Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SK0-005 Exam Dumps - CompTIA Server+ Certification Exam

Go to page:
Question # 33

Which of the following life-cycle management phases deals with a server that is no longer in operation?

A.

End-of-life

B.

Disposal

C.

Usage

D.

Procurement

Full Access
Question # 34

A technician is configuring a point-to-point heartbeat connection between two servers using IP addressing. Which of the following is the most efficient

subnet mask for this connection?

A.

/28

B.

/29

C.

/30

D.

/32

Full Access
Question # 35

A server administrator is taking advantage of all the available bandwidth of the four NICs on the server. Which of the following NIC-teaming technologies should the server administrator utilize?

A.

Fail over

B.

Fault tolerance

C.

Load balancing

D.

Link aggregation

Full Access
Question # 36

After installing a new file server, a technician notices the read times for accessing the same file are slower than the read times for other file servers.

Which of the following is the first step the technician should take?

A.

Add more memory.

B.

Check if the cache is turned on.

C.

Install faster hard drives.

D.

Enable link aggregation.

Full Access
Question # 37

A systems administrator is provisioning a large number of virtual Linux machines that will be configured identically. The administrator would like to configure the machines quickly and easily but does not have access to an automation/orchestration platform. Additionally, the administrator would like to set up a system that can be used in the future, even on newer versions of the OS. Which of the following will best meet the administrator's requirements?

A.

Deploying each server from a VM template

B.

Using a kickstart file during installation

C.

Configuring each server manually one at a time

D.

Copying/pasting configuration commands into each server through SSH sessions

E.

Configuring a single server and then creating clones of it

Full Access
Question # 38

An organization stores backup tapes of its servers at cold sites. The organization wants to ensure the tapes are properly maintained and usable during a DR scenario. Which of the following actions should the organization perform?

A.

Have the facility inspect and inventory the tapes on a regular basis.

B.

Have duplicate equipment available at the cold site.

C.

Retrieve the tapes from the cold site and test them.

D.

Use the test equipment at the cold site to read the tapes.

Full Access
Question # 39

A newly hired systems administrator is concerned about fileshare access at the company. The administrator turns on DLP for the fileshare and lets it propagate for a week. Which of the following can the administrator perform now?

A.

Manage the fileshare from an RDP session.

B.

Audit the permissions of the fileshare.

C.

Audit the access to the physical fileshare.

D.

Manage the permissions from the fileshare.

Full Access
Question # 40

A web server that is being deployed in the perimeter network needs to be shielded from malicious traffic. Which of the following could help identify these threats?

A.

Applying OS updates

B.

Disabling unused services

C.

Implementing HIDS

D.

Installing anti-malware

Full Access
Go to page: