Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA SK0-005 - CompTIA Server+ Certification Exam

Page: 12 / 15
Total 493 questions

Under which of the following should a technician implement scripting?

A.

Authenticating users

B.

Change management

C.

Business impact analysis

D.

Step-by-step tasks

A systems administrator is setting up a second VLAN for end users. Which of the following should be provisioned for a DHCP server to be able to receive client requests from a different subnet?

A.

DHCP options

B.

NIC teaming

C.

Zone transfers

D.

Relay agent

E.

VLAN ID

A security team must ensure that unauthorized individuals are unable to tailgate through the data center's entrance. Which of the following should be implemented to stop this type of breach from happening?

A.

Access control vestibule

B.

Cameras

C.

Bollards

D.

Biometrics

A company needs a media server set up that provides the highest availability with a minimum requirement of at least 10TB. The company purchased five HDDs, each with a 4TB

capacity. Which of the options would provide the highest fault tolerance and meet the requirements?

A.

RAID 0

B.

RAID 5

C.

RAID 6

D.

RAID 10

Which of the following backup types is used to capture all data regardless of any changes from the previous backup jobs?

A.

Incremental

B.

Differential

C.

Archive

D.

Snapshot

E.

Full

A systems administrator is installing Windows on an 8TB drive and would like to create a single 8TB partition on the disk. Which of the following options should the administrator use?

A.

VMFS

B.

ZFS

C.

GPT

D.

MBR

E.

LVM

A Windows server has experienced a BSOD, and the administrator needs to monitor thereboot. The server is in a datacenter with no OOB management. Which of the following tools should the administrator use to complete this task?

A.

Crash cart

B.

IP KVM

C.

Virtual administration console

D.

Serial connection

Which of the following security risks provides unauthorized access to an application?

A.

Backdoor

B.

Data corruption

C.

Insider threat

D.

Social engineering

A backup application is copying only changed files each line it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?

A.

Open file

B.

Synthetic full

C.

Full Incremental

D.

Full differential

A technician wants to limit disk usage on a server. Which of the following should the technician implement?

A.

Formatting

B.

Compression

C.

Disk quotas

D.

Partitioning