration. Out of the following, what cluster features will let Ann finish this task?
  • A. Heartbeat
  • B. Failback
  • C. Redundancy
  • D. Load balancing

Correct Answer: B

CompTIA Server+ (SK0-005) free practice tests
Menu