Go Back on SK0-005 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SK0-005 Practice Test


Page 2 out of 70 Pages

A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:


A. hardware is UEFI compliant


B. volume is formatted as GPT


C. volume is formatted as MBR


D. volume is spanned across multiple physical disk drives





B.
  volume is formatted as GPT

To ensure the partition is available to the OS, the technician must verify that the volume is formatted as GPT. GPT (GUID Partition Table) is a partitioning scheme that defines how data is organized on a hard disk drive (HDD) or a solid state drive (SSD). GPT uses globally unique identifiers (GUIDs) to identify partitions and supports up to 128 primary partitions per disk. GPT also supports disks larger than 2 TB and has a backup copy of the partition table at the end of the disk for data recovery. GPT is required for installing Windows on UEFI-based PCs, which offer faster boot time and better security than legacy BIOS-based PCs.

A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician’s workstation is sucessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.local The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?


A. A misconfigured firewall


B. A misconfigured hosts.deny file


C. A misconfigured hosts file


D. A misconfigured hosts.allow file





D.
  A misconfigured hosts.allow file

A misconfigured hosts file can cause name resolution issues on a server. A hosts file is a text file that maps hostnames to IP addresses on a local system. It can be used to override DNS settings or provide custom name resolution for testing purposes. However, if the hosts file contains incorrect or outdated entries, it can prevent the system from resolving hostnames properly and cause connectivity problems. To fix this issue, the administrator should check and edit the hosts file accordingly.

storage engineer responds to an alarm on a storage array and finds the battery on the RAID controller needs to be replaced. However, the replacement part will not be available for 14 days. The engineer needs to identify the impact of the failed battery on the system. Which of the following best describes the impact?


A. The read and write performance will be impacted.


B. The read performance will be impacted.


C. The performance will not be impacted.


D. The write performance will be impacted.





D.
  The write performance will be impacted.

A RAID controller battery is used to protect the data in the cache memory of the controller in case of a power failure. The cache memory allows the controller to improve the write performance by buffering the data and writing it to the disk in an optimized way. However, if the battery fails, the controller will switch to write-through mode, which means it will write the data directly to the disk without caching. This will reduce the write performance and increase the latency of the system

A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Select TWO).


A. Close unneeded ports.


B. Disable unneeded physical ports.


C. Set a BIOS password.


D. Install a SIEM.


E. Disable unneeded services.


F. Install a HIDS





B.
  Disable unneeded physical ports.

C.
  Set a BIOS password.

Disabling unneeded physical ports would prevent unauthorized devices from being connected to the server, such as an outside USB drive. Setting a BIOS password would restrict access to the boot settings and prevent unauthorized changes to the boot order. The other options would not address the risk of booting from an outside USB drive

Which of the following should a technician verify first before decommissioning and wiping a file server?


A. The media destruction method


B. The recycling policy


C. Asset management documentation


D. Document retention policy





C.
  Asset management documentation

Before decommissioning and wiping a file server, it's crucial to verify the asset management documentation. This documentation provides detailed records of the server's lifecycle, including procurement, usage, maintenance, and decommissioning information. Ensuring that asset management documentation is up-to-date and accurate is essential before proceeding with the server's decommissioning to maintain proper inventory control, comply with regulatory and organizational policies, and facilitate any potential audits. While the media destruction method, recycling policy, and document retention policy are important considerations in the decommissioning process, verifying asset management documentation is the first step to ensure the server is correctly identified and accounted for in the organization's asset registry.


Page 2 out of 70 Pages
Previous