SK0-005 Practice Test Free – 50 Questions to Test Your Knowledge
Are you preparing for the SK0-005 certification exam? If so, taking a SK0-005 practice test free is one of the best ways to assess your knowledge and improve your chances of passing. In this post, we provide 50 free SK0-005 practice questions designed to help you test your skills and identify areas for improvement.
By taking a free SK0-005 practice test, you can:
- Familiarize yourself with the exam format and question types
- Identify your strengths and weaknesses
- Gain confidence before the actual exam
50 Free SK0-005 Practice Questions
Below, you will find 50 free SK0-005 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level.
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. 11.251.196.241
B. 171.245.198.241
C. 172.16.19.241
D. 193.168.145.241
A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?
A. Port 443 is not open on the firewall
B. The server is experiencing a downstream failure
C. The local hosts file is blank
D. The server is not joined to the domain
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?
A. Encrypt all network traffic
B. Implement MFA on all the servers with encrypted data
C. Block the servers from using an encrypted USB
D. Implement port security on the switches
A server administrator receives a report that Ann, a new user, is unable to save a file to her home directory on a server. The administrator checks Ann's home directory permissions and discovers the following: dr-xr-xr-- /home/Ann Which of the following commands should the administrator use to resolve the issue without granting unnecessary permissions?
A. chmod 777 /home/Ann
B. chmod 666 /home/Ann
C. chmod 711 /home/Ann
D. chmod 754 /home/Ann
A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?
A. nslookup
B. nbtstat
C. telnet
D. netstat -a
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter. Which of the following should the administrator use to access the server's console?
A. IP KVM
B. VNC
C. A crash cart
D. RDP
E. SSH
Following a recent power outage, a server in the datacenter has been constantly going offline and losing its configuration. Users have been experiencing access issues while using the application on the server. The server technician notices the date and time are incorrect when the server is online. All other servers are working. Which of the following would MOST likely cause this issue? (Choose two.)
A. The server has a faulty power supply
B. The server has a CMOS battery failure
C. The server requires OS updates
D. The server has a malfunctioning LED panel
E. The servers do not have NTP configured
F. The time synchronization service is disabled on the servers
A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?
A. 21
B. 22
C. 23
D. 443
A systems administrator is preparing to install two servers in a single rack. The administrator is concerned that having both servers in one rack will increase the chance of power issues due to the increased load. Which of the following should the administrator implement FIRST to address the issue?
A. Separate circuits
B. An uninterruptible power supply
C. Increased PDU capacity
D. Redundant power supplies
A server administrator wants to run a performance monitor for optimal system utilization. Which of the following metrics can the administrator use for monitoring? (Choose two.)
A. Memory
B. Page file
C. Services
D. Application
E. CPU
F. Heartbeat
Which of the following is typical of software licensing in the cloud?
A. Per socket
B. Perpetual
C. Subscription-based
D. Site-based
A technician needs to provide a VM with high availability. Which of the following actions should the technician take to complete this task as efficiently as possible?
A. Take a snapshot of the original VM
B. Clone the original VM
C. Convert the original VM to use dynamic disks
D. Perform a P2V of the original VM
Which of the following will correctly map a script to a home directory for a user based on username?
A. serverusers$username
B. server%username%
C. serverFirstInitialLastName
D. server$username$
Which of the following documents would be useful when trying to restore IT infrastructure operations after a non-planned interruption?
A. Service-level agreement
B. Disaster recovery plan
C. Business impact analysis
D. Business continuity plan
Which of the following tools will analyze network logs in real time to report on suspicious log events?
A. Syslog
B. DLP
C. SIEM
D. HIPS
A user cannot save large files to a directory on a Linux server that was accepting smaller files a few minutes ago. Which of the following commands should a technician use to identify the issue?
A. pvdisplay
B. mount
C. df -h
D. fdisk -l
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
After configuring IP networking on a newly commissioned server, a server administrator installs a straight-through network cable from the patch panel to the switch. The administrator then returns to the server to test network connectivity using the ping command. The partial output of the ping and ipconfig commands are displayed below:The administrator returns to the switch and notices an amber link light on the port where the server is connected. Which of the following is the MOST likely reason for the lack of network connectivity?
A. Network port security
B. An improper VLAN configuration
C. A misconfigured DHCP server
D. A misconfigured NIC on the server
Which of the following is an example of load balancing?
A. Round robin
B. Active-active
C. Active-passive
D. Failover
Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?
A. Encrypt the data that is leaving the SAN
B. Encrypt the data at rest
C. Encrypt the host servers
D. Encrypt all the network traffic
A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?
A. Network connectivity on the server
B. LVM status on the server
C. Disk space in the /var directory
D. YUM dependencies
Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?
A. Bollards
B. Reflective glass
C. Security guards
D. Security cameras
A technician is installing a variety of servers in a rack. Which of the following is the BEST course of action for the technician to take while loading the rack?
A. Alternate the direction of the airflow
B. Install the heaviest server at the bottom of the rack
C. Place a UPS at the top of the rack
D. Leave 1U of space between each server
A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue? (Choose two.)
A. Adware is installed on the users’ devices
B. The firewall rule for the server is misconfigured
C. The server is infected with a virus
D. Intrusion detection is enabled on the network
E. Unnecessary services are disabled on the server
F. SELinux is enabled on the server
A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly. Which of the following is the MOST likely system vulnerability?
A. Insider threat
B. Worms
C. Ransomware
D. Open ports
E. Two-person integrity
A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is suׁcessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation: ping ftp.acme.local The IP address in the command output is different on each machine. Which of the following is the MOST likely reason for the connection failure?
