Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SK0-005 - CompTIA Server+ Certification Exam

Page: 5 / 15
Total 493 questions

An administrator has been asked to increase the storage capacity of a stand-alone file server but no further expansion slots are available. Whichof the following would be the FASTEST solution to implement with no downtime?

A.

Configure a RAID array.

B.

Replace the current drives with higher-capacity disks.

C.

Implement FCoE for more storage capacity.

D.

Connect the server to a SAN

A systems administrator needs to create a data volume out of four disks with the MOST redundancy. Which of the following is the BEST solution?

A.

RAID 0

B.

RAID 1

C.

RAID 5

D.

RAID 6

A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?

A.

Biometrics

B.

Push notifications

C.

Smart carts

D.

Physical tokens

A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of

the following password policies should the administrator implement first?

A.

Lockout

B.

Length

C.

Complexity

D.

Minimum age

Which of the following concepts refers to prioritizing a connection that had previously worked successfully?

A.

Round robin

B.

SCP

C.

MRU

D.

Link aggregation

An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the MINIMUM number of disks needed for this application?

A.

6

B.

7

C.

8

D.

9

An administrator is deploying a new secure web server. The only administration method that is permitted is to connect via RDP. Which of the following

ports should be allowed? (Select TWO).

A.

53

B.

80

C.

389

D.

443

E.

45

F.

3389

G.

8080

A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?

A.

DHCP configuration

B.

Firewall rules

C.

DLP software

D.

Intrusion detection system

The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address.

One of the alerts contains the following information:

Exploit Alert

Attempted User Privilege Gain

2/2/07-3: 09:09 10.1.200.32

--> 208.206.12.9:80

This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Select two).

A.

Disable all services on the affected application server.

B.

Perform a vulnerability scan on all the servers within the cluster and patch accordingly.

C.

Block access to 208.206.12.9 from all servers on the network.

D.

Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.

E.

Enable GPO to install an antivirus on all the servers and perform a weekly reboot.

F.

Perform an antivirus scan on all servers within the cluster and reboot each server.

Which of thefollowinglicensing concepts is based on the number of logical processorsaserverhas?

A.

Per core

B.

Per socket

C.

Per instance

D.

Per server