A very old PC is running a critical, proprietary application in MS-DOS. Administrators are concerned about the stability of this computer. Installation media has been lost, and the vendor is out of business. Which of the following would be the BEST course of action to preserve business continuity?
A. Perform scheduled chkdsk tests.
B. Purchase matching hardware and clone the disk.
C. Upgrade the hard disk to SSD.
D. Perform quarterly backups.
Correct Answer: B
Question 362:
An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer turn on. There are two arrays on the failed server: a two-drive RAID 0 set for the OS, and an
eight-drive RAID 10 set for data.
Which of the following failure scenarios MOST likely occurred?
A. A drive failed in the OS array.
B. A drive failed and then recovered in the data array.
C. A drive failed in both of the arrays.
D. A drive failed in the data array.
Correct Answer: A
If a server has two arrays on the failed server: a two-drive RAID 0 set for the OS, and an eight-drive RAID 10 set for data, then the most likely failure scenario that caused the server to crash and not boot is that a drive failed in the OS array. RAID 0 is a RAID configuration that stripes data across two or more drives without parity or redundancy. RAID 0 offers high performance but no fault tolerance. If one drive fails in RAID 0, all data is lost and the system cannot boot. RAID 10 is a RAID configuration that combines disk mirroring and disk striping with parity. RAID 10 offers high performance and fault tolerance. RAID 10 can tolerate up to one drive failure per mirrored pair without losing data or functionality.
A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Choose two.)
A. Close unneeded ports.
B. Disable unneeded physical ports.
C. Set a BIOS password.
D. Install a SIEM.
E. Disable unneeded services.
F. Install a HIDS.
Correct Answer: BC
The two actions that can be taken to reduce the risk of a rogue employee booting a server from an outside USB drive are:
B. Disable unneeded physical ports: By disabling physical ports such as USB ports, the ability of a rogue employee to boot a server from an outside USB drive can be significantly reduced.
C. Set a BIOS password: Setting a BIOS password can prevent unauthorized access to the BIOS and boot options, which can help prevent a rogue employee from booting the server from an outside USB drive. Note that while the other options listed (A, D, E, and F) may be useful security measures, they do not directly address the specific risk of a rogue employee booting a server from an outside USB drive.
Question 364:
A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?
A. Alerting
B. Retention
C. Shipping
D. Rotation
Correct Answer: C
The administrator should configure log shipping to ensure compliance with the regulation. Log shipping is the process of automatically transferring log files from one location to another, typically from a remote server or device to a central log storage location. This ensures that all log files are stored in a central location, which is a requirement in this case.
Alerting refers to sending notifications when specific events or conditions occur, but it does not relate to storing logs in a central location. Retention refers to how long log files are kept before they are deleted, which is important for compliance and audit purposes, but it does not directly address the requirement to store logs in a central location.
Rotation refers to the practice of moving older log files to an archive location or deleting them, typically to free up space on the server, and does not address the requirement to store logs in a central location.
Question 365:
Which of the following concepts is in use when dual power supplies are connected to different power sources?
A. Fault tolerance
B. Active-passive
C. Component redundancy
D. Heartbeat
E. Link aggregation
Correct Answer: A
Question 366:
A technician is decommissioning a server from a production environment. The technician removes the server from the rack but then decides to repurpose the system as a lab server instead of decommissioning it. Which of the following is the most appropriate NEXT step to recycle and reuse the system drives?
A. Reinstall the OS.
B. Wipe the drives.
C. Degauss the drives.
D. Update the IP schema.
Correct Answer: B
Wiping the drives is the most appropriate step to recycle and reuse the system drives. Wiping the drives means erasing all the data on the drives and overwriting them with random or meaningless data. This can help prevent data leakage, comply with regulations, and prepare the drives for a new installation or configuration. Wiping the drives is different from deleting or formatting the drives, which only remove the references to the data but not the data itself. References: https:// www.comptia.org/training/resources/exam- objectives/comptia-server-sk0-005-exam-objectives (Objective 1.3)
Question 367:
A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?
A. 0
B. 1
C. 5
D. 6
Correct Answer: D
To ensure a storage array can survive the failure of two drives without losing data, the server administrator should choose RAID 6. RAID 6 provides two levels of parity protection, which means that data can be reconstructed even if two drives fail simultaneously. This is achieved by storing two sets of parity data across all drives in the array, which allows the array to survive multiple drive failures while maintaining data integrity.
RAID 0 does not provide any redundancy and does not protect against drive failures. RAID 1 provides mirroring of data between two drives, but it only protects against the failure of a single drive. RAID 5 provides a single level of parity protection, which allows the array to survive a single drive failure, but not two failures.
Question 368:
After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?
A. Remove the original network card and attempt to boot using only the new network card.
B. Check that the BIOS is configured to recognize the second network card.
C. Ensure the server has enough RAM to run a second network card.
D. Verify the network card is on the HCL for the OS.
Correct Answer: D
The HCL stands for Hardware Compatibility List and it is a list of hardware devices that are tested and certified to work with a specific operating system. If a network card is not on the HCL for the OS, it may not function properly or cause compatibility issues. Therefore, verifying the network card is on the HCL for the OS should be the next step to troubleshoot this issue.
A server room contains ten physical servers that are running applications and a cluster of three dedicated hypervisors. The hypervisors are new and only have 10% utilization. The Chief Financial Officer has asked that the IT department do what it can to cut back on power consumption and maintenance costs in the data center.
Which of the following would address the request with minimal server downtime?
A. Unplug the power cables from the redundant power supplies, leaving just the minimum required.
B. Convert the physical servers to the hypervisors and retire the ten servers.
C. Reimage the physical servers and retire all ten servers after the migration is complete.
D. Convert the ten servers to power-efficient core editions.
Correct Answer: B
Option B, which involves converting the physical servers to the hypervisors and retiring the ten servers, would address the request with minimal server downtime and reduce power consumption and maintenance costs. Since the hypervisors
are new and have low utilization, there is ample capacity to virtualize the existing physical servers. This would reduce the number of physical servers, resulting in lower power consumption and maintenance costs.
Option A, which involves unplugging power cables, may result in unexpected downtime and would not reduce power consumption or maintenance costs.
Option C, which involves re-imaging the physical servers and retiring them after the migration is complete, would require significant downtime and would not necessarily reduce power consumption or maintenance costs.
Option D, which involves converting the physical servers to power-efficient core editions, may reduce power consumption, but would not necessarily ad
Question 370:
A company needs to increase the security controls on its servers. An administrator is implementing MFA on all servers using cost-effective techniques. Which of the following should the administrator use to satisfy the MFA requirement?
A. Biometrics
B. Push notifications
C. Smart cards
D. Physical tokens
Correct Answer: B
Option B, push notifications, would be the most cost-effective solution to implement MFA on all servers. With push notifications, the user receives a notification on their mobile device or computer prompting them to approve or deny access to
the server. This method does not require any additional hardware or tokens and can be implemented easily.
Option A, biometrics, may provide a high level of security, but it would require additional hardware such as fingerprint scanners or facial recognition cameras, which can be expensive.
Option C, smart cards, require the purchase and distribution of smart cards to all users, which can be costly and time-consuming to manage.
Option D, physical tokens, such as key fobs or USB tokens, are also costly to purchase and distribute to all users. Additionally, if a user loses their token, it may cause a delay in access to the server until a new token can be distributed.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SK0-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.