A. A misconfigured firewall
B. A misconfigured hosts.deny file
C. A misconfigured hosts file
D. A misconfigured hosts.allow file
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open: 443 636 Which of the following open ports should be closed to secure the server properly? (Choose two.)
A. 21
B. 22
C. 23
D. 53
E. 443
F. 636
Which of the following BEST describes the concept of right to downgrade?
A. It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS
B. It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license
C. It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased
D. It allows a previous version of an OS to be installed and covered by the same license as the newer version
A technician is trying to determine the reason why a Linux server is not communicating on a network. The returned network configuration is as follows: eth0: flags=4163 mtu 1500 inet 127.0.0.1 network 255.255.0.0 broadcast 127.0.0.1 Which of the following BEST describes what is happening?
A. The server is configured to use DHCP on a network that has multiple scope options
B. The server is configured to use DHCP, but the DHCP server is sending an incorrect subnet mask
C. The server is configured to use DHCP on a network that does not have a DHCP server
D. The server is configured to use DHCP, but the DHCP server is sending an incorrect MTU setting
A technician is attempting to update a server's firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do NEXT to install the firmware?
A. Press F8 to enter safe mode
B. Boot from the media
C. Enable HIDS on the server
D. Log in with an administrative account
A technician needs to install a Type 1 hypervisor on a server. The server has SD card slots, a SAS controller, and a SATA controller, and it is attached to a NAS. On which of the following drive types should the technician install the hypervisor?
A. SD card
B. NAS drive
C. SATA drive
D. SAS drive
A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?
A. echo /newdisk >> /etc/fstab
B. net use /newdisk
C. mount ג€”o remount, rw /newdisk
D. mount ג€”a
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
A. Heartbeat
B. Failback
C. Redundancy
D. Load balancing
A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)
A. Faulty memory
B. Data partition error
C. Incorrectly seated memory
D. Incompatible disk speed
E. Uninitialized disk
F. Overallocated memory
A technician needs to set up a server backup method for some systems. The company's management team wants to have quick restores but minimize the amount of backup media required. Which of the following are the BEST backup methods to use to support the management's priorities? (Choose two.)
A. Differential
B. Synthetic full
C. Archive
D. Full
E. Incremental
F. Open file
A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?
A. PKI
B. SSL
C. LDAP
D. DNS
Which of the following policies would be BEST to deter a brute-force login attack?
A. Password complexity
B. Password reuse
C. Account age threshold
D. Account lockout threshold
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action?
A. Upgrade the application package
B. Tighten the rules on the firewall
C. Install antivirus software
D. Patch the server OS
A technician runs top on a dual-core server and notes the following conditions: top `"- 14:32:27, 364 days, 14 users load average 60.5 12.4 13.6 Which of the following actions should the administrator take?
A. Schedule a mandatory reboot of the server
B. Wait for the load average to come back down on its own
C. Identify the runaway process or processes
D. Request that users log off the server
A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server. Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)
A. Audit all group privileges and permissions
B. Run a checksum tool against all the files on the server
C. Stop all unneeded services and block the ports on the firewall
D. Initialize a port scan on the server to identify open ports
E. Enable port forwarding on port 80
F. Install a NIDS on the server to prevent network intrusions
A storage administrator is investigating an issue with a failed hard drive. A technician replaced the drive in the storage array; however, there is still an issue with the logical volume. Which of the following best describes the NEXT step that should be completed to restore the volume?
A. Initialize the volume
B. Format the volume
C. Replace the volume
D. Rebuild the volume
A server technician is configuring the IP address on a newly installed server. The documented configuration specifies using an IP address of 10.20.10.15 and a default gateway of 10.20.10.254. Which of the following subnet masks would be appropriate for this setup?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.240
D. 255.255.255.254
A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
A. User account control
B. Anti-malware
C. A sniffer
D. A port scanner
A server technician is installing a Windows server OS on a physical server. The specifications for the installation call for a 4TB data volume. To ensure the partition is available to the OS, the technician must verify the:
A. hardware is UEFI compliant
B. volume is formatted as GPT
C. volume is formatted as MBR
D. volume is spanned across multiple physical disk drives
Which of the following would be BEST to help protect an organization against social engineering?
A. More complex passwords
B. Recurring training and support
C. Single sign-on
D. An updated code of conduct to enforce social media
Users in an office lost access to a file server following a short power outage. The server administrator noticed the server was powered off. Which of the following should the administrator do to prevent this situation in the future?
A. Connect the server to a KVM
B. Use cable management
C. Connect the server to a redundant network
D. Connect the server to a UPS
A server administrator was asked to build a storage array with the highest possible capacity. Which of the following RAID levels should the administrator choose?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
Which of the following describes the installation of an OS contained entirely within another OS installation?
A. Host
B. Bridge
C. Hypervisor
D. Guest
A technician is unable to access a server's package repository internally or externally. Which of the following are the MOST likely reasons? (Choose two.)
A. The server has an architecture mismatch
B. The system time is not synchronized
C. The technician does not have sufficient privileges
D. The external firewall is blocking access
E. The default gateway is incorrect
F. The local system log file is full
Which of the following should an administrator use to transfer log files from a Linux server to a Windows workstation?
A. Telnet
B. Robocopy
C. XCOPY
D. SCP
Get More SK0-005 Practice Questions
If you’re looking for more SK0-005 practice test free questions, click here to access the full SK0-005 practice test.
We regularly update this page with new practice questions, so be sure to check back frequently.
Good luck with your SK0-005 certification journey!